Elpis is a zero-knowledge dead man's switch, designed to protect data owners by enabling the targeted exposure of public interest material. This works by automating a specific function designed to release a decryption key to a predefined mailing list, and relies entirely on customer interaction to thwart. Crucial to this operation is our guarantee that only our customers, through their own interaction, are capable of stopping this process.

Who would use this?

Who would use this?


Those intending to investigate and expose public interest material whilst at risk of being rendered incapable. Although the general public fall into our target market, our services will most likely appeal to those with an interest in maintaining control over how what sensitive data they possess can be securely stored and distributed. This could include anyone from dissidents and investigative journalists, to government employees or whistleblowers.

Dissidents Icon

Dissidents

Those that challenge complacent beliefs in a just world.

Whistleblowers Icon

Whistleblowers

Those that refuse to surrender their own moral judgement.

Journalists Icon

Journalists

Those that champion the public interest in times of crisis.

Our Services

Our Services


We recognise that sensitive data within the current geo-political landscape can sometimes require a more refined data insurance strategy. This is where we can help. The services we offer are flexible, affordable, and tailored to meet specific contingency requirements. Our innovative tools allow our customers to cost-effectively deploy and depend on cryptographic technology to safeguard their data retention interests.

We believe that cryptography exists to shift the balance of power from those with a monopoly on violence to those who comprehend mathematics and security design. This is why we've created innovative user friendly tools that leverage encryption to protect customer data with a mathematical lock that no use of force can ever break.

The services we offer indemnify our customers against violence by insuring their data with a tailored exposure guarantee. This acts as a violence deterrent by sending a potent message to those with a monopoly on violence that to use force against our customers is to guarantee data exposure. Our strategy protects our customers by rendering the use of force obsolete, and effectively fights back against violence without ever having to deploy it.

How It Works

How It Works


We have produced a comprehensive white paper detailing our zero knowledge protocol and its deployment in our services. This provides a technical explanation of how our cloud infrastructure operates to safely store and distribute customer keys blindly.

Contact Us

Contact Us


All communication submitted using this form is transmitted using transport level encryption, meaning any data sent to us from our visitors occurs over a secure channel (TLS).

Follow Us:
Loader