Protect with hackers technology

For years, the Darknet has been used by hackers, and now we are giving you the same tools to be on an equal footing.

An issue as old as the internet

When TCP/IP was developed, it was intended for a trusted network. The 90s saw the emergence of attacks on TCP/IP protocols, already known in theory, but never put into practice. In response, the protocols were modified to be more robust against these attacks, or other higher-layer protocols such as SSL were introduced. TCP/IP, however, remained the norm. Despite these security additions, one weakness of TCP/IP is still not resolved today: service exposure.

With Chimere, your services are no longer accessible in the classic way, that is, through an IP address and port. Now, services are accessible via an intermediary: the Chimere network. This network's role is to securely interconnect your users and services. It does not host your data and is not capable of decrypting the messages that transit through it.

A solution in 4 components
  • A private darknet, fully managed by Chimere, which allows access to your secure services.
  • An administration console, called Darknet Manager, to administer and monitor your users and services.
  • A user agent, a software that allows users to connect to Chimere.
  • A transfer agent, another software that secures and makes your service available to your users.
4 Composants
A robust and proven technology for over 20 years

Your company's services are published within a network whose cryptographic mechanisms are inspired by darknet technologies. Thus, only holders of the cryptographic key are able to find the path to the associated service. This strong mechanism ensures that it is mathematically impossible for an attacker within the network to establish a connection with the service without knowledge of the key.

The darknet is a technology with a bad reputation, often used to hide illegal services and ensure the anonymity of their administrators. This participatory network is designed to be invulnerable to internal threats. This means that attackers can participate in the network without compromising its security or the services published within it. Thus, Chimere inherits these technical benefits and offers a secure and natively zero-trust remote access method.