Feeds

Crack our 'military-grade' email encryption and we'll give you 5% of our firm

Hungarian startup tries novel bug-testing system

Build a business case: developing custom apps

Vulnerability testing is commonplace these days, and a lucrative business for some, but a Hungarian biz is offering an unusual prize for anyone who manages to crack its email encryption system – a five per cent stake in the company.

The upstart, MySecureZone, has spent the last 22 months potting together a browser-based encryption system for email, instant messaging, VoIP and VPN traffic that it claims is bulletproof. In the case of email, for example, messages are encrypted and then sent to the firm's servers in Switzerland and Luxembourg, after which the recipient can pull them down and read them using a passphrase agreed with the sender.

"The goal of our company is to help people protect their online privacy and to bring the highest grade user-friendly IT security to the public. For ultimate security, our system rests on the strong foundations of open source," said Istvan Balazs, MySecureZone's CTO.

"We know that, on the Internet, the user login process is one of the most vulnerable areas of personal information protection. That's why we have created a state-of-the-art, web-based, two-factor authentication solution that is unique and innovative. This will ensure that, even with a weak password, your private messages will be safe and secure."

The competition, which began on Monday, challenges people to decrypt one of these emails and get hold of the message contents. Participants can apply to the firm for access to the encrypted email and the first person to break it open can claim a five per cent share of the firm; it's also running an Indiegogo campaign to raise $50,000 to get a commercial 'military-grade' version of the system up and running.

As publicity stunts go it's an interesting idea but, as one El Reg hack noted, if you've broken the encryption would you want a stake in the firm that's trying to sell it? ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?