Helix vs Signal
Signal is the best free, open-source messenger on earth — if you're an ordinary person who wants real privacy, use it. Helix is a different category: a closed, post-quantum operational-security suite for people who are actually targeted, and the teams around them.
| Helix | Signal | |
|---|---|---|
| Who it's for | High-risk targets, lawyers, family offices, executives | The general public |
| Identifier to reach you | None — closed, invite-only | Phone number required to register |
| Can strangers message you? | No — outsiders can't reach you | Yes, if they have your number |
| Post-quantum encryption | Full — handshake and ongoing ratchet | Partial — PQ added to the initial handshake (PQXDH) |
| Metadata protection | Multi-hop onion network, no third party sees both ends | Sealed sender, but routed through Signal's own servers |
| Third-party servers in the path | None — our own network | Signal-operated servers |
| Plausible deniability / hidden app | Yes | No |
| Hardened device option | Yes — GrapheneOS phone, locked down by us | No |
| Self-custody crypto wallet | Yes (BTC/ETH/USDT) | No |
| Voice & video calls | Yes — on our own transport | Yes |
| Open source | Design published for review | Yes, fully |
| Price | Paid license | Free |
The honest summary
Signal is free, open-source, audited, and run by a respected non-profit. For the overwhelming majority of people who want to escape ad-tech surveillance and casual interception, it's the right answer and we'll happily say so.
But Signal makes trade-offs that matter when you're a specific target. It's tied to a phone number, so your identity is anchored to a SIM and your contacts can be mapped. Its traffic flows through Signal's own servers — sealed sender hides a lot, but it's still a single operator that can be subpoenaed, blocked, or compelled. Its post-quantum protection currently covers the initial key agreement, not the full conversation lifetime. And it's a single-purpose chat app: no metadata-killing onion routing, no plausible deniability if your device is seized, no hardened hardware, no closed-network membership.
Where Helix is different
- Closed network. There is no phone number and no public directory. People reach you only if you add them. Strangers, spammers and scrapers simply have no way in.
- Metadata, not just content. Messages take a randomized multi-hop path across our own relays. No single node — and no third party — ever sees both ends.
- Post-quantum end to end. The full conversation, not just the opening handshake, is protected against "harvest now, decrypt later."
- Deniability and burn. A hidden app, nothing obvious to find at a border, and a one-tap wipe.
- Hardware when you need it. Run our GrapheneOS phone when the device itself is part of the threat model.