top of page

ABSOLUTE
ANONYMITY

High-end Cyber-Security

HOPR’s VPN is designed,
so observers can’t determine:
who is exchanging data or calling whom, from where, or when.
 
By obfuscating metadata end to end—via multi-hop routing, uniform Sphinx packets, mixing, and cover traffic—it hides communication patterns while protecting data in transit, complementing existing security measures that focus primarily on payload encryption.

PROBLEM

In today's world, it is no longer enough to send data in encrypted form. Metadata now reveals as much information about you and your connection as an open letter. You are sharing your data with INTERNET SERVICE PROVIDERS, and AUTONOMOUS SYSTEMS. That's why we need to supplement existing encryption with metadata protection.

Exposing your counterparties' data & metadata is dangerous! Data you send & receive, strips away the confidentiality of your relationships!

FURTHER EXAMPLES OF PRIVACY PROBLEMS IN OUR CURRENT-DAY WORLD

2’230 different companies, on average, share data on each user!

Source:

25 Jan 2024

Custom audiences allow advertisers to upload customer lists to META, often including identifiers like email addresses and mobile advertising IDs. These customers… can then be targeted with ads on META’s platforms (facebook, instagram, threads)

The other category of
data collection, “events,” describes interactions that the user had with a brand, which can occur outside of META’s apps and in the real world.

… the META Pixel …is… used
to surveil people as they dial suicide hotlines, buy their groceries, … and book appointments with their doctors … even if the user doesn’t have an account on Facebook.

Element 1_2x.png

Why quantum-grade encryption is not enough:

Importance of Metadata Anonymity

- It hides content, not metadata. Who talks to whom, when, how often, and how much data—those patterns remain visible without extra measures (mixing, cover traffic, multi-hop routing).
- Traffic analysis still works. Timing/volume correlations can deanonymize users even with perfect crypto.
- Side channels & linkage. Fingerprints, session IDs, and IPs can link sessions/users despite strong ciphers.
- Single-hop trust. With VPNs/TLS you still trust an operator; strong ciphers don’t remove that centralized visibility.
- Forward secrecy ≠ future secrecy. Post-quantum helps against decryption later, but doesn’t address live metadata leakage today.

Example:

Imagine you’re at a café watching a chocolate shop. You don’t know anyone, yet simply seeing who enters and leaves lets you infer they bought chocolate. Bag size hints at how much they purchased; spotting identical bags down the street reveals others who likely bought there earlier. That’s metadata: who, when, how often, and how much—insights gained without ever seeing what’s inside the bag. Now swap “chocolate shop” for a bank, clinic, or any place you’d rather not be linked to; the same metadata can expose sensitive behavior.

Metadata-private interaction breaks this link: observers can’t connect you to a place, time, or volume of activity, and your actual content (the “chocolate”) remains protected too, this is the advantage of metadata anonymity.

The importance of metadata
such as your IP address

Source:

In a letter to the director of national intelligence … the senator … argued that “internet metadata” — logs showing when two computers have communicated, but not the content of any message — “can be equally sensitive” as the location data the F.T.C. is targeting.

25dc-nsa-zvtb-superJumbo_edited_edited.j

A true example of utilisation:
"LIDL" buys data from "iRoomba"

vacuum cleaning robots
to find out where its customers live.

FURTHER EXAMPLES:

Data Agency

Location Data

Ad-Targeting

HOPR Security Comparison

Data in Transport needs to be protected as well

hoprnet_VPN_Comparision.png

SOLUTION:
Stealth Mode Communication

HOPR Team constructed a high security, cyber defense network, in order to protect the biggest assets of a everybody: Data!

Until today, there was no sufficient protection for data in transit!
After 4 years of research and development, the HOPR network is live and ready to protect, i.e.:
• Military Messaging
• Sensor Data

• API calls for Apps
• Emails

• ... any kind of data in transit

Regain exclusivity over your data!

HOPR takes data packets and splits them into many indistinguishable packets and mixes them with other, identically looking data packets.

SPHINX PACKET FORMAT

HOPR takes your messages and splits it into many, small indistinguishable packets. Now your message looks just like any other message from all other network participant. This makes it nearly impossible to track your message.

HOPR_Sphinx_Packet_Format.png

HOPR NETWORK

each packet can hop through our network - via a different route. No packet takes the same route, all are sent on different ways through the HOPR network until they reach their destination. Even if anybody would crack one of your packets, they would not be able to see the entire message.

hopr_Multi-hop_Animation_cropped.gif

HOPR MIXING

at each node / HOP, the HOPR mixnet combines your packets with packets from other HOPR users. In addition we change the order, for superior privacy.

HOPR_Private_cropped.gif

HOPR: THE MIX NODE

• Every message is split into indist-inguishable packets
• No node is able to see the entire message
• Each packet looks absolutely identical
• The packet going in, differs from packets going out
• Direct matching is impossible
• Variable latency added per packet
• Cover Traffic: additional packets are generated locally for strong privacy

 
TECH DETAILS:
Find out more about the HOPR protocol: click here

or read our HOPR docs

TECH ARCHITECTURE

Use the next level “VPN” built right into your military messaging!

HOPR can ensure the privacy
of all communication.
All messages sent are relayed through the HOPR network, achieving complete privacy & superior security!
 

This way, your communication ensures data confidentiality.

In a short 1 month project, all your customer data can be exclusively yours again
!

HOPR_API_Guard_Architecture.png

REQUEST DEMO:

Your Data
is your biggest Asset!

Send us a message and we will
be in touch shortly.

Many thanks! We’ll get back to you soon.

A GLOBAL NETWORK

Understand more about our
global decentralized network
of HOPR nodes.

_world-map-nodes-0401-3.png
bottom of page