I T Y L O S
FR | EN
HOME THE FORGE 🦋 TERMINAL MANIFESTO GUIDE
FR EN

Sovereign ephemeral messaging software • Local AES-256 encryption • GDPR Art. 17 compliance • Swiss Hosting.

The Oath of Invisibility

In a world where recording is the default, we built a sanctuary for the right to be forgotten.

Our Mission

ITYLOS was born from a radical necessity: the Internet has lost its sense of the ephemeral. Every shared secret becomes an indelible footprint. We restore digital hygiene through sovereign, free, and mathematically absolute tools.

Radical Independence

Zero ads. Zero data selling. Zero investors. ITYLOS is a pure engineering project, self-funded to ensure absolute technical and political neutrality.

The Butterfly Philosophy

A secret should not be a burden. At ITYLOS, we believe that sensitive information should have the lightness of a butterfly: it exists for a specific moment, fulfills its mission, and then vanishes without leaving a magnetic trace. Our technology is an act of resistance against permanent archiving and mass surveillance.

The ITYLOS Objective

More than a tool, ITYLOS is a standard of trust. Our goal is to make military-grade encryption transparent and accessible, while protecting the total anonymity of both sender and receiver. We are building the infrastructure of modern discretion.

Total Auditability

Trust is not given; it is proven.

ITYLOS introduces the cryptographic destruction certificate (JSON). For the first time, you hold physical proof that data has been purged, allowing DPOs and CISOs to validate real GDPR (Art. 17) compliance.

JSON Audit Log
GDPR Art. 17
root@itylos:~$ cat proof.json
{
  "status": "DESTROYED",
  "resource_hash": "a6e463a1...",
  "timestamp_utc": "2026-01-19T10:45:00Z",
  "compliance": "GDPR_EXECUTED"
}

The Void Protocol

Local Encryption

Your secret is turned into mathematical dust (AES-256) directly in your browser. We see nothing but chaos.

Blind Transit

The Swiss server receives a sealed vault for which it does not have the key. It acts as a neutral carrier.

Self-Destruction

Upon reading, data is physically purged from memory and disk. No cache, no recycle bin, no turning back.

MILITARY-GRADE SHIELDING

Traffic Padding (Anti-Analysis)

On a monitored network, the size of an encrypted message can betray its content. To counter this, we inject up to 15kb of random 'noise' into every link. Result: a simple 'Hello' weighs the same digital weight as a State secret. Metadata analysis becomes impossible.

PGP Canary (Proof of Life)

Trust is not claimed, it is proven. Our 'Warrant Canary' is cryptographically signed every month via a PGP key stored on a disconnected physical medium (Air-Gapped USB). If this signature disappears or becomes invalid, consider that Itylos has been compromised.

View proof of life

Paranoid Security

Unlike classic messengers, ITYLOS stores nothing "just in case." We use RAM for transit, ensuring no magnetic trace remains after destruction.

Default Anonymity

We ask for no email, no name, no number. Your identity does not interest us, only your security does.

OUR 3 INTANGIBLE PILLARS

Zero Ad Trackers
Zero IP Logging
100% Swiss Hosting (Geneva)

SOVEREIGNTY REQUIRED

ENTROPY IS YOUR ONLY FREEDOM

Strong encryption is worthless if the key is predictable. Do not trust your memory with your security. Use pure mathematical chaos to forge your own defense.

Back to home