Onyx is designed as a coordination platform, not a network operator or financial intermediary. The system unifies connectivity and payments by abstracting regulated infrastructure behind a single control layer that manages identity, entitlements, and service continuity.
The architecture is modular by design. Each capability—connectivity, payments, identity, hardware—operates independently, yet resolves through a shared state model. This allows Onyx to replace or add partners without disrupting the user experience.
Onyx follows four non-negotiable architectural principles:
Partner redundancy by default.
No single carrier, issuer, or provider defines system behavior. The platform routes service dynamically based on geography, availability, and capability.
Modularity over vertical integration.
Core services evolve independently. New features attach through defined interfaces rather than rewiring the system.
Single source of truth.
Identity, entitlements, and transaction state resolve through one canonical backend, regardless of entry point.
Minimal persistent state.
The platform stores only what is required to deliver service. Regulated partners retain custody of sensitive infrastructure data.
Users interact with Onyx through:
Clients never embed carrier logic or payment rails directly. All service requests route through the control layer.
The control layer coordinates system behavior and enforces product logic.
It is responsible for:
This layer determines what a user is entitled to. It does not execute regulated operations itself.
Licensed partners provide the underlying infrastructure Onyx does not own.
This includes:
Partners operate independently. Onyx treats them as interchangeable providers behind standardized interfaces.
Onyx ONE integrates as a secure endpoint, not a dependency.
The device:
Hardware strengthens continuity and trust but never bypasses backend authorization.
The system is designed to degrade gracefully.
If a provider fails, the control layer:
This ensures continuity without exposing users to infrastructure complexity.
Users never manage providers manually.
Onyx owns:
Partners own:
This separation is deliberate. It allows Onyx to scale without assuming regulatory risk it does not need to own.
Security is enforced through architecture, not claims:
A detailed treatment follows in the Security & Privacy section.
Because Onyx coordinates rather than replaces infrastructure, the platform can expand across regions, partners, and devices without fracturing the user experience.
This is how Onyx delivers continuity at scale.
This overview does not disclose:
Those details live in internal engineering documentation and are intentionally excluded here.
Onyx treats mobile connectivity as a managed service lifecycle, not a discrete provisioning event. Users activate mobile service through the Onyx app or supported devices, while the platform coordinates underlying network access through partner carriers.
The user experience remains consistent regardless of how or where the underlying connectivity is delivered.
When a user activates service, Onyx resolves eligibility, plan parameters, and geographic availability through its control layer. The platform then orchestrates activation with an appropriate network partner based on location and service requirements.
From the user’s perspective, service activates once. They do not select carriers, manage profiles, or troubleshoot provisioning states.
Each mobile plan progresses through a defined lifecycle managed by Onyx:
Onyx maintains the authoritative view of service state. Network partners report status changes, but do not dictate user-facing behavior.
This separation allows the platform to adapt service delivery without requiring user intervention.
Onyx does not bind users to a single carrier or network implementation.
The system abstracts:
This enables Onyx to introduce redundancy, shift providers, or expand coverage without altering the user experience or requiring reactivation flows.
Early-stage mobile services operate within the constraints of partner carrier capabilities.
These may include:
Onyx designs around these constraints at the platform level and evolves the architecture as deeper carrier integrations become available.
As Onyx expands partnerships with full-service telecom providers, the activation model evolves from profile-based provisioning toward fully integrated mobile service delivery.
This enables:
These capabilities layer onto the existing architecture without rewriting core systems.
Onyx does not expose carrier selection, provisioning mechanics, or network configuration to end users. These details remain internal to the platform.
The product is designed to eliminate activation complexity, not repackage it.
By managing connectivity as a lifecycle rather than a transaction, Onyx delivers mobile service that remains reliable across locations, devices, and usage patterns.
This approach supports the most demanding travel scenarios while remaining equally effective for users operating entirely within a single country.
Onyx treats security and privacy as engineering constraints, not brand promises. The system minimizes data exposure by design and relies on clear boundaries between Onyx, its partners, and the underlying networks that deliver service.
The goal is simple: reduce risk for users moving through modern digital systems without forcing them to change how they live or work.
Onyx designs for realistic threats faced by globally mobile users:
The platform does not assume hostile state-level adversaries or attempt to provide absolute anonymity. It prioritizes resilience, continuity, and sensible risk reduction.
Onyx collects and stores only what is required to operate mobile service and payments.
This includes:
Sensitive financial data, carrier credentials, and compliance-heavy information remain with licensed partners wherever possible.
Onyx separates responsibilities across the stack:
This separation reduces blast radius and limits the amount of sensitive data any single system must hold.
Onyx supports optional lightweight network protection for users who want additional safeguards on untrusted connections.
This layer:
It exists as a practical tool, not a universal requirement, and remains opt-in by design.
For Onyx-controlled hardware, security starts at the device boundary.
The platform emphasizes:
Hardware exists to strengthen service reliability and trust, not to introduce proprietary lock-in.
Onyx enforces standard operational safeguards across all environments:
Security decisions prioritize clarity and maintainability over obscurity.
Privacy in Onyx emerges from:
It is not marketed as invisibility. It is delivered as reduced exposure during everyday use.
Onyx includes an optional network protection layer designed to reduce exposure on untrusted networks without changing how users normally use their devices. This layer exists to support continuity and safety in real-world conditions, not to reposition Onyx as a privacy tool or anonymization service.
The network protection layer provides an additional safeguard when users connect through public, transient, or degraded networks—such as airports, hotels, cafés, or unfamiliar local infrastructure. It focuses on protecting data in transit and reducing passive network-level risks during moments when connectivity matters most.
This capability integrates into the Onyx stack as a supporting system, not a core dependency. Users can enable it when needed and disable it without affecting their underlying mobile service or payments.
The protection layer operates at the network level, securing traffic between the device and the wider internet while active. It does not alter application logic, intercept content, or require changes to how apps authenticate or communicate. The system avoids deep packet inspection and does not attempt to reshape user behavior.
Activation is lightweight and intentional. The platform treats it as a tool users deploy situationally, not a permanent always-on requirement.
Onyx designs this layer with strict data minimization. It does not retain browsing histories, application payloads, or session content beyond what is required to operate the service in real time. Logs focus on service health and operational integrity rather than user activity.
Network protection remains separate from identity, entitlements, payments, and connectivity provisioning. This separation ensures that optional safeguards do not become a single point of failure or an implicit dependency for core service availability.
Mobile connectivity frequently operates over networks that users neither own nor manage. In these environments, reducing unnecessary exposure matters. The decentralized VPN layer exists to provide an additional, optional safeguard when operating on unfamiliar or shared infrastructure.
Unlike traditional VPNs that route traffic through centralized servers operated by a single provider, decentralized VPNs distribute traffic across a network of independent nodes. This reduces single points of failure, limits concentration of trust, and avoids reliance on any one operator’s infrastructure or logging practices.