Decryption Service

Almost everyone knows it ...

... the television show "America´s Most Wanted".


When international law enforcement agencies are making no headway, they seek the help from the public. GovServer-Project is based on this principle. The difference is, help (from the public) is needed in decrypting passwords from seized IT evidence, such as laptops, hard drives or USB sticks belonging to serious criminals.


The problem

Every year, hundreds of thousands of encrypted laptops, hard disks or USB sticks are conficated worldwide as part of search measures done by international law enforcement agencies. The decryption of high volume data are often very time consuming and critical evidence that would likely have led to a conviction of the accused person, being over-looked. Especially in the area of child pornography, computers and data carriers where data are very often strongly encrypted and poses difficulties for law enforcement agencies.


Foundation and aim of the GovServer-Project

Launched by Decrypta Technologies from Germany, the project aims to take chances of any successfully decrypted passwords to convict pedophiles, murderers and other serious criminals faster by getting the public involved.


The Solution

  • Complex decryption processes are shared across as many people as possible in order to convict serious criminals faster.
  • Everyone who owns a computer can participate in the project and get involved in the process. Download the software here.
  • No special hardware or know-how knowledge/skill is required.
  • A high reward is offered for each decrypted password.
  • Whoever succeeds in decrypting the password first will receive the reward.
  • Exorbitantly increases the chances of successfully decrypting passwords through the GovServer-Project for the authorities with the help of mass public.
  • The authorities will only incur costs if the respective password is decrypted. Saving considerable tax money through time and cost efficiency.
  • We represent the "anonymous" interface between the worldwide law enforcement agencies and the public. A conclusion on the commissioning authority or the respective criminal case is excluded


The GovServer project uses the secure BOINC platform of the University of Berkeley (USA) as a foundation that can bundle and make available unused computing power from many thousands of computers over the Internet. Universities use this software to increase the efficiency of their work.


It only takes four steps to actively help fight crime against pedophiles and other serious criminals.

  • Download BOINC software from Berkley University (USA). Click here.
  • Start BOINC > accept license agreement > uncheck "Use BOINC Screensaver".
    After installation, BOINC starts automatically and installs necessary updates.
  • Afterwards press the button "Add project". At the "Project address" please insert the following internet address:
  • An account will be created and you will be redirected to our project page. There the registration will be completed. You do not have to join a "team".

You can now close the BOINC command window. The decryption processes will be executed automatically fully now in the background. If you have decrypted a password successfully, we will contact you immediately by mail. If you use a VPN tunnel, you may have to set up an exception for BOINC.


Note: Only the testnet is online at the moment.



Isn't it dubious to bring private people "on board"?

All available resources must be exhausted in order to convict serious criminals more quickly. Millions of computers and servers are running day and night worldwide. This potential must be actively used for the prosecution of pedophiles, murderers and other serious criminals.


Can a reward only be offered by a prosecutor's office?

No. If a public authority wants to publish a password hash, a service contract is concluded between Decrypta Technologies GmbH and the public authority. Decrypta Technologies will actively support the decryption attempts with its own GPU servers. Costs are incurred by the authorities only if the password is decrypted.


Do law enforcement agencies have to deposit the reward in advance?

No. The reward is contractually guaranteed and does not need to be deposited in advance.


Will the identity of the contracting authority be made public?

No. We see ourselves as an anonymous interface between international law enforcement agencies and the aforementioned group of people.


How can law enforcement authorities publish a hash?

Contact us without obligation. You can extract the password hashes easily and quickly using our software "GovCracker".


How long are the hashes made available to the public?

Generally three months. The period can be extended at any time.


When is the best time to publish a password hash?

As soon as possible. Keyword: duration of proceedings.


Can a private person or a company publish a hash?

No. Only authorities in initiated criminal proceedings can commission Decrypta Technologies as "expert third party" with the decryption.


Does the software "BOINC" affect the computer performance?

Your computer can be used as per normal. In general you will not feel any effect from the decryption attempts in the background. If necessary, you can simply pause BOINC.


I find the project exciting and would like to take part actively. What do I have to do?

We would be pleased if you share our website on Facebook and other media and install "BOINC" on your computer. If you have further ideas or suggestions for improvement, please contact us.


Who can participate?

Anyone who has a computer and wants to "do something good".


What is a password hash?

Passwords are mathematically converted into a string of characters (=hash value) using hash functions (=algorithms). For example, the password "123456" has the hash value: e10adc3949ba59abbe56e057f20f883e (MD5). A password that has been calculated with a mathematical hash method cannot be calculated back. A hash value is comparable to a digital fingerprint. The only way to decrypt hashed passwords is "trial and error" (trail-and-error method).