VOID Storage Hack Challenge 🚀
Visible but Unbreakable

Devdeed VOID Hack Event Rules & Instructions

Welcome to the VOID Storage Hack Challenge! Your mission is to decode the hidden messages embedded in the visuals. Submit the correct SHA256 hash to earn a spot in the final hackathon!


Challenge Structure

There are 3 different challenges: Easy, Pro, and Doom modes. If you successfully decode the messages in Pro or Doom mode, you’ll be invited to our main hacking event.

Why include an Easy mode?

We want everyone to have a chance to participate and understand the methodology. We recommend starting with the easy one to get a feel for the VOID system.

But what are we really trying to crack?

The VOID algorithm is a system. We're here to prove its reliability. What you're interacting with is version 0.0.0.1 — an entry-level model. If you manage to break through this level, you'll gain access to a much more advanced experience like no other.

Unique Clues

To prove the strength of our system, we're giving you insights and metadata that are usually hidden in most hack events. This is your chance to reverse-engineer with full transparency.

What is Devdeed VOID?

VOID is a unique storage technique developed by Devdeed. It’s currently implemented in our Web3-based messaging product NOCBY, where its advanced version secures all user data.

More Clues & Useful Links

What an event, huh? 🎉 Thank You!

Thank you for joining the event, the event is done and we are still alive.
If you would like to see the answer, just click the button below!
And don't forget to join our DC channel! 🚀

What an event, huh?


Join our Discord Channel

Welcome, Challenger!

Select a challenge below to begin. Each one tests your skills further! ️

Easy Mode

Beginner level challange.

Pro Mode

Intermediate level challange.

Doom Mode

Advanced level challange. Crack the third encrypted visual set.

Beginner Mode

Hints: This is a beginner-level challenge to help you understand the system you're dealing with.
Solving this will not grant a ticket, but you can join our Discord community via this link.
Check the R channel.
Analyze EXIF/metadata sections.
Characters are randomized and encrypted.

SHA256 of the message:

  
dd670272319d026e3cdcf8219463c6a9ba7604ee824815a7323aeb8f0098eb33


All Characters (Random Order):

fl3cJ0bffaf1Rel214LU1fS#125H5{d47X70lav1czf!0i_fb`cfd9f47ba4jf['9v22d|E232081>77bfRbd^R6ccXlx40b505aBf314z2df=184d0_6df35aseS63`m9e{2w69dfe9O89\gj2-8d5c1e1"6e85{0aJ8xb+7L\7406d89ey3ejb\d3d115f4>9063tebfc4$9z_6b816b221e18f3eZ47E5e76s1574te50d5>@A8c8[c_#*c1Fc0eb1u38e3934k232179N1V4b1aauxd
  

Scroll inside the box to view all characters.

Download Image Devdeed Void 1 Visual
Darkness is only a veil, look deeper. What you seek is not hidden, it is merely disguised by Devdeed’s VOID algorithm. Good Luck!

Pro Mode

Hint: Intermediate level — solve this challenge to earn your entry ticket to the main hack event.

What you have:

Sha 256 looks like: a004d----------------------------------------------------------- 
  
Tip: Inspect the image metadata and pay close attention to irregularities in the R channel.

When the correct SHA256 is submitted, a hidden invitation link will be revealed. Click to send your answer

Download Image Devdeed VOID 2 Visual
This visual may appear empty, but VOID encryption conceals its secrets well. Decode the structure, align the data — and you might just earn your place.

Doom Mode

Hint: Advanced level — combine three hidden visuals to find the solution.
Analyze all three together. Clues are distributed.

Download Image 1 | Download Image 2 | Download Image 3
Devdeed Void 3 Visual 1 Devdeed Void 3 Visual 2 Devdeed Void 3 Visual 3
Darkness is only a veil, look deeper. What you seek is not hidden, it is merely disguised by Devdeed’s VOID algorithm. Good Luck!

SHA256 Creator

Submit Your Answer

  
void 5: 713b9412264f693eaf206b345ccdb91ea2dfa2f043f88992cfae393c7f100f55
void 4: b693653ab93d1f11e1e87b711b7d2eb23ff49023877881e3be6c60a6b93071b2
void 3: 3687fea8545a04bb64cbc58824219152f8103ff76d729a94ab771ebeb6fba119
void 2: a004d83f43c5bde49b601d71460be56af7486cad7ab6be9805f11e31e7c75931
VOID Zero Knowledge Proof NOCBY - zkp steganography data privacy data security | Product Hunt