We're building the future of mobile security.

We empower our partners to deliver exclusive mobile endpoint security software for high-net worth individuals and discerning enterprises. We fortify against vulnerabilities and data exfiltration with precision.


150+

Worldwide
Service Providers
180+

Countries in
Service
99.9%

Server
Uptime
0

Data
Breaches
Partners
BlackBerryRadwareCyber AlbertaGlobal Encryption CoalitionNational Cybersecurity Alliance
ChatMail Phone

Enterprise-focused private mobile communications with end-to-end encryption and fortified private servers. Custom-integrated with the Renati operating system or Blackberry UEM.

Secure Your Communication

Renati Phone

A no-compromise security-focused operating system for ChatMail, specifically designed to protect from both remote and physical attack vectors. Custom-installed on select Android™ devices.

About Our OS
Unique Wire

Forensically Tested Against Physical Extraction


A man talks on a phone.

Consulting

Safely navigate the digital minefield with an expert insider's perspective on your organization's mobile security goals.

Book Free Consultation

We put our money where our encryption is.

Communications on our network are protected with our unbreakable proprietary CAMP protocol. Win $5000 by decrypting this message.

Learn more

Crack The Code Encryption Challenge

We invite you to decipher the AES-256 encrypted message, part of our proprietary security protocols.

Challenge Overview

The Challenge encourages participants to decrypt our AES-256 cryptography message and submit the answer on our website in plaintext. If you are successful in decrypting the message, you’ll be automatically notified, and must provide your contact details and details on the input used to break the encryption in order to win $5,000 CDN.

Changes to These Terms

Myntex reserves the right to modify these Terms at any time. Continued participation in the Challenge after changes become effective implies acceptance of the new Terms. If you do not agree with the new Terms, you must cease participation in the Challenge.

Program Eligibility

The Encryption Challenge is open to anyone over 18, and not residing in countries where encryption is not supported.

Ineligibility

You are not eligible to participate in the Challenge if you meet any of the following criteria:

  • You are a resident of any country under U.S. sanctions or any other country that prohibits participation in such programs.
  • You are under the age of 18.
  • You are currently or have been in the past a Myntex Partner (Certified Executive Partner, Distributor, Retailer), employee, affiliate or an immediate family or household member of such an employee

Submission Process

The decrypted answer ("Submission") must be sent via our website submission form. If you are correct, you’ll be automatically prompted to specify your name and email, and provide the decrypted message plaintext details, including the input used to break the encryption.

Submission Review Process

Myntex engineers will review submissions for eligibility. Review time will vary based on complexity and completeness. Myntex retains sole discretion in determining qualified submissions.

Challenge Reward

The Challenge reward of $5,000 CAD are made at Myntex’s sole discretion and are based on the correct decrypted plaintext response. Payment may be subject to tax regulations.

Out of Scope

Spam or social engineering techniques. Denial-of-service attacks

Public Recognition

Myntex may publicly recognize individuals awarded Challenge Rewards unless explicitly requested otherwise.

Privacy

See the Myntex Privacy Policy for information on data collection and usage related to the Program.

Code of Conduct

Participants must adhere to ethical conduct guidelines, including legality, non-exploitation of minors, no spam, no inappropriate content, no false information, no harm to others, no infringement on rights, and no aiding others in violating these rules.

No Warranties

Myntex makes no warranties or guarantees with respect to the Challenge. Participation is at your own risk.

Limitation of Liability & Binding Arbitration

Class actions, class-wide arbitrations, and representative actions are not allowed.

These Terms, and the Myntex Privacy Policy, constitute the entire agreement between you and Myntex regarding participation in the Challenge.

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
The apple tree grows oranges.
Global Attempts 000182

Lock

Bug Bounty: Every user makes our tech stronger.

We've gone to extreme lengths to secure our devices. Anyone that dives into Renati OS, challenges our defenses, and finds an exploit, can earn up to $5,000.

Submit Exploit
Learn more

ChatMail on Renati Bug Bounty Program

Our mission at Myntex is clear: Provide uncompromising mobile privacy to the world

We invite security researchers, individuals, and ethical hackers to help us uncover and address potential security exploits and vulnerabilities in Myntex products, systems, or services platform. Our Bug Bounty program is designed to recognize your work in helping us protect the security and privacy of our global clientele.

