Feeds

Crack our 'military-grade' email encryption and we'll give you 5% of our firm

Hungarian startup tries novel bug-testing system

The Power of One eBook: Top reasons to choose HP BladeSystem

Vulnerability testing is commonplace these days, and a lucrative business for some, but a Hungarian biz is offering an unusual prize for anyone who manages to crack its email encryption system – a five per cent stake in the company.

The upstart, MySecureZone, has spent the last 22 months potting together a browser-based encryption system for email, instant messaging, VoIP and VPN traffic that it claims is bulletproof. In the case of email, for example, messages are encrypted and then sent to the firm's servers in Switzerland and Luxembourg, after which the recipient can pull them down and read them using a passphrase agreed with the sender.

"The goal of our company is to help people protect their online privacy and to bring the highest grade user-friendly IT security to the public. For ultimate security, our system rests on the strong foundations of open source," said Istvan Balazs, MySecureZone's CTO.

"We know that, on the Internet, the user login process is one of the most vulnerable areas of personal information protection. That's why we have created a state-of-the-art, web-based, two-factor authentication solution that is unique and innovative. This will ensure that, even with a weak password, your private messages will be safe and secure."

The competition, which began on Monday, challenges people to decrypt one of these emails and get hold of the message contents. Participants can apply to the firm for access to the encrypted email and the first person to break it open can claim a five per cent share of the firm; it's also running an Indiegogo campaign to raise $50,000 to get a commercial 'military-grade' version of the system up and running.

As publicity stunts go it's an interesting idea but, as one El Reg hack noted, if you've broken the encryption would you want a stake in the firm that's trying to sell it? ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.