🚀 ALPHA PREVIEW

Your Phone Number
Should Stay
Private

Hesha Protocol lets you prove phone ownership without revealing your actual number. Save millions on SMS costs while protecting user privacy.

Your Real Number:
+1 (555) 123-4567
Your Proxy Number:
+1-001-234-5678

Your Phone Number is Everywhere

And that's a massive privacy problem

Privacy Problem Visualization

Proxy Addresses Work for Email

Why not for phone numbers too?

📱

Phone Proxies (Hesha)

Now you can have proxy phone numbers:

  • Your proxy: +1-001-234-5678
  • Verifiable: Cryptographic proof
  • Permanent: Use everywhere

✅ Same privacy, for phone numbers

If we can protect our email addresses with proxies, why are we still sharing our permanent, unchangeable phone numbers with every service?

The Hesha Solution

Privacy-preserving phone verification through cryptographic proxy numbers

🔐
Unforgeable Proofs
🌐
Universal Compatibility
Offline Verification

How Hesha Works

From phone verification to privacy protection in 4 simple steps

01

Verify Once, Forever

Prove phone ownership to a trusted issuer. This is the only time you share your real number.

  • Choose your issuer
  • Standard SMS verification
  • One-time process
One-time verification
02

Get Your Proxy

Receive a unique proxy number that looks real but reveals nothing about your actual number.

  • Cryptographically generated
  • Permanently yours
  • Privacy protected
Generate proxy number
03

Digital Certificate

Get a cryptographic attestation proving you own a verified phone number.

  • Unforgeable signature
  • Works offline
  • Never expires
Receive attestation
04

Use Everywhere

Share your proxy number with any service. They verify it cryptographically.

  • Universal acceptance
  • Zero spam risk
  • Total privacy control
Share your proxy

Instant Cryptographic Verification

Services verify your proxy number using the issuer's public key - no phone calls or SMS needed

Verification flow

Who Should Implement Hesha

Services that need phone verification without the privacy liability

💬

Messaging Apps

Signal, WhatsApp, Telegram

Verify users are real without collecting phone numbers. Even privacy-focused apps currently require real numbers - Hesha changes that.

Benefit: True end-to-end privacy
🛍️

Online Marketplaces

eBay, Facebook Marketplace, Craigslist

Enable buyer-seller communication without exposing personal phone numbers. Reduce harassment and maintain user trust.

Benefit: Safe transactions
💕

Dating Platforms

Tinder, Bumble, Hinge

Let users connect safely before sharing personal info. Verify real people without compromising privacy during early interactions.

Benefit: User safety first
🏠

Rental & Gig Platforms

Airbnb, Uber, TaskRabbit

Enable host-guest or driver-rider communication without exposing personal numbers. Protect both parties' privacy.

Benefit: Trust without exposure
🎮

Gaming & Social

Discord, Steam, Twitch

Verify real users to prevent bots and spam without collecting personal data. Build trust in your community.

Benefit: Bot-free communities
🔐

Privacy Services

VPNs, Encrypted Email, Privacy Tools

Verify users without contradicting your privacy mission. Prevent abuse while respecting user anonymity.

Benefit: True privacy alignment

How Easy Is Integration?

Just add one check to your existing phone verification flow and start saving immediately

📱

User Enters Number

User provides either a regular phone number or a Hesha proxy number

🔍

Is it a Hesha Number?

Simple pattern check: does it contain "00" after country code?

if (number.matches("+*00*")) { /* Hesha */ }

Verify Accordingly

Regular Number: Send SMS as usual
Hesha Number: Verify JWT signature
No new infrastructure needed
Works with your existing system
One simple if/else statement
Help Us Build Integration Tools

Share your integration needs and use cases

Zero SMS Infrastructure Needed

No SMS gateway setup, no per-message fees, no delivery failures

Traditional Phone Verification

  • 🔌 SMS gateway integration
  • 💸 Pay per SMS sent
  • 🌍 International SMS complexity
  • ❌ SMS delivery failures
  • 🚫 Users get spam after data leaks
  • ⏱️ Rate limiting headaches

Hesha Protocol

  • ✅ Just verify a JWT signature
  • ✅ Zero ongoing costs
  • ✅ Works globally instantly
  • ✅ Always works offline
  • ✅ Users keep their privacy
  • ✅ No infrastructure needed

How It Works

👤

User Gets Hesha Number

User pays issuer once to verify their phone and get a proxy number

🔑

User Shares With You

They provide proxy number + attestation when signing up

You Verify Signature

Check the JWT signature - that's it. No SMS needed.

Become a Hesha Issuer

Run an issuer node, verify phone numbers, and earn revenue

Become an Issuer
💼

Potential Revenue

Issuers can charge for attestation services. Early partners will help define the business model and pricing structure.

🔧

Build on Your Infrastructure

If you already verify phone numbers, you can extend your service to issue privacy-preserving attestations.

🌍

Global Impact

Help protect user privacy worldwide. Be part of the decentralized identity revolution while building a profitable service.

Built on Solid Foundations

Industry-standard cryptography, no proprietary magic

🔑

Ed25519

Modern elliptic curve signatures for unforgeable attestations

🔐

SHA-256

Cryptographic hashing ensures phone numbers stay private

📜

JWT

Standard token format for maximum compatibility

🦀

Rust

Memory-safe implementation for security-critical code

Frequently Asked Questions

Is this like a burner phone number?

No, it's better. Burner numbers are temporary and tied to specific services. Hesha proxy numbers are permanent, cryptographically verifiable, and work everywhere.

Can services still verify I have a real phone?

Yes! That's the beauty of it. Services can cryptographically verify you own a real, verified phone number without ever seeing what that number is.

What if the issuer goes offline?

Services need to fetch the issuer's public key to verify attestations. Future versions will support key caching for better resilience.

Is this legal?

Absolutely. You're not hiding from law enforcement or evading regulations. You're simply choosing what personal information to share, which is your right.

Ready to Take Back Your Privacy?

Hesha Protocol is in alpha and we need your help to make it better

🔒 Privacy First 🌐 Decentralized 🔑 Verifiable 🛡️ Cryptographically Secure