Locarno, Switzerland · Est. 2024
AethelCoreX

We measure what certifications don't see.

Observe
01
There is a standard that no certification can issue and no guide can award.
It exists in the gap between what a structure declares and what it actually is — when no one is watching, when the protocol is not followed, when the pressure is real.
02
We call it the AEX coefficient. It is not a score of comfort. It is a measure of operational truth.
The AEX coefficient does not compete with existing rating systems. It occupies a space none of them can reach — and none of them can replicate without dismantling their own model.
03
Our assessments are conducted in silence. Delivered once. Never disclosed.
Access is by referral or direct invitation only. We do not seek clients. We identify structures that are ready to know where they truly stand.

Three dimensions. One coefficient. No interpretation. No exceptions.

Macro-area I
Silent Infrastructure
How the environment protects without being perceived. Physical security layers invisible to the guest — and to standard inspection.
Macro-area II
Human Capital Resilience
Social and procedural vulnerability of staff under real operational pressure. The point where training ends and human behaviour begins.
Macro-area III
Privacy Integrity
Information flows within the structure. Who knows what, when, and how. The most underestimated risk in any ultra-luxury environment.

AethelCoreX serves those who understand that the cost of not knowing is always higher than the cost of knowing.

Ultra-luxury properties hosting UHNWI guests who require absolute operational discretion
Independent boutique hotels positioning at the highest tier and requiring objective validation
Family offices and private wealth managers overseeing hospitality assets
New ultra-luxury openings requiring pre-launch operational verification
General Managers who already know their structure is excellent — and want a number to prove it

Privacy is not a feature. It is the foundation.

We do not collect data. We do not use contact forms. We do not request corporate documents or phone numbers. Every interaction with AethelCoreX begins and ends with the same principle: your identity and your intentions are yours alone.

1
Obtain an encrypted channel
Contact requires an end-to-end encrypted email client.
We recommend Proton Mail (proton.me) or Tutanota (tuta.com). Both are free and require no personal data to register. Your encrypted address is the only thing we will ever ask of you.
2
Send a first message
Write to our secure address during the contact window. Describe only your intention.
No corporate email. No phone numbers. No attachments. A brief statement of why you believe your structure may be relevant to the AEX standard is sufficient. The quality of this first message is already part of our evaluation.
3
Receive our verification address
If your message meets our criteria, you will receive our reserved ProtonMail address.
Only at this point does a formal channel open. We do not respond to every message — only to those that demonstrate genuine alignment with the standard we uphold.
4
A conversation, not a sales process
What follows is a confidential exchange between two parties who have decided to take each other seriously.
There is no pitch. No proposal deck. No timeline pressure. Either the AEX assessment serves your structure — or it does not. We will tell you clearly which it is.
Acceptance criteria

"Not every request will be accepted. This is not exclusivity for its own sake — it is integrity in practice."

Requests sent from non-encrypted email addresses will not receive a response
Phone numbers — corporate or personal — are never requested and should not be provided
Requests that do not demonstrate a clear understanding of what AethelCoreX measures will not proceed
Structures that do not operate at the ultra-luxury or high-security tier are respectfully outside our scope
All communication, from first contact to final delivery, remains encrypted and permanently confidential

Every assessment is different. The framework is always the same.

I
Silent Infrastructure
Perimeter integrity under passive observation
Access control consistency across all entry points
CCTV blind spots and physical vulnerability mapping
Emergency protocol readiness under zero-notice conditions
VIP arrival and departure exposure analysis
Asset protection during operational peak hours
II
Human Capital Resilience
Social engineering vulnerability — front-of-house
Information disclosure under simulated pressure
Protocol adherence when unobserved by management
Staff behaviour during irregular or ambiguous situations
Chain of command integrity in real operational conditions
Reaction consistency across shifts and seniority levels
III
Privacy Integrity
Guest information containment — verbal and digital
Internal data flow mapping across departments
Third-party vendor exposure during active operations
Communication protocol compliance under social pressure
Back-of-house information discipline
Digital footprint of guest presence and movement
Delivery protocol

The Æx report is never sent digitally. It is delivered in person, in a neutral location agreed upon in advance, on hardware encrypted to AES-256 standard accompanied by a physical document printed on non-reproducible paper with UV watermark and thermochromic ink.

One copy exists. It is yours.

1
Copy of the report — ever
0
Digital transmissions of findings
Confidentiality — no expiration

If you are ready
to know where
you truly stand.

Contact window

Our secure contact address is accessible exclusively during a defined daily window.
Outside this window, communication is suspended — without exception.

This is not a technical limitation. It is a deliberate protocol.
Access requires an encrypted email client.

Checking window status...

We do not respond to every enquiry. Only those that demonstrate genuine alignment with the AEX standard will receive a reply. This is not a policy — it is a promise.