Staying Safe Online

Practical security advice tiered by risk level. Start with your level and work up as needed. Every recommendation below is actionable — no theory, just steps.

Common Myths

Things that do NOT protect you (despite what people think):

For Everyone Everyday

For Privacy-Conscious Users Privacy-Conscious

Everything above, plus:

For High Risk Users High Risk

Everything above, plus:

If you are a journalist, activist, aid worker, or anyone operating in a hostile environment — the steps below are not optional. They are the difference between safety and exposure.

Recommended Operating Systems

GrapheneOS Mobile

Hardened Android for Pixel devices. No Google services, verified boot, hardened memory allocator. The gold standard for mobile security. Yes, the irony of Google hardware running a de-Googled OS is not lost on us.

CalyxOS Mobile

Privacy-focused Android with microG (minimal Google compatibility). Easier transition from stock Android than GrapheneOS. Supports more devices.

Qubes OS Desktop

Compartmentalized security through Xen virtualisation. Each app runs in its own VM. If one compartment is compromised, others remain isolated. Used by Edward Snowden.

Tails Desktop

Amnesic live system — boots from USB, routes everything through Tor, leaves no trace on the computer. When you shut down, everything disappears. The system used to leak the Snowden documents.

Note on Kali Linux / Kali NetHunter

Kali is a penetration testing distribution, not a privacy OS. It's designed for offensive security, not defensive use. The mobile version (NetHunter) had reliability issues and the project's status has been inconsistent. We don't recommend it for daily use or as a primary device OS. If you need mobile pen-testing tools, use them on a secondary device.

For Maximum Security Maximum

Everything above, plus:

This level is for people whose lives depend on communications security. If you're not sure whether you need this level, you probably don't. But if you do — read every word.

What HyveHeim does for you automatically

These protections are always active regardless of your security profile. You don't need to configure them.

What We Store — Complete Transparency

This is everything our server stores. No exceptions, no hidden databases, no "metadata we forgot to mention."

What we store temporarily

Encrypted messages48 hours maxAuto-deleted. Server can't read them (E2EE). Stored only so offline users can fetch them.
Contact invites7 daysAuto-deleted after expiry. Single-use.
Stories24 hoursAuto-deleted.
Push notification endpoints48 hoursStored in memory only, not on disk. Auto-expire.
Auth session tokens15 minutesJWT access tokens. Refresh tokens cleaned weekly.

What we store permanently

Username + password hashBcrypt-hashed. We can't read your password.
Recovery key hashBcrypt-hashed. We can't read your recovery key.
Public encryption keysYour X25519 + ML-KEM public keys. These are public by definition — needed for others to encrypt to you.
Blinded membership hashesHMAC-SHA256 tokens. Server can't link them to your username or determine which groups you're in.
OSINT intelligence eventsPublic information from open sources. This is the product — not user data.

What we NEVER store

What if our server is compromised? They get: encrypted blobs they can't read, opaque hashes they can't link to users, and public OSINT data they could have found themselves. They cannot determine who talked to whom, what was said, or who is in which group. Messages auto-delete within 48 hours — after that, there's nothing left to find.