Helm supports the addition of unlimited secondary users, which means an entire family can set up their email to run on Helm.
While users do not need to be in physical proximity to the Helm Personal Server for continued use, they do need to be nearby for the initial setup as a security measure.
To protect your Helm Personal Server from being hacked, we've created a new security architecture called proximity-based security.
In order to use your Helm account, you must first complete a one-time device authorization using the Helm app. Bluetooth’s limited connection range makes it ideal for ensuring that only a nearby device can pair with Helm and have a proximity token shared with it. Once shared, your device carries the “proof” of having been in proximity to your Helm everywhere you go and no longer needs to be near it. You may then use this authorized device to configure your account on it or any number of other devices. Each additional user must also complete this one-time device authorization.
The combination of your password and the Bluetooth-enabled proximity token creates a strong, two-factor authentication that provides the ultimate control over access to your information.