top of page

HIGH-END
CYBER-SECURITY

Protected API Calls

API GUARD_01B.png

HOPR makes it impossible, for any observer to see, who is exchanging data with whom, nor how many data or at what time. API Guard by HOPR is completely obfuscating any metadata such as IP addresses.
 

HOPR API Guard provides transport metadata protection for HTTP API calls. API Guard is complementing existing security measures which focus on data encryption.

PROBLEM

Each time you are using your mobile phone or your laptop at home or in your company, you are sharing
your personal and also your  professional data with INTERNET SERVICE PROVIDERS, and AUTONOMOUS SYSTEMS.

Exposing your clients data & metadata is dangerous! Data you send & receive, strips away the exclusivity of your customer relationships:
your customer list is publicly available!

(facebook & professional marketing agencies will influence & steal your clients)

CYBER CRIME COSTS

• 1 in 3 SMEs has already suffered from severe attacks with heavy costs
• Global Cybercrime Damage Costs in 2022
= $7’000’000’000’000 USD (would be the third largest economy after USA and China
•Expected to grow by 2025 to 10.5 trillion US$

Source:

FURTHER EXAMPLES OF PRIVACY PROBLEMS IN OUR CURRENT-DAY WORLD

2’230 different companies, on average, share data on each user!

Source:

25 Jan 2024

Custom audiences allow advertisers to upload customer lists to META, often including identifiers like email addresses and mobile advertising IDs. These customers… can then be targeted with ads on META’s platforms (facebook, instagram, threads)

The other category of
data collection, “events,” describes interactions that the user had with a brand, which can occur outside of META’s apps and in the real world.

… the META Pixel …is… used
to surveil people as they dial suicide hotlines, buy their groceries, … and book appointments with their doctors … even if the user doesn’t have an account on Facebook.

Element 1_2x.png

The importance of metadata

such as your IP address:

Source:

Blindtext

In a letter to the director of national intelligence … the senator … argued that “internet metadata” — logs showing when two computers have communicated, but not the content of any message — “can be equally sensitive” as the location data the F.T.C. is targeting.

25dc-nsa-zvtb-superJumbo_edited_edited.j

A true example of utilisation:
"LIDL" buys data from "iRoomba"

vacuum cleaning robots
to find out where its customers live.

Further Examples:

Data Agency

Location Data

Ad-Targeting

HOPR Security Comparison

Data in Transport needs to be protected as well

SOLUTION: Protected API Calls

HOPR Team constructed a high security, cyber defense network, in order to protect the biggest assets of a company:
not only their clients, but all data & metadata, which are sent or received from your company!

After 4 years of research and development, the HOPR network is live and ready to protect:
• API calls for mobile Apps
• Emails
• and more…

Regain exclusivity over your client list!

HOPR takes data packets and splits them into many indistinguishable packets and mixes them with other, identically looking data packets.

SPHINX PACKET FORMAT

HOPR takes your messages and splits it into many, small indistinguishable packets. Now your message looks just like any other message from all other network participant. This makes it nearly impossible to track your message.

HOPR_Sphinx_Packet_Format.png

HOPR NETWORK

each packet can hop through our network - via a different route. No packet takes the same route, all are sent on different ways through the HOPR network until they reach their destination. Even if anybody would crack one of your packets, they would not be able to see the entire message.

hopr_Multi-hop_Animation_cropped.gif

HOPR MIXING

at each node / HOP, the HOPR mixnet combines your packets with packets from other HOPR users. In addition we change the order, for superior privacy.

HOPR_Private_cropped.gif

HOPR: THE MIX NODE

• Every message is split into indist-inguishable packets
• No node is able to see the entire message
• Each packet looks absolutely identical
• The packet going in, differs from packets going out
• Direct matching is impossible
• Variable latency added per packet
• Cover Traffic: additional packets are generated locally for strong privacy

A GLOBAL NETWORK

Understand more about our
global decentralized network
of HOPR nodes.

_world-map-nodes-0401-3.png

USE CASE: PRIVATE BANK

Clients use WhatsApp & WeChat in order to communicate with their advisor. This creates enormous privacy risk for the client,
but also for the Private Bank,
as all clients and their data
is exposed to the internet.

The Private Bank also has no exclusivity of their customer list!

HOPR_Api_Guard_6x.png

TECH ARCHITECTURE

Use the next level “VPN” built right into your apps!

HOPR can ensure the privacy
of all client communication.
All messages sent in the chat
are relayed through the HOPR network, achieving complete privacy & superior security!
 

This way, your service adheres
to all compliance laws and ensures data confidentiality.


In a short 1 month project, all your customer data can be exclusively yours again
!

HOPR_API_Guard_Architecture.png

PROTECT YOUR ASSETS NOW:

Your Clients
are your biggest Asset!

Duration:
4-5 weeks for integration

Target: Web & mobile apps 

contact@HOPRnet.org

Send us a message and we will
be in touch shortly.

Many thanks! We’ll get back to you soon.

bottom of page