Our primary product, RoadWarrior, consists of Virtual Private Network access, secure online storage and anonymous email.
RoadWarrior connects you to the Cryptohippie network, which is anonymous, thoroughly protected and globally distributed. It provides anonymity and gives our users very private access to standard Internet destinations, protecting both the content and context of your communications.
All of our Virtual Private Network connections are multi-hop, traveling throug at least two jurisdictions, and the routers deployed are operated by (at least) two separate companies that are incorporated in two different jurisdictions and have non-identical ownership.
It is easy to install and uses software that is compatible with Linux, Mac OS X, Windows, iOS and Android devices with open source clients. And it can be used on an unlimited number of devices simultaneously.
Learn more about RoadWarrior features here.
Standard contract: $199/year.
Cryptohippie Select is a custom service providing you with the best security and privacy available. It works on your iPad, iPod Touch and Max OS X. We configure your device to give you private email, protected web surfing, instant messaging, voice calls and a personal Bitcoin wallet, all of it running through Cryptohippie’s privacy network.
To do this, we assign you a personal connection to our network (we call this a Personal Virtual Router), then provide you with a curated list of applications, configurations and services for secure and private communication and Internet usage. High security and confidentiality are now available to non-specialists. And it comes from Cryptohippie, one of the oldest and most trusted privacy providers.
Combining state of the art VPN, virtualization, multi level access control and data encryption techniques, Opaque Servers are unique – and the best product available for theft resistant data storage and processing requirements. Our systems are protected against physical location attempts, data reads from storage media and even against potential leakage by datacenter or administration personal. Even our own staff can be excluded from accessing your data if you wish. Combining several Opaque Server nodes on a globally distributed network strongly increases reliability while our offsite encrypted backup solutions protect the data you depend upon.
Since our Opaque Server technology supports a variety of connection methods and applications, it can be used for many data processing scenarios. Examples include protected closed group email, messaging, database, key processing and certificate authority applications, file storage and critical business logic. Our consultants and administrators will gladly help you to specify and setup your systems and to find the ideal solution for your requirements.
Download the Opaque Server Flyer here.