Feeds

Crack our 'military-grade' email encryption and we'll give you 5% of our firm

Hungarian startup tries novel bug-testing system

SANS - Survey on application security programs

Vulnerability testing is commonplace these days, and a lucrative business for some, but a Hungarian biz is offering an unusual prize for anyone who manages to crack its email encryption system – a five per cent stake in the company.

The upstart, MySecureZone, has spent the last 22 months potting together a browser-based encryption system for email, instant messaging, VoIP and VPN traffic that it claims is bulletproof. In the case of email, for example, messages are encrypted and then sent to the firm's servers in Switzerland and Luxembourg, after which the recipient can pull them down and read them using a passphrase agreed with the sender.

"The goal of our company is to help people protect their online privacy and to bring the highest grade user-friendly IT security to the public. For ultimate security, our system rests on the strong foundations of open source," said Istvan Balazs, MySecureZone's CTO.

"We know that, on the Internet, the user login process is one of the most vulnerable areas of personal information protection. That's why we have created a state-of-the-art, web-based, two-factor authentication solution that is unique and innovative. This will ensure that, even with a weak password, your private messages will be safe and secure."

The competition, which began on Monday, challenges people to decrypt one of these emails and get hold of the message contents. Participants can apply to the firm for access to the encrypted email and the first person to break it open can claim a five per cent share of the firm; it's also running an Indiegogo campaign to raise $50,000 to get a commercial 'military-grade' version of the system up and running.

As publicity stunts go it's an interesting idea but, as one El Reg hack noted, if you've broken the encryption would you want a stake in the firm that's trying to sell it? ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.