We empower our partners to deliver exclusive mobile endpoint security software for high-net worth individuals and discerning enterprises. We fortify against vulnerabilities and data exfiltration with precision.
Enterprise-focused private mobile communications with end-to-end encryption and fortified private servers. Custom-integrated with the Renati operating system or Blackberry UEM. Prices start as low as $129/mo.
A no-compromise security-focused operating system for ChatMail, specifically designed to protect from both remote and physical attack vectors. Custom-installed on select Android™ devices. Prices start as low as $129/mo.
Forensically Tested Against Physical Extraction
Safely navigate the digital minefield with an expert insider's perspective on your organization's mobile security goals.
Communications on our network are protected with our unbreakable proprietary CAMP protocol. Win $5000 by decrypting this message.
We invite you to decipher the AES-256 encrypted message, part of our proprietary security protocols.
The Challenge encourages participants to decrypt our AES-256 cryptography message and submit the answer on our website in plaintext. If you are successful in decrypting the message, you’ll be automatically notified, and must provide your contact details and details on the input used to break the encryption in order to win $5,000 CDN.
Myntex reserves the right to modify these Terms at any time. Continued participation in the Challenge after changes become effective implies acceptance of the new Terms. If you do not agree with the new Terms, you must cease participation in the Challenge.
The Encryption Challenge is open to anyone over 18, and not residing in countries where encryption is not supported.
You are not eligible to participate in the Challenge if you meet any of the following criteria:
The decrypted answer ("Submission") must be sent via our website submission form. If you are correct, you’ll be automatically prompted to specify your name and email, and provide the decrypted message plaintext details, including the input used to break the encryption.
Myntex engineers will review submissions for eligibility. Review time will vary based on complexity and completeness. Myntex retains sole discretion in determining qualified submissions.
The Challenge reward of $5,000 CAD are made at Myntex’s sole discretion and are based on the correct decrypted plaintext response. Payment may be subject to tax regulations.
Spam or social engineering techniques. Denial-of-service attacks
Myntex may publicly recognize individuals awarded Challenge Rewards unless explicitly requested otherwise.
See the Myntex Privacy Policy for information on data collection and usage related to the Program.
Participants must adhere to ethical conduct guidelines, including legality, non-exploitation of minors, no spam, no inappropriate content, no false information, no harm to others, no infringement on rights, and no aiding others in violating these rules.
Myntex makes no warranties or guarantees with respect to the Challenge. Participation is at your own risk.
Class actions, class-wide arbitrations, and representative actions are not allowed.
These Terms, and the Myntex Privacy Policy, constitute the entire agreement between you and Myntex regarding participation in the Challenge.
We've gone to extreme lengths to secure our devices. Anyone that dives into Renati OS, challenges our defenses, and finds an exploit, can earn up to $5,000.
We invite security researchers, individuals, and ethical hackers to help us uncover and address potential security exploits and vulnerabilities in Myntex products, systems, or services platform. Our Bug Bounty program is designed to recognize your work in helping us protect the security and privacy of our global clientele.
We diligently assess all qualifying findings. In return for your invaluable assistance, we offer recognition and compensation, with payouts of up to $5,000 for qualifying bug reports.
These Bug Bounty Program Terms and Conditions ("Terms") outline the participation guidelines for the ChatMail on Renati Bug Bounty Program (the "Program"). These Terms are an agreement between you and Myntex Inc. ("Myntex," "us" or "we"). By submitting any security vulnerabilities or exploits ("Bugs") related to ChatMail on Renati or by participating in the Program in any capacity, you agree to abide by these Terms.
The Program encourages users to report security vulnerabilities and exploits ("Bugs") found in ChatMail on Renati. Rewards, at Myntex's sole discretion, will be provided based on the severity and impact of the reported Bug, with a maximum reward of up to $5,000.
Myntex reserves the right to modify these Terms at any time. Continued participation in the Program after changes become effective implies acceptance of the new Terms. If you do not agree with the new Terms, you must cease participation in the Program.
The Bug Bounty Program is open to security researchers, ethical hackers, and individuals interested in contributing to the security of ChatMail on Renati. To be eligible to participate in the Program, you must meet the following criteria:
You are 14 years of age or older. If you are considered a minor in your place of residence and are at least 14 years old, you must obtain parental or legal guardian permission before participating. You are either an individual researcher acting in your personal capacity, or you are part of an organization that allows your participation.
You are not eligible to participate in the Program if you meet any of the following criteria:
Bug reports ("Submissions") must be sent to info@myntex.ca. In the initial submission, specify the name of the Bounty Program, Bug details, and product version numbers for validation. Include comprehensive information such as Bug type, affected product, required configurations, and steps to reproduce.
By providing any Bug Submission to Myntex, you grant Myntex a non-exclusive, irrevocable, perpetual, royalty-free, worldwide, sub-licensable license to the intellectual property in your Submission.
Bug Submissions must remain confidential until the Vulnerability is fixed. Detailed exploit code and information making attacks easier must be withheld for 30 days post-fix. Violations may result in disqualification and return of any rewards.
Myntex engineers will review Submissions for eligibility. Review time will vary based on complexity and completeness. Myntex retains sole discretion in determining qualified Submissions.
Bounty amounts are determined by Myntex and are final. Qualified Submitters will be notified of the Bounty amount and provided with necessary paperwork for payment processing. Payment may be subject to tax regulations.
Myntex may publicly recognize individuals awarded Bounties unless explicitly requested otherwise.
You should only trust technology as much as you trust the company behind it. To demonstrate our commitment to security, we offer exclusive behind-the-scenes office tours for those interested in witnessing firsthand how we safeguard our data center.
We provide technology for law firms, executive teams, and governments to keep their most important communications private. Let's talk about your digital security.