SEE™ is complete end-to-end encryption over the entire route between trusted workloads and the encryption can only terminate at trusted workload endpoints. mTLS is not supported everywhere in the cloud. It may terminate at any "boundaries" that occur where PKI credential authorities differ (e.g., the entry to a cloud). And techniques exist for both good and bad actors to remove TLS encryption. This can leave transport layer security gaps and disclose message data.
SEE™ relies on workload identity trust verification at the start of each communication session. mTLS in the cloud relies on automated PKI identity certificates which are generated without vetting the receiving workload identity. They lack the verification of workload trust that is necessary for SEE™. SEE™ is also much simpler and faster to implement. It does not involve the complexity of setting up PKI certificate authorities and managers, or key management systems, or secrets managers.
What is Hopr’s product security testing process?
Hopr employs continuous security testing from initial development and throughout the CE/CI lifetime of its product lines. In addition to GitLab’s state-of-the-art secure software development tools, GitLab’s code scanning processes, such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Container Scanning, and Dependency Scanning can quickly identify the latest known security vulnerabilities in Hopr’s product code throughout the DevSecOps cycles.
What encryption libraries does Hopr use for its Product’s Data Transport Security?
All data, whether stored or in-transit, is encrypted with FIPS 140-2 and -3 approved libraries and we use strong identity and access controls.
Stay in touch with us
Sign up for our awesome newsletter! No spam ever.
Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.