Past ICOMar 25, 2019 – Apr 22, 2019
Honeypod is a privacy-focused device that connects to your router to remove ads and tracking systems from your entire home network while also rewarding you for browsing the web.
By investing in this ICO you agree to our Disclaimer
|Claim admin rights for this project|
|Project industry||Blockchain Infrastructure|
Honeypod is a smart hardware unit that is the size of your palm of your hand. It connects directly to your internet router with the intention of intercepting unwanted data, requests, and scripts from entering the internet connection of your device. By enabling a blocking system at the highest level page load speeds dramatically increase while at the same time detection of the hardware unit is impossible. Because Honeypod cannot be detected it cannot be stopped, blocked, or bypassed.
The landscape of the internet as we know it today is built entirely around hidden services that have the intention of tracking and monitoring a person's every move, who they are, what they look at, and who they associate with without acknowledgement or consent. While some of these services are invaluable to the website owners such as analytical information on the number of people that visit the owners website many are there to track your movements, internet usage, and capture data for their own profit and gain. This is not only harmful in the sense of personal privacy, but also in the bandwidth these hidden services consume on each and every page that is loaded. Inevitably leading to slower page loading times and increased mobile data cost to you.
Whether its Facebook tracking your every move or an advertiser monitoring the website content you read, the user should ultimately have the right to be the one who controls who has access to view, save, and sell the records of their private data and internet usage.
While we often think of 3rd party ad blockers as friends rather than foes, even ad blocking applications today aren't a safe solution. Not only do they require you to download an application they control but also download an application for each and every device that you own in which you then still don't have full access and control over it. Current ad blocking techniques require your browser to call back to them on every page load in order to request a "blacklist" for blocking ads and hidden services, leaving you in a situation where all of your data and browsing habits are still being sent to unknown entities. Once your information leaves your connection, all control you have is lost and placed in the hopeful trust of someone else.
75% of websites today have third-party or advertisement based tracking systems installed purposefully to monitor user activity. Google and Facebook for example build up detailed profiles on individuals as they move around the Web, assigning users unique identifiers so they can be recognized again over time regardless of where they are on the web very similar to a fingerprint identity that is assigned to you. Not of only what you search, see, read, and purchase, but also your location, times, dates, highly specific computer equipment information, and who you are associated with.
With hidden tracking mechanisms everywhere and hidden scripts added to pages without your knowledge, security and malware is also of a high concern. Without your knowledge malicious code can easily be placed on sites through advertisements without the website owner permission or your knowledge until it's too late leaving you with redirects, fake landing pages, and potentially fatal malware loaded on to your computer.
"Without trackers blocked, just 17% of pages loaded within five seconds. Over 60% took longer than 10 seconds, and nearly 5% took over a minute. When trackers were blocked, the average page load time dropped by over half."This means half the time waiting for a page to load and theoretically half the bandwidth required.
Ultimately the time has come that the internet user should be the sole owner and controller of their information while giving access to third parties at the sole discretion of the internet user.
When the web user retains control back into their own sphere amazing technologies now start to open up and become available. Honeypod should not necessarily be thought of as a blocking mechanism but rather an authentication system in which all data transferred through the system must be authenticated and approved. Mechanism such as parental controls system-wide or on specific devices, instant and immediate two-factor authentication, secure file sharing within your local Honeypod network of devices, caching of websites and files between all of your devices, and unlimited potential of immediate interconnectivity between all of the devices that you may own.
Honeypod is much more than a simple blocking tool. It is a complete authentication system for your internet life.
DetailsToken supply: 200,000,000
Soft cap: 2,000,000 USD
Hard cap: 10,000,000 USD
LegalRegistration country: United States
Token infoTicker: HNY
Token price in USD: 1 HNY= 0.05 USD
Accepted currencies: BTC,ETH,XLM
Tier 1: 0.02 USD
Tier 2: 0.025 USD
Tier 3: 0.03 USD
Tier 4: 0.035 USD
Token Sale: 0.05 USD
30% - Honeybox Trade System
30% - Inflation Control
20% - Market
8% - Strategic Partnerships
4% - Founder & Team
4% - Advisors
2% - Airdrop
2% - Bug bounties
37% - Marketing
25% - Maintenance, Research & Development
10% - Partnerships
10% - General Business Reserve
8% - General Operational
6% - Legal & Financial Counsel
4% - Events & Travel
Honeypod ICO Roadmap
Private Sale begins.
Public Sale Begins
Distribution of Tokens;
Honeybox Beta Hardware Shipment;
GSM Enabled Hardware;
Honeybox Partnerships Go Live on Honeybox Devices.
Child/Family-lock Access Control;
DNS Cache CDN File Sharing.
Between-device File Sharing;
Wireless Router Hardware.
Expansion Goal: Selling at Retail Locations.
How To get a verified Project status
To pass the verification you need to place a our logo on the main page of your website and make an announcement of the listing in your social network accounts. Send us the email in reply with confirmation of the link placement.