In the five days since its launch, Mega has accomplished two major feats.

The new file-locker site has grown at an outrageous pace, having reportedly registered over 1 million users in its first 24 hours.

And two, a litany of Internet security experts have complained that the site isn't safe.

To the first point, the promotional efforts of founder Kim Dotcom, he of the boisterous claims and wild victimization, have been an undeniable success. As of Tuesday evening, as Dotcom was proud to point out, Mega has already surpassed competitors Dropbox and Rapidshare in worldwide popularity, becoming the biggest site in its host country of New Zealand. According to Alexa.com, it's the world's 141 most-visited site in the past week, even considering it wasn't open to the public for two of those days.

But then there's those pesky safety concerns, technical issues that go far beyond the simple fact that Mega's very popularity has made it difficult for some users to access.

As reported by Ars Technica, Mega's encryption keys aren't truly random and can be guessed. Moreover, Ars noted that even though Mega might encrypt files, it still searches for exact copies. Therefore, if you have the exact same file as someone else, and that person is somehow caught and that file revealed, you can be implicated as well.

Experts interviewed by Forbes were far harsher. “Quite frankly it felt like I had coded this in 2011 while drunk,” Nadim Kobeissi, creator of Crypto.cat, told the site. Dotcom's insistence that the site uses a Javascript verification system "make[s] no sense," according Matthew Green, a cryptographer professor at John Hopkins University, added.

Dotcom took to his blog Tuesday to address his site's honor against both criticisms. To Ars, he noted, knocking Mega's encryption for not being truly random was "quite a strange statement," but said he would soon add a feature that allows users to further randomize it. He took a stronger stance against Forbes, admitting that while anyone who can hack SSL (Secure Sockets Layer, a standard encryption tool) can hack Mega, anyone with those skills "can break a lot of things that are even more interesting than MEGA." Dotcom also called Green's Java comments "hearsay" and requested people look at his actual code.

However, the blog fail0verflow decided to do just that, and found something even more damning. It's technical, though writer Héctor Martín does a nice job of simplifying the issue. Anyone with access to Mega's third-party content-delivery network (CDN) nodes could access encrypted user files.

If you were hosting one of Mega’s CDN nodes (or you were a government official of the CDN hoster’s jurisdiction), you could now take over Mega and steal users’ encryption keys. While Mega’s sales pitch is impressive, and their ideas are interesting, the implementation suffers from fatal flaws. This casts serious doubts over their entire operation and the competence of those behind it.

Dotcom has tried to shift the momentum of the debate, offering an unspecified cash-prize contest for those who find security flaws.

"We welcome the ongoing #Mega security debate & will offer a cash prize encryption challenge soon," he tweeted Wednesday.

Screengrab via mega.co.nz