Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possible and that the proposed encryption approach can be used to secure communications over Internet, we prove that these claims are unfounded, and that the cryptosystem can be broken in different ways. Key words: Chaotic cryptosystems; Cryptanalysis; Network security