Every capability

The whole arsenal.

Helix isn't one feature with a privacy sticker — it's a complete operational-security suite. Here's everything, grouped by what it does for you. Each layer removes something an adversary needs.

🔐 Encryption & protocol

Triple post-quantum handshake

A hybrid key agreement combining classical and two independent post-quantum families. Secure if any one survives — and built for the quantum era from day one.

Double cipher cascade

Every message sealed under two independent AEAD ciphers with separate keys. A future weakness in one doesn't expose your words.

Self-healing ratchet

Keys roll forward continuously and fold in fresh post-quantum material. Forward secrecy and post-compromise security — a transient breach heals itself.

Our own protocols

Handshake, transport and routing are all ours — nothing off-the-shelf for a pre-built exploit to target.

🌐 The network

Decentralized onion routing

Every message takes a fresh, randomized multi-hop path. No single relay sees both ends. Not Tor — our own network.

Fixed-size cells + cover traffic

Uniform packets and constant-rate noise defeat size and timing analysis.

Fail-closed tunnel

Nothing connects unless the secure tunnel is up first. Traffic never falls back to your real connection — ever.

No third parties

No external messaging backend, conferencing service or analytics SDK to subpoena, breach or mine.

Gigabit-class — not Tor-slow

High-bandwidth relays and a lean protocol move traffic at up to 2.5 Gbit/s. HD video, calls and big files arrive instantly — none of Tor's ancient, congested, few-Mbit/s crawl. Anonymity without a useless connection.

💬 Talk

Encrypted messaging

Instant, triple-encrypted text — one-to-one or in groups. Read receipts and typing stay on your device.

Global video calling

HD, low-latency video to anyone on Helix worldwide, on our own transport, triple-encrypted per frame. No conferencing third party.

Crystal-clear voice

Encrypted calls that sound like a normal line and route like nothing else. The screen confirms the moment it's secure.

Groups, teams & advisers

A secure group per matter, deal or team. Add clients, co-counsel, advisers and staff — all verified, no outsiders.

📂 Files & mail

🗎

Encrypted file storage & sharing

Contracts, evidence and media, end-to-end encrypted, stored only on devices you control. Dangerous file types are gated.

Disposable & private mail

Throwaway or kept inboxes, fetched through the tunnel and stored only on your device. Remote tracking content blocked.

₿ Money

Self-custody wallet

BTC, ETH and USDT. Keys are generated and sealed on your device — never leave it, never visible to us. We're not a custodian.

Inheritance-grade recovery

Split your seed with Shamir's secret sharing — any M-of-N shares rebuild it, fewer reveal nothing.

🕶 Stealth & safety

Hidden app & plausible deniability

On the surface there's nothing to see. Only your secret unlock reveals the real app. Cross borders clean.

One-tap burn

Instantly and irreversibly wipe the vault, identity, files and keys. Auto-locks the moment you switch away.

Anti-AI & harvesting-proof

No telemetry, no ML SDKs, no cloud scanning. No model ever sees your messages, voice, video or files.

Screenshot & recording block

Screen capture and recording are blocked where the OS allows; the clipboard self-wipes.

Global travel & border safety

Nothing obvious to find, a tunnel that never leaks your real connection, and a burn that leaves nothing behind.

Isolated realms

Keep work, family and clients in cryptographically separated worlds that never bleed into each other.

🕵 Tradecraft — the full kit

Built-in private VPN

A real VPN baked into the app — our network, not some "free" service that sells your traffic. Our own relays, our own protocol, and zero logs by design: the network and systems are built so there's nothing to keep, hand over, or leak.

🌍

Choose your exit country

Surface somewhere else. Pick the country your traffic appears to come from, across privacy-friendly regions — your real location stays yours.

🎲

Rotating exit IP

On Operator and up, your outbound address rotates, so you're not a fixed dot anyone can pin and follow.

🕶

Secret in-app browser

A built-in browser that keeps zero history, runs every request through the tunnel, and blocks WebRTC and tracking leaks. Browse like you were never there.

Verified contacts

Confirm a contact's identity out-of-band before you ever talk. No impersonation, no man-in-the-middle, no "is this really them?"

Disappearing messages

Set messages to self-erase on a timer. What's said doesn't have to stay said.

Constant-rate cover traffic

The network keeps a steady hum of decoy traffic, so an observer can't tell when you're actually active or silent.

Compliance & export mode

For legal teams that must retain: optional, off-by-default encrypted records you can export — on your terms, never ours. Privacy by default, accountability when you choose it.

💻 Devices & platforms

Runs everywhere

Windows, macOS and any Linux computer, plus iOS, Android and GrapheneOS. Beautiful on desktop, laptop and phone.

Helix Hardened Phone

A Pixel running GrapheneOS, locked down by us with Helix pre-installed — for when the device itself is the threat. Shipped worldwide.

Two seats, easy rollover

One license = one mobile + one desktop seat. Move to a new device and the old one deactivates itself.

Live license countdown

The app shows days remaining and reminds you to renew, so you never lose access.

🪙 Pay & licensing

Crypto, non-custodial

Pay with BTC, ETH or USDT straight to the wallet — no processor, no account, no email.

Fixed, published pricing

Three tiers, annual or 3/6-month terms. No negotiation, no surprises. Buy it or don't.

Get HelixWhy it matters