Hoody requires users to pass through at least one relay before reaching their desired location. The performance impact is negligible because Hoody automatically selects the nearest relay, ensuring low latency.
Hoody Network operates all relays and maintains zero logs of any activity. Our servers run directly in RAM and always strive to enable TLS 1.3 and best encryption practices. This ensures that even if forced to monitor traffic, we cannot do so due to end-to-end encryption.
Connecting directly to your exit IP (VPN) without a relay is risky, as your ISP permanently stores the trail.
Hoody assumes that ISPs are continuously monitored and user traffic data is stored by government entities. It's also safe to presume that most data centers are under surveillance. By strategically routing traffic through servers in different jurisdictions and employing distinct encryption mechanisms at each hop, you significantly increase the difficulty for anyone attempting to correlate and trace your traffic.
This multi-layered approach leverages varying data protection laws and creates a complex network of legal and technical barriers, effectively making it extremely challenging to determine the true origin of the traffic.
Hoody Relays employ state-of-the-art server infrastructure to ensure optimal performance and security:
This unique approach enhances both security and performance, even in the eventuality of Hoody servers being seized by a competent authority, they wouldn't be able to deduce anything.
Access to the KVM that manages Hoody Servers is restricted to a select few staff members. Direct SSH access is disabled to ensure the highest level of security and minimize potential vulnerabilities.