▲ | Show HN: Bitcoin Challenge. Try to steal a plain text private key you can use(app.redactsure.com) | |||||||||||||||||||
14 points by redactsure 2 days ago | 13 comments | ||||||||||||||||||||
Hi HN, I'm releasing my round one public demo of a new browser security system I've been developing. There's a real Bitcoin private key (worth $20) in plaintext at app.redactsure.com. You can copy it, paste it, delete it, move it around - full control. But you can't see the actual characters or extract them. The challenge: Break the protection and take the Bitcoin. First person wins, challenge ends. Details: - Requires email verification (prevents abuse, no account needed) - 15 minute time limit per session - Currently US only for the demo (latency) - Verify the Bitcoin is real: https://redactsure.com/bitcoinchallenge Technical approach: - Cloud-hosted browser with real time NER model - Webpages are unmodified - Think of it as selective invisibility for sensitive data. You can interact with it normally, just can't see or extract it Looking for feedback on edge cases in the hiding/protection algorithm. Happy to answer questions about the implementation. | ||||||||||||||||||||
▲ | redactsure 7 hours ago | parent | next [-] | |||||||||||||||||||
Challenge is back up if anyone is still interested in a try: https://redactsure.com/bitcoinchallenge/ | ||||||||||||||||||||
▲ | redactsure 15 hours ago | parent | prev | next [-] | |||||||||||||||||||
Challenge is back up if anyone is still interested in a try: | ||||||||||||||||||||
| ||||||||||||||||||||
▲ | cikito2131 a day ago | parent | prev | next [-] | |||||||||||||||||||
i took the coins (temp email cikito2131@evoxury.com) went to the tools site you linked, main page and to the tool that makes pictures from text. pasted into textbox and it wasn't hidden. Spent more time figuring out how to do the wallet stuff | ||||||||||||||||||||
| ||||||||||||||||||||
▲ | Disposal8433 2 days ago | parent | prev | next [-] | |||||||||||||||||||
> 15 minute time limit per session Why? That's not how security works. | ||||||||||||||||||||
| ||||||||||||||||||||
▲ | shibeprime a day ago | parent | prev | next [-] | |||||||||||||||||||
So its over and 3PCVMB3GfvRrMG9cav6EQwSBoWzjS7gLiW got it? | ||||||||||||||||||||
| ||||||||||||||||||||
▲ | halfcat a day ago | parent | prev [-] | |||||||||||||||||||
If the data exists on the client, isn’t it going to be susceptible to compromise no matter what? | ||||||||||||||||||||
|