Post-quantum · AI-proof · Pegasus-proof

The comms tool for people
who can't be hacked.

Triple-encrypted messaging, voice and global video calling, secure file storage and private groups — for lawyers, legal teams, executives and the privacy-savvy. Built on our own protocols and our own encryption. Post-quantum safe. Harvesting-proof. Works beautifully on desktop, laptop and phone. IFYKYK.

Who it's for

Built for the people the world watches.

Helix isn't a consumer chat app with a privacy sticker. It's an operational-security tool for people whose words move money, careers, cases and lives — and the teams around them. When a single intercepted message can mean a leaked deal, a blown case, a market loss or a personal-safety threat, "good enough" encryption isn't.

High-net-worth individuals & families

Wealth attracts attention — from criminals, opportunists and data brokers. Helix keeps your conversations, locations and plans off every server and out of every breach, and protects your family the same way. If you're a kidnap, extortion or fraud target, this is the baseline.

Family offices

You coordinate lawyers, bankers, trustees and family across borders. One leaked thread exposes structures, holdings and intentions. Helix gives every party one closed, encrypted channel — no email chains, no third-party cloud, nothing to subpoena or breach.

Trading & investment firms

Positions, strategies and deal flow are market-moving and tightly regulated. Helix keeps sensitive comms confidential and tamper-evident, off any provider that can be compromised or compelled — so an edge stays an edge and never becomes a leak.

Lawyers & legal teams

Keep privilege actually privileged. Talk to clients, co-counsel and experts; spin up a secure group per matter; share filings and evidence without it ever touching a third-party server.

Executives, boards & journalists

Deal rooms, board decisions, and reporters protecting sources. No metadata trail, no third party that can be served, nothing on the device if it's seized.

Anyone with important communications

If your messages would matter in the wrong hands, they belong here. Maximum opsec, every day, without thinking about it. IFYKYK.

It's a closed network. Everyone you talk to runs Helix too. You add your clients, your team and your advisers and create groups; outsiders can't message you, can't call you, can't reach you. No phone number, no email, no way in unless you let them.

Our own onion network

Many hops. Fully decentralized.

Every message takes a fresh, randomized path across dozens of relays in different countries — five, six, seven hops deep. Each relay peels one layer and learns only the next; no single node ever sees both ends, and no route is reused. Not Tor. Not a third party. Ours.

And it's fast. High-bandwidth relays and a lean, modern protocol move traffic at up to 2.5 Gbit/s — so HD video, calls and large files arrive instantly. Tor is the opposite: ancient, congested, high-latency, often crawling at a few Mbit/s. Real anonymity shouldn't mean a useless connection. Ours doesn't.

randomized circuit · layer-encrypted · fixed-size cells + cover traffic
Youorigin · IP hidden
Reykjavikrelay · a1f93c20de
Zurichrelay · 7b40e1c8aa
Tallinnrelay · 3d9f0b6e51
Recipientrendezvous token
Afraid of Pegasus? Pegasus 2?

Then we're your only real answer.

Pegasus-class spyware beats ordinary "encrypted" apps because they're built on the same off-the-shelf parts everyone else uses, lean on third-party servers, and leak metadata. Helix is built the opposite way, from the ground up.

Our own protocols & encryption

Nothing off-the-shelf for an exploit to target. The handshake, the transport, the routing — all ours, layered and triple-encrypted.

Post-quantum safe

Safe against tomorrow's quantum computers and today's "harvest now, decrypt later." What's captured now stays unreadable.

AI-proof & harvesting-proof

No telemetry, no cloud, no machine-learning SDKs. No model ever sees your messages, your voice, your video or your files. Ever.

Closed & fail-closed

App-to-app only, behind a tunnel that fires before anything connects. Nothing reaches you off-network; nothing leaves in the clear.

Hardened device option

When the phone itself is the threat, run our GrapheneOS hardened handset — locked down by us, Helix pre-installed.

Seized? Nothing to find

Screenshots and recording blocked, clipboard self-wipes, and a one-tap burn that leaves nothing behind. Plausible deniability at the border.

We won't publish the depths we've gone to — that's the point. The short version: every layer an attacker would reach for, we built ourselves and locked down. IFYKYK.

Security is not optional in 2026

Privacy used to be a preference. Now it's survival.

You don't get to choose the moment you become interesting. A deal leaks, a case turns, the wrong person Googles your name — and suddenly every message you ever sent becomes evidence, leverage, or a map to the people you love. By then it's too late to start being careful. The only winning move is to already be protected.

"Free" is the most expensive plan there is.

If you aren't paying, your conversations are the product being sold. Helix sells software — not you.

Harvest now, decrypt later.

