First Web3 App Store

Wallets can pick & choose services, RPC providers and chains within a matter of clicks through the ONE admin panel.

  • Check icon

    Open platform scaling web3 infrastructure

  • Check icon

    Wallets earn 25% of all MEV revenue their users generate

  • Check icon

    ZK chains & apps benefit from 100% full-stack privacy


RPCh BETA
Get in touch
Docs
RPCh blue Shield, Wallet Privacy powered by HOPR

How Scaling Becomes a
One Click Thing


Co-creation
at its best!
MEV
Users love ONE as they receive 75% MEV revenue share. Wallets love ONE as they receive 25% of the MEV revenue share of all of their users.
VALUE-ADDING SERVICES
Scam protection, Gas optimization, Transaction Simulation and many other services use our marketplace to seamlessly integrate their services into crypto wallets. ONE makes it easier for wallets to integrate their services by offering them all within a single integration into ONE.
Additionally, ONE allows them to increase revenue and scale more easily by handling all invoicing and financial admin.
WALLETS
Use ONE because they are able to integrate many value adding services with 1 click: MEV revenue share, Tenderly, GasHawk or security & scam checkers, are all available through the ONE Admin Panel.
RPCs
Are able to offer this open platform to all their current clients and realize a higher margin - because RPCh calls are not only secure, but also protect the user’s IP address (much better than any Proxy or VPN, thanks to HOPR).
L1s/L2s
Hundreds of blockchains pay for integration and are thus able to scale to many crypto wallets with one click.

VPN/Proxy vs RPCh Beta


VPNs/Proxies are centralized solutions with limited privacy offerings when compared to even a feature incomplete version of RPCh: RPCh Beta.


VPN/Proxy
RPCh Beta
  • Centralized – have to trust the VPN/Proxy provider not to harvest or abuse your data
  • Decentralized with layered encryption – only you can correlate your IP address to your request/response; no other intermediary or entity
  • Data is easily distinguishable to an observer
  • Data is segmented and formatted into standardized Sphinx packets making them indistinguishable to an observer
  • Only one intermediary making it easy for an observer or the server (RPC provider) to link it to the client
  • Data is routed through an entry/exit node instead of a single proxy
  • Usually static, with even dynamic VPNs/Proxies being very limited in their range and rotation rate
  • Dynamic routing with each individual request receiving a different combination of entry/exit nodes; imagine a VPN/Proxy that changed more than ten times a second
VPN/Proxy
  • Centralized – have to trust the VPN/Proxy provider not to harvest or abuse your data
  • Data is easily distinguishable to an observer
  • Only one intermediary making it easy for an observer or the server (RPC provider) to link it to the client
  • Usually static, with even dynamic VPNs/Proxies being very limited in their range and rotation rate
RPCh Beta
  • Decentralized with layered encryption – only you can correlate your IP address to your request/response; no other intermediary or entity
  • Data is segmented and formatted into standardized Sphinx packets making them indistinguishable to an observer
  • Data is routed through an entry/exit node instead of a single proxy
  • Dynamic routing with each individual request receiving a different combination of entry/exit nodes; imagine a VPN/Proxy that changed more than ten times a second



VPNs/Proxies vs feature complete RPCh


A more feature-complete version of RPCh provides privacy and security in metrics that VPNs/Proxies don’t address at all.


VPN/Proxy
RPCh Feature Complete
  • No protection against data tampering
  • Light client verification to protect against data tampering and maintain response integrity
  • No protection against traffic analysis
  • Packet mixing and background noise to obscure traffic movement completely
VPN/Proxy
  • No protection against data tampering
  • No protection against traffic analysis
RPCh Feature Complete
  • Light client verification to protect against data tampering and maintain response integrity
  • Packet mixing and background noise to obscure traffic movement completely