Helm supports the addition of unlimited secondary users, which means an entire family can set up their email to run on Helm.
Helm Admins can set up user accounts and email addresses for any user regardless of those users' proximity to the Helm. Secondary users who want access to the Helm app must be nearby for the initial setup as a security measure, but it is not required that users have the Helm app to use a Helm email address.
Proximity-based Security
To protect your Helm Personal Server from being hacked, we've created a new security architecture called proximity-based security.
In order to use your Helm account, you must first complete a one-time device authorization using the Helm app. Bluetooth’s limited connection range makes it ideal for ensuring that only a nearby device can pair with Helm and have a proximity token shared with it. Once shared, your device carries the “proof” of having been in proximity to your Helm everywhere you go and no longer needs to be near it. You may then use this authorized device to configure your account on it or any number of other devices. Each additional user must also complete this one-time device authorization to use the Helm app.
The combination of your password and the Bluetooth-enabled proximity token creates a strong, two-factor authentication that provides the ultimate control over access to your information.
Comments
0 comments
Article is closed for comments.