Proof of Usefulness Report

Criptext

Analysis completed on 1/18/2026

+21
Proof of Usefulness Score
You're In Business

Criptext was a legitimate privacy-focused email service leveraging the Signal Protocol, with historical funding (~$1.8M) and press coverage. However, the project appears currently abandoned with reports of server inactivity since 2021-2024. The submission contains critical red flags: the claim 'most people have used my product' is demonstrably false, and the audience reach of 'everyone' is unrealistic. While the underlying technology was innovative, the lack of maintenance and false claims in the submission severely impact the score.

Ready to Compete for $150k+ in Prizes?

Move this data into a HackerNoon blog draft to become eligible for your share of $150k+ in cash and software prizes

View All Reports

Score Breakdown

Real World Utility+2
Audience Reach Impact+1
Technical Innovation+12
Evidence Of Traction+2
Market Timing Relevance+2
Functional Completeness+0
Subtotal+20
Usefulness Multiplierx1.03
Final Score+20

Project Details

Project URL
Description
Finally, an email service that's built around your privacy. Get your @criptext.com email address and see what it's like to have peace of mind and privacy in every email you send.\n\nFeatures:\n+End-to-end Encryption: Criptext uses the open source Signal Protocol library to encrypt your emails. Your emails are locked with a unique key that‘s generated and stored on your device alone, which means only you and your intended recipient can read the emails you send.\n\n+No data collection: unlike every other email service out there, Criptext doesn't store your emails in its servers. Instead, your entire inbox is stored exclusively on your device.\n\n+Open Source: our source code is open for everyone to see that Criptext actually works the way it's advertised. You don't have to trust us, you can verify for yourself: https://github.com/Criptext\n\n+Easy to use: our app is designed to work as simple as any other email app — so much so, you'll forget how secure it is.
Audience Reach
everyone
Target Users
everyone
Technologies
Opensource, Data Privacy-And-Compliance, Hardware
Traction Evidence
most people have used my product

Algorithm Insights

Market Position
Growing utility with room for optimization
User Engagement
Documented reach suggests active user community
Technical Stack
Modern tech stack aligned with sponsor technologies

Recommendations to Increase Usefulness Score

Document User Growth

Provide specific metrics on user acquisition and retention rates

Showcase Revenue Model

Detail sustainable monetization strategy and current revenue streams

Expand Evidence Base

Include testimonials, case studies, and third-party validation

Technical Roadmap

Share development milestones and feature completion timeline