Two apps. One mission. Secure communications for people who operate in the real world — whether that means encrypted messaging in a conflict zone or private email that stays private.
Both apps meet or exceed the cryptographic standards required by NIST and NSA Suite B — the same baseline used to protect classified government communications.
| Component | Standard | Used In | What It Does |
|---|---|---|---|
| Symmetric Encryption | AES-256-GCM | Chat + Mail | 256-bit encryption with built-in tamper detection. |
| Key Exchange | X25519 ECDH | Chat + Mail | Constant-time key agreement immune to timing attacks. |
| Post-Quantum | ML-KEM-768 | Chat + Mail | Hybrid classical + post-quantum. Future-proof against quantum decryption. |
| DM Forward Secrecy | X3DH + Double Ratchet | Chat | Per-message key ratcheting for 1:1 conversations. Every message has a unique key. |
| Group Forward Secrecy | MLS TreeKEM (RFC 9420) | Chat | Group keys rotate on every member change. Leaked keys heal automatically. |
| Sealed Email | SPQR Triple Ratchet | Post-quantum triple ratcheting for email with multi-server key consensus. | |
| Key Derivation | HKDF-SHA256 | Chat + Mail | Cryptographic domain separation between key uses. |
| Zero-Knowledge Server | Relay-Only | Chat + Mail | Servers never hold decryption keys. Encrypted blobs only. |
Most encrypted messengers protect what you say. The Phantom Protocol protects that you said it, when you said it, and who you said it to.
Sender identity is encrypted inside the message payload. Two messages from the same person are indistinguishable to the server.
Timestamps blurred by random offset up to 30 seconds. Timing-based surveillance becomes unreliable.
Encrypted data transformed into text resembling a constructed language unique to each conversation.
Messages deposited at rotating cryptographic addresses that change every hour.
Continuous encrypted decoy traffic indistinguishable from real messages.
Shared-secret authentication. Your recipient knows you wrote it — but can't prove it to anyone else.
The result: The server cannot answer: who sent a message, how many messages a person sent, when it was sent, which conversation it belongs to, or whether encrypted traffic is even HyveHeim traffic at all.
Both apps share the same privacy architecture. We don't collect the data in the first place — so there's nothing to subpoena, nothing to hack, and nothing to sell.
In HH Chat, sender identity is encrypted inside the message payload. In HH Mail, sealed emails between HH users are encrypted end-to-end with SPQR Triple Ratchet. In both cases, the server never sees who communicated with whom.
Remote images blocked by default. Tracking pixels stripped on arrival. External links preserved for legitimate security notifications but sanitised for trackers. Your inbox is yours alone.
Sensitive data on your device — auth tokens, message history, email cache — is encrypted at rest using hardware-backed key storage.
When infrastructure fails — natural disaster, civil unrest, blackout, or censorship — HH Chat falls back to peer-to-peer mesh networking. Messages synchronise directly between nearby devices without any server or internet connection.
Group size determines the privacy boundary — small groups are fully private, large groups require leadership accountability. Messages remain zero-knowledge in all cases.
No verification. No identity trail. Families, friend groups, small teams — fully private by default.
Leaders verify identity. Members stay anonymous. Leadership identity encrypted — a full breach yields only opaque blobs.
Export a signed evidence package from any group. The server assembles it, returns it. You decide what to do with it.
At 100 members with 3% defection probability, 95% chance someone activates the beacon. Scale itself becomes the liability.
Mainstream messengers protect content in transit. Privacy-first messengers go further. HH Chat goes further still.
| Feature | Telegram | Signal | Briar | Session | HH Chat | |
|---|---|---|---|---|---|---|
| End-to-end encryption | check_circle | remove_circle | check_circle | check_circle | check_circle | check_circle |
| No phone number required | cancel | cancel | remove_circle | check_circle | check_circle | check_circle |
| Sealed / anonymous sender | cancel | cancel | remove_circle | cancel | remove_circle | check_circle |
| Zero server logs | cancel | cancel | remove_circle | check_circle | check_circle | check_circle |
| Traffic analysis resistance | cancel | cancel | cancel | remove_circle | remove_circle | check_circle |
| Post-quantum protection | cancel | cancel | check_circle | cancel | cancel | check_circle |
| Deniable messages | cancel | cancel | cancel | cancel | cancel | check_circle |
| Offline / mesh fallback | cancel | cancel | cancel | check_circle | cancel | check_circle |
| Anonymous hidden service | cancel | cancel | cancel | check_circle | check_circle | check_circle |
| Multi-jurisdiction infrastructure | cancel | remove_circle | cancel | check_circle | remove_circle | check_circle |
Most email clients trust your provider and load remote content that tracks you. Encrypted email providers lock you into their ecosystem. HH Mail works with any provider and adds the privacy they won't.
| Feature | Gmail | Outlook | Thunderbird | ProtonMail | Tutanota | HH Mail |
|---|---|---|---|---|---|---|
| Works with any provider | cancel | cancel | check_circle | cancel | cancel | check_circle |
| E2E encryption (user-to-user) | cancel | cancel | remove_circle PGP (manual) | check_circle Proton-only | check_circle Tuta-only | check_circle HH-to-HH |
| Post-quantum encryption | cancel | cancel | cancel | cancel | cancel | check_circle |
| Remote images blocked | cancel | cancel | remove_circle | check_circle | check_circle | check_circle |
| Tracking pixel stripping | cancel | cancel | cancel | check_circle | check_circle | check_circle |
| Security scanner (SPF/DKIM/phishing) | remove_circle | remove_circle | cancel | remove_circle | remove_circle | check_circle |
| Smart categorisation | check_circle | check_circle | cancel | cancel | cancel | check_circle |
| No third-party analytics | cancel | cancel | check_circle | check_circle | check_circle | check_circle |
| Multi-server key consensus | cancel | cancel | cancel | cancel | cancel | check_circle |
check_circle Full support remove_circle Partial / limited cancel Not available
The difference: ProtonMail and Tutanota offer excellent encryption — but only within their own ecosystem. HH Mail works with any email provider (Outlook, Gmail, Yahoo, iCloud, and more) and adds sealed encryption between HH Mail users on top. You keep your existing email address. We add the privacy.
Both apps are in active development for all platforms. Get in touch to be notified when they launch.
HH Chat — encrypted messaging for mobile and desktop. HH Mail — secure email for desktop and mobile.