Bounty Challenge 1
We (the Ex0-SyS team) have developed our own cryptographic Technology. We think that our cryptographic Technology is safe; by safe, we mean really safe. But why should you trust us? THAT IS WHY WE ARE ANNOuNCING THE next OPENING OF OUR BOUNTY CHALLENGE WITH A  reward OF 1 Bitcoin (BTC) to whom can crack US.

HOW it works


You will be able to download below an encrypted video explaining the procedure to claim your reward. The video is encrypted using [email protected] Vault Software. What we don’t give you is the Pin Code and the Password. It is up to you to download the application to understand how it works. Don’t worry, there is a free version! There are also some conditions to fulfill before you can get your bitcoin (the reward goes to the first person who reports the crack/exploit).

Powered By

Bounty Challenge 2
alpha-tav-vault-bounty-challenge

WHAT YOU SHOULD DO


  1. Provide us with a reasonable amount of time to fix the issue before publishing it elsewhere.
  2. You must provide us with all the details of the exploit.
  3. We should be able to reproduce it.
  4. If the exploit involves brute force, you still need to explain to us how to do it even if we don’t have the computation power to reproduce it.
  5. Optionally, tell us how you would fix the exploit

WHAT YOU SHOULD NOT DO


  1. Disturb/attack our services including the website, servers, emails. You have to crack the algorithm.
  2. Compromise [email protected] users’ data.

* We will not bring legal action against researchers who point out a problem provided they do their best to follow the guidelines above.

Bounty Challenge 3

BUG BOUNTY RESULT STATEMENT.


Our 1-BTC Rewarded Bounty Challenge has come to an end after 25 days, the day after the last secure fragment was released.
1757 hackers from around the world have joined our challenge, surpassing by far our initial expectations.

The purpose of the challenge was to demonstrate that our fragmentation technology was resilient to power computing and we have successfully done so.

Nobody was able to brute force the system without all the data fragments.

However, the day after the release of the latest fragment, a great contender named Adrien Guinet managed to decrypt the file using his state-of-the-art reverse engineering skills, pointing out some implementation issues that we have applied to/put into the application. The details of the attack will be made public through his blog in the following weeks.

This experience and the great collaboration we had with Adrien Guinet following his success allowed us to patch our application which is now safer than ever before.

It is with great pleasure and honor that we rewarded him with the promised bitcoin.

We would like to thank all who have been part of this event and we hope to see you back for our future challenges!

Sincerely,

The Ex0-SyS Team

Translate »

Invite & Earn

X
Signup to start sharing your link
Signup