  • If you’re a Myntex Partner, please submit bugs directly to support@chatmail.ca. As partners, you are not eligible for the bounty programs monetary rewards.
  • For all other eligible parties, please review the terms and fill out the submission form below.

We diligently assess all qualifying findings. In return for your invaluable assistance, we offer recognition and compensation, with payouts of up to $5,000 for qualifying bug reports.


Terms and Conditions

These Bug Bounty Program Terms and Conditions ("Terms") outline the participation guidelines for the ChatMail on Renati Bug Bounty Program (the "Program"). These Terms are an agreement between you and Myntex Inc. ("Myntex," "us" or "we"). By submitting any security vulnerabilities or exploits ("Bugs") related to ChatMail on Renati or by participating in the Program in any capacity, you agree to abide by these Terms.

Program Overview

The Program encourages users to report security vulnerabilities and exploits ("Bugs") found in ChatMail on Renati. Rewards, at Myntex's sole discretion, will be provided based on the severity and impact of the reported Bug, with a maximum reward of up to $5,000.

Changes to These Terms

Myntex reserves the right to modify these Terms at any time. Continued participation in the Program after changes become effective implies acceptance of the new Terms. If you do not agree with the new Terms, you must cease participation in the Program.

Program Eligibility

The Bug Bounty Program is open to security researchers, ethical hackers, and individuals interested in contributing to the security of ChatMail on Renati. To be eligible to participate in the Program, you must meet the following criteria:

You are 14 years of age or older. If you are considered a minor in your place of residence and are at least 14 years old, you must obtain parental or legal guardian permission before participating. You are either an individual researcher acting in your personal capacity, or you are part of an organization that allows your participation.

Ineligibility

You are not eligible to participate in the Program if you meet any of the following criteria:

  • You are a resident of any country under U.S. sanctions or any other country that prohibits participation in such programs.
  • You are under the age of 14.
  • Your organization does not permit participation in bug bounty programs.
  • You are a public sector employee (government and education) and have not obtained explicit permission from your organization's ethics compliance officer to participate.
  • You are currently a Myntex employee, affiliate or an immediate family or household member of such an employee.
  • Within the six months prior to providing a Bug report, you were an employee of Myntex.

Submission Process & Coordinated Vulnerability Disclosure

Bug reports ("Submissions") must be sent to [ designated email or portal ]. In the initial submission, specify the name of the Bounty Program, Bug details, and product version numbers for validation. Include comprehensive information such as Bug type, affected product, required configurations, and steps to reproduce.

Submission License

By providing any Bug Submission to Myntex, you grant Myntex a non-exclusive, irrevocable, perpetual, royalty-free, worldwide, sub-licensable license to the intellectual property in your Submission.

Confidentiality of Submissions

Bug Submissions must remain confidential until the Vulnerability is fixed. Detailed exploit code and information making attacks easier must be withheld for 30 days post-fix. Violations may result in disqualification and return of any rewards.

Submission Review Process

Myntex engineers will review Submissions for eligibility. Review time will vary based on complexity and completeness. Myntex retains sole discretion in determining qualified Submissions.

Bug Bounty Payments

Bounty amounts are determined by Myntex and are final. Qualified Submitters will be notified of the Bounty amount and provided with necessary paperwork for payment processing. Payment may be subject to tax regulations.

Public Recognition

Myntex may publicly recognize individuals awarded Bounties unless explicitly requested otherwise.

Privacy

See the Myntex Privacy Policy for information on data collection and usage related to the Program.

Code of Conduct

Participants must adhere to ethical conduct guidelines, including legality, non-exploitation of minors, no spam, no inappropriate content, no false information, no harm to others, no infringement on rights, and no aiding others in violating these rules.


We have a transparent and open door policy.

You should only trust technology as much as you trust the company behind it. To demonstrate our commitment to security, we offer exclusive behind-the-scenes office tours for those interested in witnessing firsthand how we safeguard our data center.

Reserve Your Spot

Encryption IQ

Loading

A resilient man
Geoff Green, CEO and Founder

Your information is only as valuable as its protection.

We provide technology for law firms, executive teams, and governments to keep their most important communications private. Let's talk about your digital security.