top of page
Camo_0.5x.png

HIGH-END
CYBER-SECURITY

Protected Communication

STEALTH_COM_HOPR.png

HOPR makes it impossible, for any observer to see, who is exchanging data with whom, nor how many data or at which point in time.

 

STEALTH COM by HOPR is obfuscating any metadata, and provides protection for any data in transit. STEALTH COM is complementing existing security measures which focus on data encryption.

PROBLEM

In today's world, it is no longer enough to send data in encrypted form. Metadata now reveals as much information about you and your connection as an open letter. You are sharing your data with INTERNET SERVICE PROVIDERS, and AUTONOMOUS SYSTEMS. That's why we need to supplement existing encryption with metadata protection.

Exposing your counterparties' data & metadata is dangerous! Data you send & receive, strips away the confidentiality of your relationships!

FURTHER EXAMPLES OF PRIVACY PROBLEMS IN OUR CURRENT-DAY WORLD

2’230 different companies, on average, share data on each user!

Source:

25 Jan 2024

Custom audiences allow advertisers to upload customer lists to META, often including identifiers like email addresses and mobile advertising IDs. These customers… can then be targeted with ads on META’s platforms (facebook, instagram, threads)

The other category of
data collection, “events,” describes interactions that the user had with a brand, which can occur outside of META’s apps and in the real world.

… the META Pixel …is… used
to surveil people as they dial suicide hotlines, buy their groceries, … and book appointments with their doctors … even if the user doesn’t have an account on Facebook.

Element 1_2x.png

The importance of metadata
such as your IP address

Source:

In a letter to the director of national intelligence … the senator … argued that “internet metadata” — logs showing when two computers have communicated, but not the content of any message — “can be equally sensitive” as the location data the F.T.C. is targeting.

25dc-nsa-zvtb-superJumbo_edited_edited.j

A true example of utilisation:
"LIDL" buys data from "iRoomba"

vacuum cleaning robots
to find out where its customers live.

FURTHER EXAMPLES:

Data Agency

Location Data

Ad-Targeting

HOPR Security Comparison

Data in Transport needs to be protected as well

SOLUTION:
Stealth Mode Communication

HOPR Team constructed a high security, cyber defense network, in order to protect the biggest assets of a everybody: Data!

Until today, there was no sufficient protection for data in transit!
After 4 years of research and development, the HOPR network is live and ready to protect, i.e.:
• Military Messaging
• Sensor Data

• API calls for Apps
• Emails

• ... any kind of data in transit

Regain exclusivity over your data!

HOPR takes data packets and splits them into many indistinguishable packets and mixes them with other, identically looking data packets.

SPHINX PACKET FORMAT

HOPR takes your messages and splits it into many, small indistinguishable packets. Now your message looks just like any other message from all other network participant. This makes it nearly impossible to track your message.

HOPR_Sphinx_Packet_Format.png

HOPR NETWORK

each packet can hop through our network - via a different route. No packet takes the same route, all are sent on different ways through the HOPR network until they reach their destination. Even if anybody would crack one of your packets, they would not be able to see the entire message.

hopr_Multi-hop_Animation_cropped.gif

HOPR MIXING

at each node / HOP, the HOPR mixnet combines your packets with packets from other HOPR users. In addition we change the order, for superior privacy.

HOPR_Private_cropped.gif

HOPR: THE MIX NODE

• Every message is split into indist-inguishable packets
• No node is able to see the entire message
• Each packet looks absolutely identical
• The packet going in, differs from packets going out
• Direct matching is impossible
• Variable latency added per packet
• Cover Traffic: additional packets are generated locally for strong privacy

 
TECH DETAILS:
Find out more about the HOPR protocol: click here

or read our HOPR docs

A GLOBAL NETWORK

Understand more about our
global decentralized network
of HOPR nodes.

_world-map-nodes-0401-3.png
Camo_0.5x.png

USE CASE: DEFENSE INFRA

Dismounted commanders or drones use mobile data to communicate with their Tactical Operations Center. Although encrypted, the leaked metadata associated with the communication, incl. their geographic locations, creates an enormous risk for the entire defence.

When communicating through STEALTH COM on the contrary, the privacy of the entire communication-chain is maintained.

HOPR_Stealth_COM_6x.png

TECH ARCHITECTURE

Use the next level “VPN” built right into your military messaging!

HOPR can ensure the privacy
of all communication.
All messages sent are relayed through the HOPR network, achieving complete privacy & superior security!
 

This way, your communication ensures data confidentiality.

In a short 1 month project, all your customer data can be exclusively yours again
!

HOPR_API_Guard_Architecture.png

PROTECT YOUR COMMUNICATION NOW:

Your Data
is your biggest Asset!

Duration: 4-5 weeks for integration

Target: Web & mobile apps using web technologies

contact@HOPRnet.org

Send us a message and we will
be in touch shortly.

Many thanks! We’ll get back to you soon.

bottom of page