Skip to content

Technologies we use, and why choose us over other options

In a huge market saturated by big corporations (ReCaptcha, hCaptcha, FunCaptcha, Akamai, Datadome, PerimtierX, etc.) and other startups, we are the only ones to offer a transparent privacy policy & a free plan.

We use state-of-the-art technologies unused by our competitors, which we will describe below.

NOTE: Due to the nature of our product, we cannot disclose all the technologies we use.

xxl-VM

xxl-VM in simple terms is a virtual machine that is used to run the verification process on the client-side. It is a top performing obfuscation method that is used to prevent malicious third parties from reverse engineering our code.

We implement technologies unlike other VM-based obfuscation techniques, such as;

xxl-VM Other VMs
Encrypted Heap Memory Raw memory data
In-line encrypted bytecode Raw bytecode
Instruction scrambling Pre-defined instruction set
Just-In-Time compilation ---
Dynamic instruction set generation ---
In-House State Machine & task delegator ---
Nested VMs ---
Various other methods, which we can not diclose at this time. ---

This offers unparalleled security without compromising performance due to the use of JIT compilation. All of our products use xxl-VM, and in the future we plan on releasing it as a standalone product.

Comparison:

xxl-VM Other VMs No VM obfuscation
click to see snippet click to see snippet click to see snippet

rHash & rSnark

rHash is a hashing algorithm that we developed in-house, it is used for various of our products, including iocaptcha, iosecure and ioshield. It is based on RandomX, which is a hashing algorithm used by the Monero cryptocurrency for proving holdings, without revealing the holdings themselves.

Here, we use it to prove that the client is a real user, without revealing any information about the client, providing excellent privacy with no compromises.

Similarly, rSnark is a zero-knowledge proof system that we developed in-house, which performs a similar task.

rCipher

rCipher is a cipher that is also based on RandomX, however it is converted from a hashing-algorithm into a cipher.

Due to the nature of our products, we cannot disclose the exact details of how it works.

ioTunnel

ioTunnel is a protocol based on HTTP(/s) that is used to communicate between the client and the server.

We developed ioTunnel in mind to prevent from information snooping and reverse engineering of the data being sent. Information is encrypted, signed and hashed with proprietary algorithms.