Sovereign ephemeral messaging software • Local AES-256 encryption • GDPR Art. 17 compliance • Swiss Hosting.
The Oath of Invisibility
In a world where recording is the default, we built a sanctuary for the right to be forgotten.
Our Mission
ITYLOS was born from a radical necessity: the Internet has lost its sense of the ephemeral. Every shared secret becomes an indelible footprint. We restore digital hygiene through sovereign, free, and mathematically absolute tools.
Radical Independence
Zero ads. Zero data selling. Zero investors. ITYLOS is a pure engineering project, self-funded to ensure absolute technical and political neutrality.
The Butterfly Philosophy
A secret should not be a burden. At ITYLOS, we believe that sensitive information should have the lightness of a butterfly: it exists for a specific moment, fulfills its mission, and then vanishes without leaving a magnetic trace. Our technology is an act of resistance against permanent archiving and mass surveillance.
The ITYLOS Objective
More than a tool, ITYLOS is a standard of trust. Our goal is to make military-grade encryption transparent and accessible, while protecting the total anonymity of both sender and receiver. We are building the infrastructure of modern discretion.
Total Auditability
Trust is not given; it is proven.
ITYLOS introduces the cryptographic destruction certificate (JSON). For the first time, you hold physical proof that data has been purged, allowing DPOs and CISOs to validate real GDPR (Art. 17) compliance.
{
"status": "DESTROYED",
"resource_hash": "a6e463a1...",
"timestamp_utc": "2026-01-19T10:45:00Z",
"compliance": "GDPR_EXECUTED"
}
The Void Protocol
Local Encryption
Your secret is turned into mathematical dust (AES-256) directly in your browser. We see nothing but chaos.
Blind Transit
The Swiss server receives a sealed vault for which it does not have the key. It acts as a neutral carrier.
Self-Destruction
Upon reading, data is physically purged from memory and disk. No cache, no recycle bin, no turning back.
MILITARY-GRADE SHIELDING
Traffic Padding (Anti-Analysis)
On a monitored network, the size of an encrypted message can betray its content. To counter this, we inject up to 15kb of random 'noise' into every link. Result: a simple 'Hello' weighs the same digital weight as a State secret. Metadata analysis becomes impossible.
PGP Canary (Proof of Life)
Trust is not claimed, it is proven. Our 'Warrant Canary' is cryptographically signed every month via a PGP key stored on a disconnected physical medium (Air-Gapped USB). If this signature disappears or becomes invalid, consider that Itylos has been compromised.
View proof of lifeParanoid Security
Unlike classic messengers, ITYLOS stores nothing "just in case." We use RAM for transit, ensuring no magnetic trace remains after destruction.
Default Anonymity
We ask for no email, no name, no number. Your identity does not interest us, only your security does.
OUR 3 INTANGIBLE PILLARS
⚡ SOVEREIGNTY REQUIRED
ENTROPY IS YOUR ONLY FREEDOM
Strong encryption is worthless if the key is predictable. Do not trust your memory with your security. Use pure mathematical chaos to forge your own defense.