Popular topics

Explore all topics

Other helpful resources

Account usage

Your account page displays usage statistics of the Hopr sidecars you have deployed.

Frequently asked questions

Answers to the questions we hear most often.

Frequently asked questions

Can’t find the answer you’re looking for? Reach out to our customer support team.

Explore all FAQs

How is key generation for SEE™ synchronized?

Sidecars self-synchronize during secrets construction using their CHIPS™ algorithm. The client (the initiating workload) in a communication session builds its symmetric key first and the server (the workload receiving the encrypted client message) builds its symmetric key when the encrypted message is received (at nearly the same time as the client built its key).

Is CHIPS™ just another form of Time-based One Time Passwords (TOTP)?

No. There may be similarities, but CHIPS™ does not use time as an input value in secrets generation. Also, the CHIPS™ secret is ephemeral rather than “one-time.” And because of the SEE™ protocol, another trusted workload can generate the same key within a short period of time. TOTP cannot do this.

What encryption libraries does Hopr use for its Product’s Data Transport Security?

All data, whether stored or in-transit, is encrypted with FIPS 140-2 and -3 approved libraries and we use strong identity and access controls.

Stay in touch with us

Sign up for our awesome newsletter! No spam ever.

Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.