If I have a Helm device and you have a Helm device, and we both use iPhones, that's a pretty good scenario. All the devices are trusted and run signed audited code, and my email passes from my iPhone to yours purely encrypted at every stage, with no intermediaries having access to the plaintext.
And neither of us have to change apps or behavior.
Does that mean that Helm knows when it's communicating with another Helm server and does an end-run-around email infrastructure to keep everything in-house? (like gmail and O365 appear to do)
And neither of us have to change apps or behavior.
This is pretty good.