The whole arsenal.
Helix isn't one feature with a privacy sticker — it's a complete operational-security suite. Here's everything, grouped by what it does for you. Each layer removes something an adversary needs.
🔐 Encryption & protocol
Triple post-quantum handshake
A hybrid key agreement combining classical and two independent post-quantum families. Secure if any one survives — and built for the quantum era from day one.
Double cipher cascade
Every message sealed under two independent AEAD ciphers with separate keys. A future weakness in one doesn't expose your words.
Self-healing ratchet
Keys roll forward continuously and fold in fresh post-quantum material. Forward secrecy and post-compromise security — a transient breach heals itself.
Our own protocols
Handshake, transport and routing are all ours — nothing off-the-shelf for a pre-built exploit to target.
🌐 The network
Decentralized onion routing
Every message takes a fresh, randomized multi-hop path. No single relay sees both ends. Not Tor — our own network.
Fixed-size cells + cover traffic
Uniform packets and constant-rate noise defeat size and timing analysis.
Fail-closed tunnel
Nothing connects unless the secure tunnel is up first. Traffic never falls back to your real connection — ever.
No third parties
No external messaging backend, conferencing service or analytics SDK to subpoena, breach or mine.
Gigabit-class — not Tor-slow
High-bandwidth relays and a lean protocol move traffic at up to 2.5 Gbit/s. HD video, calls and big files arrive instantly — none of Tor's ancient, congested, few-Mbit/s crawl. Anonymity without a useless connection.
💬 Talk
Encrypted messaging
Instant, triple-encrypted text — one-to-one or in groups. Read receipts and typing stay on your device.
Global video calling
HD, low-latency video to anyone on Helix worldwide, on our own transport, triple-encrypted per frame. No conferencing third party.
Crystal-clear voice
Encrypted calls that sound like a normal line and route like nothing else. The screen confirms the moment it's secure.
Groups, teams & advisers
A secure group per matter, deal or team. Add clients, co-counsel, advisers and staff — all verified, no outsiders.
📂 Files & mail
Encrypted file storage & sharing
Contracts, evidence and media, end-to-end encrypted, stored only on devices you control. Dangerous file types are gated.
Disposable & private mail
Throwaway or kept inboxes, fetched through the tunnel and stored only on your device. Remote tracking content blocked.
₿ Money
Self-custody wallet
BTC, ETH and USDT. Keys are generated and sealed on your device — never leave it, never visible to us. We're not a custodian.
Inheritance-grade recovery
Split your seed with Shamir's secret sharing — any M-of-N shares rebuild it, fewer reveal nothing.
🕶 Stealth & safety
Hidden app & plausible deniability
On the surface there's nothing to see. Only your secret unlock reveals the real app. Cross borders clean.
One-tap burn
Instantly and irreversibly wipe the vault, identity, files and keys. Auto-locks the moment you switch away.
Anti-AI & harvesting-proof
No telemetry, no ML SDKs, no cloud scanning. No model ever sees your messages, voice, video or files.
Screenshot & recording block
Screen capture and recording are blocked where the OS allows; the clipboard self-wipes.
Global travel & border safety
Nothing obvious to find, a tunnel that never leaks your real connection, and a burn that leaves nothing behind.
Isolated realms
Keep work, family and clients in cryptographically separated worlds that never bleed into each other.
🕵 Tradecraft — the full kit
Built-in private VPN
A real VPN baked into the app — our network, not some "free" service that sells your traffic. Our own relays, our own protocol, and zero logs by design: the network and systems are built so there's nothing to keep, hand over, or leak.
Choose your exit country
Surface somewhere else. Pick the country your traffic appears to come from, across privacy-friendly regions — your real location stays yours.
Rotating exit IP
On Operator and up, your outbound address rotates, so you're not a fixed dot anyone can pin and follow.
Secret in-app browser
A built-in browser that keeps zero history, runs every request through the tunnel, and blocks WebRTC and tracking leaks. Browse like you were never there.
Verified contacts
Confirm a contact's identity out-of-band before you ever talk. No impersonation, no man-in-the-middle, no "is this really them?"
Disappearing messages
Set messages to self-erase on a timer. What's said doesn't have to stay said.
Constant-rate cover traffic
The network keeps a steady hum of decoy traffic, so an observer can't tell when you're actually active or silent.
Compliance & export mode
For legal teams that must retain: optional, off-by-default encrypted records you can export — on your terms, never ours. Privacy by default, accountability when you choose it.
💻 Devices & platforms
Runs everywhere
Windows, macOS and any Linux computer, plus iOS, Android and GrapheneOS. Beautiful on desktop, laptop and phone.
Helix Hardened Phone
A Pixel running GrapheneOS, locked down by us with Helix pre-installed — for when the device itself is the threat. Shipped worldwide.
Two seats, easy rollover
One license = one mobile + one desktop seat. Move to a new device and the old one deactivates itself.
Live license countdown
The app shows days remaining and reminds you to renew, so you never lose access.
🪙 Pay & licensing
Crypto, non-custodial
Pay with BTC, ETH or USDT straight to the wallet — no processor, no account, no email.
Fixed, published pricing
Three tiers, annual or 3/6-month terms. No negotiation, no surprises. Buy it or don't.