Kim Dotcom offers Mega reward to would-be hackers

Controversial file-sharing site promises €10,000 to anyone who can break through its security.

Security keyboard

Newly-launched file sharing service Mega is offering a reward of up to 10,000 to anyone who finds a previously unknown security bug or design flaw on the site.

The challenge, which was announced through the site's blog, was launched in response to a number of security concerns, particularly surrounding Mega's use of encryption.

Advertisement - Article continues below

Just days after going live, the site was chastised by cryptographers for using what they allege were flimsy security protocols and making nonsensical claims.

A tool was also set up by security researcher Steve Thomas that can extract users' passwords from the account confirmation email sent by Mega at the time of signup.

Mega only gave the link so they could say 'see, no one can crack this'.

Mega first responded with a blog claiming it was "not too impressed with the results [of attempts to dismantle its crypto architecture]", but on 2 February issued the new bug identification challenge with financial incentives.

The organisation has outlined several qualifying types of bug: remote execution code of any of its servers or on any client browser, and any issue that breaks Mega's cryptographic security model.

There are also four special scenarios: compromising a static CDN node, compromising a user storage node, compromising core infrastructure or, for the top prize, using brute force to decrypt a published file or to send the password encoded in a published signup confirmation link.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Mega said the challenge has been issued to improve its security, but Thomas claims it is a bluff.

At the top of the page hosting his MegaCracker tool, Thomas has left a message that states: "If you are here to crack Mega's confirmation link challenge, you should know that it will cost more in energy usage than they will pay you. Since they only gave the link so that they could say see no one can crack this'.

"**IF** it is even remotely crackable, it is a sentence or at least eight random words. My guess is it is output from /dev/urandom or someone smacking the keyboard for a minute."

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/security/phishing/355810/zloader-malware-returns-as-a-coronavirus-phishing-scam
phishing

ZLoader malware returns as a coronavirus phishing scam

27 May 2020
Visit/security/hacking/355806/anarchygrabber-hack-steals-discord-tokens-ids-and-passwords
hacking

AnarchyGrabber hack steals Discord tokens, IDs and passwords

27 May 2020
Visit/security/hacking/355801/scammers-using-coronavirus-contact-tracing-in-hacking-attempt
hacking

Scammers leverage contact-tracing in hacking attempt

27 May 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/data-breaches/355777/easyjet-faces-class-action-lawsuit-over-data-breach
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020