Everything you send today is being quietly stored to crack the day quantum computers arrive. "Encrypted" isn't "safe" if it's saved forever. Helix is post-quantum right now.

Your chat is only as secure as its sloppiest member.

One cloud backup, one screenshot, one compromised phone in the group and ordinary apps spill the lot. Helix is closed, locked, and burns on command.

They don't need to read your messages.

Who you talked to, when, how often, from where — metadata alone is enough to convict. Helix shreds it across its own network, so there's nothing to collect in the first place.

The people who wait until they need this are the people who needed it a year ago. Don't be the cautionary tale. IFYKYK.

Everything, encrypted

One tool. Everything you need to talk safely.

Encrypted messaging

Instant, triple-encrypted text — one-to-one or in groups. Read receipts and typing stay on your device; nothing is logged anywhere we (or anyone) could read it.

Global video calling

High-definition, low-latency video to anyone on Helix, anywhere in the world — built on our own transport, triple-encrypted per frame, no third-party conferencing service.

Crystal-clear voice

Encrypted calls that sound like a normal line and route like nothing you've used. The screen tells you the moment it's secure.

Groups, teams & advisers

Create a group per matter, deal or team. Add clients, co-counsel, advisers and staff. Everyone's verified; no one outside the group can see a thing.

🗎

File storage & safety

Send contracts, evidence and media encrypted end-to-end, stored only on devices you control. Dangerous file types are gated; nothing lands on a server we hold.

Our own decentralized network

Messages take a fresh, randomized multi-hop path across dozens of relays. No single node sees both ends. Not Tor — ours.

Built-in private VPN

A real VPN inside the app — our network, not a "free" service that sells your traffic. Pick your exit country; the network and systems log zero data by design. Nothing to keep, hand over, or leak.

Triple post-quantum encryption

Our own layered handshake and double cipher cascade. Safe against quantum computers and harvest-now-decrypt-later alike.

AI-proof & harvesting-proof

No telemetry, no ML SDKs, no cloud scanning. Keyboards forced to forget, clipboard self-wipes, screenshots and recording blocked.

Global travel & border safety

Cross borders clean. Plausible deniability on the surface, a one-tap burn, and a tunnel that never falls back to your real connection.

Closed, fail-closed network

App-to-app only. The tunnel fires before anything connects — no tunnel, no traffic. Outsiders simply cannot reach you.

Disposable & private mail

Throwaway or kept inboxes, fetched through the tunnel and stored only on your device, with remote tracking content blocked.

Burn on demand

One action wipes the vault, identity, files and keys — instantly and irreversibly. Auto-locks the moment you switch away.

3
encryption layers on every message
6
platforms — desktop, laptop & phone
0
third parties anywhere in the stack
0
trackers, telemetry or AI scanning
The honest comparison nobody else will print

Helix vs. “everyone else.”

We could bore you with a spec sheet. Instead, here's the same comparison with the marketing surgically removed.

 HelixThe “free” privacy apps
Business modelYou pay for a product.You are the product. Surprise.
Who reads your messagesNobody. Not even us — we built it so we literally can't.An ad engine, three “trusted partners,” and an AI being trained on your breakup.
For a stranger to reach you, they need…An invite. You don't exist to people you didn't add.Your phone number. Hi spammers, hi your ex, hi that recruiter from 2019.
Phone seized at the borderLooks like there's nothing there. Because there is nothing there.Your entire life, now showing on someone else's screen.
Quantum computersAlready handled. Boringly future-proof.“We'll, uh, patch that. Eventually. Pinky promise.”
MetadataShredded across our own multi-hop network.“We don't read your messages!”*they just know who, when, where and how often.
SpeedUp to 2.5 Gbit/s. HD video, instantly.Tor: proudly buffering since 2006.
Marketing budget$0. You're reading our entire ad campaign right now.$40M of influencers swearing it's totally private.

It's funny because it's true. The only question is who's laughing when it actually matters.

Get Helix See the serious comparisons
Plausible deniability · built by a cryptographer

A hidden app on your laptop, desktop and phone.

On the surface there is nothing to see. Helix sits hidden on your devices and only your secret unlock reveals the real app — so you cross borders clean, hand over a device, or lose it, with nothing to find. Fully encrypted end to end, designed from the ground up by a cryptographer. For good privacy — read the white paper and judge for yourself.

hidden app · no login screen · crosses borders clean · no trace
Why now

Security is not optional in 2026.

Open your last "private" chat and ask one question: who else could read this? If you can't answer with certainty, you already have your answer. Everything you send on an ordinary app is logged somewhere — to be read now, or quietly harvested today and broken by quantum computers tomorrow. The question was never whether you're worth targeting. It's what happens to you the day you are.

