Built in the Shadows,
Operating in the Light

An organization born from the understanding that true privacy is not a luxury, but a fundamental requirement for modern digital communication.

Our Genesis

Established 2022 • Location: Decentralized

Undisclosed Origins

Onyx emerged from a collective of privacy advocates, cryptography experts, and infrastructure architects who recognized a critical gap in the email ecosystem: true privacy-first design.

Founding Principles
  • Zero-knowledge architecture by design
  • No data monetization, ever
  • Open-source cryptographic implementations
  • Distributed infrastructure across privacy-friendly jurisdictions
  • Anonymous payment options accepted

Privacy Absolutism

In an era of surveillance capitalism and data breaches, we believe privacy is not negotiable. Every design decision, every line of code, reflects this unwavering commitment.

Core Beliefs
  • Privacy is a fundamental human right
  • Trust is earned through transparency of process, not people
  • Security through obscurity is a fallacy
  • Decentralization prevents single points of failure
  • Encryption should be ubiquitous and unbreakable

Security Architecture

Paranoia as a feature, not a bug

Zero Trust Architecture

Never trust, always verify. Every request is treated as potentially hostile.

  • Continuous authentication and authorization
  • Micro-segmentation of all network traffic
  • Principle of least privilege enforcement
  • Real-time threat detection and response
  • Cryptographic verification of all components

Trust Level: 0.00% | Verification: Continuous

Quantum-Ready Encryption

Military-grade encryption that's already prepared for the quantum computing era.

  • AES-256-GCM for symmetric encryption
  • RSA-4096 and ECC-P521 for asymmetric operations
  • Post-quantum lattice-based cryptography ready
  • Perfect forward secrecy on all connections
  • Hardware security module key management

Estimated Time To Crack: Centuries | Keys Rotated: Every 24h

Data Sovereignty

Your data never leaves jurisdictions with strong privacy laws. Ever.

  • Data centers in privacy-friendly jurisdictions only
  • No data sharing with any government entity
  • Canary tokens for transparency
  • Client-side encryption before transmission
  • Automatic data expungement policies

Data Requests Complied With: 0 | Will Comply: Never

Anonymous Operations

We don't need to know who you are to protect your communications.

  • No mandatory KYC requirements
  • Cryptocurrency payments accepted
  • Tor-friendly infrastructure
  • No logging of user activities
  • Pseudonymous account creation supported

User Identities Stored: None | Logs Retained: 0 days

Transparency Report

Last Updated: Real-time

0

0

99.99%

NEVER

NONE

ACTIVE

Join the Resistance

For those who value privacy above all else.