Is CHIPS™ just another form of Time-based One Time Passwords (TOTP)?
No. There may be similarities, but CHIPS™ does not use time as an input value in secrets generation. Also, the CHIPS™ secret is ephemeral rather than “one-time.” And because of the SEE™ protocol, another trusted workload can generate the same key within a short period of time. TOTP cannot do this.
What cybersecurity framework governs Hopr’s security controls?
Hopr’s Corporate and Development Securities Policies and Process Framework is based on the Center for Internet Security Inc. (CIS) Controls, Version 8. For instance, Hopr’s corporate (non-product development) processes and documentation are created, maintained and stored in a Google Business Cloud Space that is encrypted both in transit and at rest. Services such as remote video conferencing, email, partner collaboration, etc. are secured through the use of GoogleWorkspace.
How does Hopr ensure the security of its products throughout the development process?
We break barriers and open the collaboration across development, security, and operations using automation to focus on rapid, frequent delivery of secure infrastructure and production software. Hopr uses GitLab’s secure cloud development facilities as the DevSecOps development platform for our products. GitLab is a Software-as-a-Service (SaaS) that provides cloud-based secure environments especially tailored to product developments, testing, and code repositories for products such as hopr’s XTRA. Hopr’s GitLab data is encrypted both in transit and at rest.
Stay in touch with us
Sign up for our awesome newsletter! No spam ever.
Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.