Advanced Encrypted & Secure Operating System: Helix Multi-Layered Encrypted Communications

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

ADVANCED ENCRYPTED & SECURE OPERATING SYSTEM

H E L I X M U L T I - L A Y E R E D E N C R Y P T E D C O M M U N I C A T I O N S
ADVANCED ENCRYPTED M U LT I L AY E R E D E N C R Y P T E D
& SECURE OS CO M M U N I CAT I O N S

Developed by the HELIX team, HELIX OS™ transforms an Android mobile phone into
an unbreakable communications device using a custom encrypted operating system
and using HELIX OS™ multi layered advanced encryption for communications.

HELIX OS™ Servers HELIX OS™ Vault WiFi


HELIX uses encrypted packets of data for By engineering, the hardware and the software of the Our devices enable you to use WiFi safely when
transmitting voice and messages across our statically device and disabling the insecure phone features i.e. required, the network provider is not alerted that
located relays servers that are based in countries Standard Calls, SMS, Browsing, Bluetooth, Uploads, you’re using an encrypted phone like a lot of the
that have the strictest privacy laws in the world, Downloads, GPS, locations, Camera, and SOS feature, other secure phones on the market, HELIX-OS phone
preventing any outside parties any access. No voice or this provides an impenetrable VAULT clear of Viruses, looks like a normal phone and does not stand out to
data is stored anywhere on our network making our and prevention of Spyware, Trojans & Ransomware. cause suspicion. Also, all downloads and uploads are
service totally anonymous. disabled from the device making it impossible for any
HELIX OS™ Forensic Wipe Features spyware or firmware to be injected into the phone
HELIX OS™ Custom Encrypted Operating Panic wipe feature: When the phone is locked you over the wifi network.
System can set a panic code to be entered from the home
screen. This is an emergency panic code that will Sim Card
HELIX has deigned a fully secure custom encrypted
operating system that replaces the stock android immediately forensically wipe all data on the device. You can install your own sim card of choice whether
version that all androids come with by default. The Password wipe feature: When the phone is locked its a pay as you go sim card or a contract sim card
stock version is full of insecure applications stealing there are a limited number of password attempts as long it has data on the sim, giving you a lot more
sensitive data and providing your location to third set. If you enter the password incorrectly more than freedom and more security than having a pre-paid
parties without you being able to detect this on a the set number of selected times it will immediately sim provided with the handset.
daily basis. forensically wipe all data on the device.
HELIX OS™ Secure notes
Remote wipe feature: At any point if a client
HELIX OS™ Device overview Secure notes is a custom encrypted secure notes
requires, we can remotely wipe their device from any
End to End Encryption application which was designed to give you the
where in the world as long as the phone has signal
Encrypted Crystal Clear Voice Calls option to be able to store your sensitive information
and is switched on or when the phone is switched
Encrypted Intant Messaging securely. If the incorrect password is entered more
back on, it will immediately forensically wipe all data
Encrypted Picture Messaging than the set amount of times, all data in the notes
on the device.
Encrypted Videos app will be erased forensically, and impossible to be
Encrypted Group Chats retrieved. The app is encrypted using AES-256 Bit
encryption.
HELIX OS™ Communication Security
overview Why choose HELIX OS™
HELIX utilises multi-layered advanced encryption No identification is required for purchase
algorithms. A new secure key is generated at the No hardware or data plan is registered to you
beginning of each call or message and is destroyed No payment can be linked to a client or their device
straight after,making it impossible for back doors to No calls or messages are stored anywhere on our
exist. All voice calls and messaging communications network
travel through our closed secure encrypted gateway No backdoors exist
making it invisible to the network providers also
preventing all major vulnerabilities. Product includes
1 x Encrypted Samsung device
Encryption Algorithm Specification 1 x 6/12 month subscription to our service
Elliptic-curve Diffie–Hellman (ECDH) 571 bits key 1 x Carry Pouch
exchange level (default) 1 x Screen Protector
DH (Diffie Hellman) 8192 bits key exchange level 1 x Clear Mobile Phone Case
Encryption AES 256 bits in GCM mode 1x 24hr support token for your licence term
Hash function SHA512
Authentication: Built-in Public Key Infrastructure
(PKI) system, certificate based authentication

HELIX OS™ Pr o v i d e s A n Imp e n i t r a b l e V a u l t Ag a i n s t Al l M a j or T hr eats

You might also like