Isn't it dubious to bring private people "on board"?
All available resources must be exhausted in order to convict serious criminals more quickly. Millions of computers and servers are running day and night worldwide. This potential must be actively used for the prosecution of pedophiles, murderers and other serious criminals.
Can a reward only be offered by a prosecutor's office?
No. If a public authority wants to publish a password hash, a service contract is concluded between Decrypta Technologies GmbH and the public authority. Decrypta Technologies will actively support the decryption attempts with its own GPU servers. Costs are incurred by the authorities only if the password is decrypted.
Do law enforcement agencies have to deposit the reward in advance?
No. The reward is contractually guaranteed and does not need to be deposited in advance.
Will the identity of the contracting authority be made public?
No. We see ourselves as an anonymous interface between international law enforcement agencies and the aforementioned group of people.
How can law enforcement authorities publish a hash?
Contact us without obligation. You can extract the password hashes easily and quickly using our software "GovCracker".
How long are the hashes made available to the public?
Generally three months. The period can be extended at any time.
When is the best time to publish a password hash?
As soon as possible. Keyword: duration of proceedings.
Can a private person or a company publish a hash?
No. Only authorities in initiated criminal proceedings can commission Decrypta Technologies as "expert third party" with the decryption.
Does the software "BOINC" affect the computer performance?
Your computer can be used as per normal. In general you will not feel any effect from the decryption attempts in the background. If necessary, you can simply pause BOINC.
I find the project exciting and would like to take part actively. What do I have to do?
We would be pleased if you share our website on Facebook and other media and install "BOINC" on your computer. If you have further ideas or suggestions for improvement, please contact us.
Who can participate?
Anyone who has a computer and wants to "do something good".
What is a password hash?
Passwords are mathematically converted into a string of characters (=hash value) using hash functions (=algorithms). For example, the password "123456" has the hash value: e10adc3949ba59abbe56e057f20f883e (MD5). A password that has been calculated with a mathematical hash method cannot be calculated back. A hash value is comparable to a digital fingerprint. The only way to decrypt hashed passwords is "trial and error" (trail-and-error method).