←back to thread

14 points redactsure | 2 comments | | HN request time: 0.001s | source

Hi HN, I'm releasing my round one public demo of a new browser security system I've been developing.

There's a real Bitcoin private key (worth $20) in plaintext at app.redactsure.com. You can copy it, paste it, delete it, move it around - full control. But you can't see the actual characters or extract them.

The challenge: Break the protection and take the Bitcoin. First person wins, challenge ends.

Details: - Requires email verification (prevents abuse, no account needed) - 15 minute time limit per session - Currently US only for the demo (latency) - Verify the Bitcoin is real: https://redactsure.com/bitcoinchallenge

Technical approach: - Cloud-hosted browser with real time NER model - Webpages are unmodified - Think of it as selective invisibility for sensitive data. You can interact with it normally, just can't see or extract it

Looking for feedback on edge cases in the hiding/protection algorithm. Happy to answer questions about the implementation.

1. halfcat ◴[] No.45021299[source]
If the data exists on the client, isn’t it going to be susceptible to compromise no matter what?
replies(1): >>45028208 #
2. redactsure ◴[] No.45028208[source]
It is not on the client. Challenge is back up please give it a try.

https://redactsure.com/bitcoinchallenge/