One tool replaces four

Messaging, calls, global video, mail, a self-custody wallet and a private VPN — in a single app. Cancel the scattered subscriptions quietly leaking your life across four companies.

We hold nothing

No accounts, no servers with your data, no keys. We couldn't hand over your messages if a court ordered us to — there is nothing to give. Privacy by architecture, not by promise.

No lock-in, no hostage

Pay in crypto, no email, no account. Stay because it's the best, not because we're holding your data. Walk away any time — there was never anything of yours to keep.

Chosen by people who can't be wrong

The lawyers, funds and families who already assume they're targets are quietly locking down. They're not waiting to find out the hard way. Neither should you.

Future-proof, today

"Harvest now, decrypt later" is a real strategy against you. Post-quantum from day one means what's captured today stays unreadable when the machines that could break it arrive.

Set up in minutes

Buy with crypto, get your key, install on phone and laptop. Maximum operational security shouldn't take a security team — and here it doesn't.

By the time you're sure you needed this, it's already too late to wish you'd had it. The cheapest insurance you'll ever buy is the message you sent before anyone was listening.

Licensing

One price. Buy it or don't.

A flat license fee, paid in crypto. No accounts, no email, no negotiation. Annual is the best value — 3- and 6-month terms are available at checkout. Every tier is one mobile seat and one desktop seat; roll to a new device and the old one deactivates itself.

Core

Helix Core

Everyday private comms for anyone who wants out of the surveillance net.

CHF 199 / year · or 3/6 mo
  • Triple post-quantum messaging, calls & mail
  • Self-custody BTC / ETH / USDT wallet
  • Shared onion + exit pool
  • Plausible-deniability cover & one-tap burn
  • 1 mobile + 1 desktop seat
Get Core
Operator

Helix Operator

For people who are actually a target. Your own egress.

CHF 999 / year · or 3/6 mo
  • Everything in Core
  • Dedicated rotating exit IP
  • Priority onion relays
  • Higher file & mail size limits
  • 1 mobile + 1 desktop seat
Get Operator
Sovereign

Helix Sovereign

Maximum isolation. Run your own relay pack.

CHF 2,499 / year · or 3/6 mo
  • Everything in Operator
  • Self-host relay pack
  • Multiple isolated realms
  • Maximum limits
  • 1 mobile + 1 desktop seat
Get Sovereign

Pay with BTC, ETH or USDT — settled non-custodially in Switzerland. Your license key appears the instant payment confirms.

Hardware · ships worldwide

Helix Hardened Phone

Don't want to trust your own device? Buy it done. A Google Pixel running GrapheneOS, hardened by us, with Helix pre-installed and verified — built to shrug off Pegasus-class spyware. Delivered discreetly, anywhere. A license is purchased separately.

CHF 1,499 one-time + shipping
Order the phone
Runs everywhere · afraid of Pegasus?

BYOD, or buy it bulletproof.

Helix runs great on every platform you already use. Bring your own device and install it in minutes — or, if you're a target and Pegasus-class spyware keeps you up at night, buy our GrapheneOS phone with the device itself locked down and Helix pre-installed.

Windows10 / 11 · portable
macOSApple silicon & Intel
Linuxany distro, any computer
iOSiPhone & iPad
Androidany modern device
GrapheneOSbuy it hardened

Same end-to-end encryption and onion network on every platform. BYOD costs you nothing extra — the hardened phone is for when the device itself is part of the threat model.

Install

Get it on your devices.

Install Helix, then unlock with your secret on first run. Verify the SHA-256 against the published value before you run anything. New here? Follow a full step-by-step setup guide:

Setup guides: Windows · macOS · Linux · Android · iPhone / iPad

Android

APK, side-loaded. Plausible-deniability cover, FLAG_SECURE screenshot block.

arm64-v8a · issued to license holders

Windows / macOS / Linux

Portable desktop builds. Landscape layout, bundled native library.

x64 / arm64 · issued to license holders

Help & verify

Setup, unlocking, activation, backups, checksums.

each build is uniquely keyed to you

Builds are issued to license holders, each uniquely keyed — we don't hand the app to the open internet. Buy a license (or the hardened phone) and your download + checksum are provided with your key.

Compare & learn

Do your homework.

We'd rather you understand the threat and the trade-offs than take our word for it. Read the breakdowns, then decide.

How Pegasus works

A 3,800-word deep dive into the world's most notorious spyware — and why "encrypted apps" don't stop it.

Helix vs the others

Honest, side-by-side comparisons against the messengers you already know.

Everything it does

The complete feature list, plus a white paper written for peer review.

Newsroom & "break it"

For press and researchers: the story, our transparency posture, and an open challenge to prove us wrong.