Third-party subscription tools - a leak by default.
Your own stack - full control of every node.

7 yrs
in privacy engineering
1500+
clients worldwide
0
leaks on our infrastructure

// threat model

Where your data leaks. And what we do about it.

Not «we protect from hackers and governments» — concretely: what leaks where for your business today, and which architecture closes it.

bespale — bash
>constant telemetry from Apple / Google / Microsoft / Slack / Telegram / WhatsApp>Matrix, SimpleX, XMPP, e-mail on your hardware
>total surveillance in the phone: issuers, Google, corporations, governments>bespalePHONE on our own AOSP build. Full control from silicon to userspace.
>team with Windows and macOS workstations>bespaleSSD with multilayered defense turns team devices into an impregnable fortress — both digitally and physically.
>DNS leak / TLS fingerprint / IP exposure>double-VPN + DoH through your own DNS with admin panel
>KYC exchange on every payment>your own gateway and RPC nodes. 11 chains, 20 currencies. No middlemen.

// stack

What ends up in your infrastructure

Not «privacy solutions» — a concrete software stack. Every component has been running on our own infrastructure for years. Either our own software or battle-tested open-source. Nothing else.

Comms
Matrix (Synapse), SimpleX, XMPP. E2EE, federation toggleable. Voice/video - through your own TURN.
Auth & 2FA
Our own auth and 2FA via Matrix. No SMS-OTP, no Google Authenticator, no Microsoft Authenticator. No telecom or big-tech dependency on your front door.
Mail
Stalwart. SPF/DKIM/DMARC scoring 10/10 on mail-tester out of the box. Your own SMTP, no relaying through Google.
Endpoints
bespalePHONE — AOSP build with no Google services at all. Custom PCs for C-level: LUKS, secure boot, no telemetry.
VPN
Marzaban / Remnawave: double-VPN, kill-switch, exit node rotation. Configs on your devices, nodes in jurisdictions you choose.
Blockchain ops
Your own RPC nodes: ETH, BSC, TRON, SOL, TON, BTC, LTC, DASH, XMR. USDT/USDC, BTC and others — through your addresses, no exchanges, no middlemen.
bespaleSSD
Any laptop or PC turns into an anonymous secured workstation. Encrypted NVMe with our build: boot, work, shutdown — zero trace left on the host. Real workstations without Google, Apple or corporate surveillance.
Bonus pool
SearXNG, Invidious, Lingva — your own clones of Google Search, YouTube and Translate. No logs, no ads, no cookie fingerprinting.

// 1-second wipe

Digital shredder.
Many activation paths. One second.

Every device on your team — bespalePHONE, bespaleSSD — wiped irrecoverably on demand. From a button in the UI to remote activation by message. Fast and final. Just don't forget to keep backups in a safe place.

// rare USP

Your own blockchain stack.
11 chains. 20 currencies.
0 middlemen.

You receive and send through your own gateway, and optionally through your own RPC nodes. No KYC exchanges. No Chainalysis trail. Full control of payments and of your own assets.

USDTUSDCBTCETHBNBTRXLTCDASHZECXMRDAISOLTON

// methodology

How we build this

Not «5 stages in a pretty PDF». A real engineering sequence from the first call to handover.

01

Audit

We map exactly how you'd be exfiltrated today. Current stack, supply chain, leak surface. Written report in 5–7 days.

02

Architecture

We design the target stack against your threat model. Jurisdictions, redundancy, access control. No cargo cult.

03

Deploy

We bring it up on your hardware or vetted providers. LUKS, monitoring, backups. Every key is yours, not ours.

04

Handover

We hand over docs, runbooks, train your admin. After handover we can walk away entirely — the stack keeps running.

05

Support

Optional. 24/7 SLA if you want it. Or just a knowledge base and a private support channel if you don't.

// who we are

No jurisdiction. No logs.

This offer isn't for everyone. For some, what's described below is a deal-breaker. For others, it's the only offer on the market that technically makes sense.

Tap a card to flip through

// real-world setups

Real-world setups

Three engagements from practice. Names and details changed - the architecture is one-to-one.

Online business
01 / 03

A company you can't
reach from the outside

Brief

Oleg Tinkov, his 3 executives, 20 employees of a new online project. After Tinkoff Bank was taken away from the founder in a couple of weeks - no more illusions that the infrastructure is yours until proven otherwise. Stripe will cut the merchant account on any Wednesday at compliance's call. Slack walks out with the office. Google Docs is read by half the world and the AI. He wants to operate so that no regulator, no vendor, no employee with an unlocked macbook in a Tel Aviv café can switch the infrastructure off.

Stack
  • VPN on own nodes - the single entry into the corporate network. No public endpoints, no cloud load balancers under American ToS
  • Matrix server on the corporate domain - chats, customer threads, working groups, locked rooms for board meetings
  • Mail server on a dedicated domain - ten years of archive stay inside the company, not at Google. No scope for AI training on corporate correspondence
  • SimpleX - for decisions that don't belong in Matrix history either. Counsel on new jurisdictions, M&A negotiations, banker calls
  • Crypto gateway on a separate hardened server - 20 currencies in and out. No Stripe, no Visa/Mastercard reporting, no intermediary bank that drops the merchant on the third complaint
  • bespalePHONE for the owner and execs - business admin in your pocket. No Google services, no Apple push servers, no Pegasus entry points
  • bespaleSSD for every employee - VPN, Matrix and the working environment live on the drive. Pull it out - nothing on the machine. Fire someone - take back the SSD. Access closed in a second
Outcome

An employee sits down at any laptop in any country: plugs in bespaleSSD - inside the corporate network; pulls it out - returns the laptop to its owner. The execs run the business from Tel Aviv, Lisbon and Tbilisi - the provider doesn't care. Payments come and go directly from clients to company crypto wallets, with no intermediaries and no compliance sweeps. Tomorrow a raid arrives - they take empty cases. Tomorrow someone decides to switch it off - there's nothing to switch off, it all runs on owned hardware with vetted vendors. The only weak point is the humans themselves. Cured by an instant wipe on trigger.

// FAQ

Questions you've probably
already asked yourself

«Expensive»

Yes, it's expensive. But nothing is more expensive than an incident that already happened, and time can't be turned back. We work bespoke, so the budget is shaped to your threat model. Sometimes cheaper than an annual enterprise SaaS subscription, sometimes much more - depends on scale. You don't pay for what you don't need.

«What if you disappear»

Infrastructure, configurations, keys - you are the Owner of all of it. Everything keeps working without us. Decentralisation is a principle, not marketing.

«GrapheneOS is free though»

Free. With Google dependencies in bootloader-provisioning via Pixel certificates. We ship our own AOSP build with no Google services at all, on hardware we choose ourselves. The comparison doesn't make sense.

«We have Proton / Threema / Kaspersky - that's enough»

If it's enough - great, don't buy anything extra. You need us when you want to build a protected perimeter with no external dependencies and unique components: from your own hardware with privacy infrastructure, to payment rails and battle-tested AI. Choosing subscription services means choosing compromise. That's a luxury you can't afford in the digital security sector.

Some need ISO certification.
Some need — actually working tools.