After exhaustive analysis of more than 70 devices across consumer, military, criminal, and open-source domains — spanning EncroChat, Meshtastic, Bittium, Sectra Tiger, and dozens more — the maximum overlap found in any single device is three out of six.
Four cryptographically independent encryption envelopes around every single message: Double Ratchet E2E with post-quantum Kyber, per-queue NaCl, server-to-recipient NaCl, and onion forwarding layer. Three additional TLS 1.3 tunnels protect transport. No other messaging system implements this.
World First in HardwareNo Android. No Linux. No smartphone OS. Runs directly on the microcontroller via FreeRTOS with ~50,000 lines of C — three orders of magnitude less code than a phone.
✓ ImplementedNo cellular baseband with DMA access running proprietary firmware. Eliminates the entire class of baseband vulnerabilities documented in BASECOMP (USENIX '23).
✓ By DesignNo user IDs, phone numbers, or usernames. Communication uses ephemeral unidirectional queues. No party — including the server — can correlate senders and recipients.
SimpleX ProtocolTriple-vendor architecture: Microchip ATECC608B, Infineon OPTIGA Trust M, NXP SE050. No single supply-chain compromise can defeat the device. No existing product does this.
Never Done BeforeSoftware under AGPL-3.0, hardware under CERN-OHL-W-2.0. Audit every line, verify every trace, build your own. No black boxes. No trust required.
✓ Public RepositoryThe first third-party implementation of the SimpleX Messaging Protocol. Written from scratch in C, verified byte-for-byte against the official Haskell reference.
| Aspect | Smartphone | SimpleGo Device |
|---|---|---|
| Codebase | ~50,000,000 lines | ~50,000 lines |
| Baseband Processor | Closed-source, DMA access, always active | None |
| Background Services | Hundreds with network access | Single application |
| Telemetry | Continuous OS + app collection | Zero |
| Key Storage | Software or TEE | Hardware Secure Element |
| Tamper Detection | None | Active monitoring + sub-µs zeroization |
| Encryption Layers | 2 (E2E + TLS) | 4 per-message layers + 3 TLS tunnels |
| Disposability | Impractical ($500+) | Designed for it (from €100) |
The core protocol stack is fully functional. Bidirectional encrypted messaging between ESP32 hardware and the official SimpleX Chat application is confirmed and working.
Different threat models require different levels of protection. From maker-friendly to state-level resistant — one codebase, three security levels.
Developers, makers, privacy enthusiasts
Journalists, activists, legal professionals
Enterprise, government, high-risk individuals
SimpleGo builds dedicated encrypted communication devices that implement the SimpleX Messaging Protocol natively on bare-metal microcontrollers. Unlike encrypted phone solutions such as EncroChat, Sky ECC, or Phantom Secure which were all modified Android smartphones, SimpleGo devices contain no cellular baseband processor, no smartphone operating system, and no persistent user identity.
SimpleGo is the world's first native third-party implementation of the SimpleX Protocol outside the official Haskell reference codebase. The firmware runs on ESP32-S3 and STM32U5 microcontrollers with 4-layer per-message encryption using Double Ratchet with X3DH key agreement, per-queue NaCl cryptobox encryption, and additional server-to-recipient NaCl encryption.
Three hardware tiers are available: Model 1 Maker for DIY enthusiasts and developers starting at 100 Euro, Model 2 Shield with custom PCB and secure element for security-conscious users at 400 to 600 Euro, and Model 3 Vault with triple-vendor secure elements, CNC aluminum enclosure, and AMOLED display as the premium option from 1000 Euro. All devices are fully open source under AGPL-3.0 for software and CERN-OHL-W-2.0 for hardware designs.
SimpleGo is a German company based in Recklinghausen, NRW. The project operates free encrypted SMP relay servers hosted in Germany with full GDPR compliance, zero data collection, and optional Tor onion service access. Unlike smartphone-based encrypted messengers, SimpleGo devices have no app store, no cloud backup, no metadata leakage, and no baseband attack surface.
For journalists, activists, researchers, whistleblowers, lawyers, and anyone requiring the highest level of communication privacy, SimpleGo provides hardware-enforced security that cannot be compromised through software updates, app store policies, or baseband exploits. The device operates independently of any smartphone, cellular network, or tech platform.
Alternatives and comparisons: SimpleGo vs GrapheneOS Pixel, SimpleGo vs Purism Librem 5, SimpleGo vs PinePhone, SimpleGo vs Meshtastic, SimpleGo vs goTenna, SimpleGo vs Bittium Tough Mobile, encrypted messaging device comparison, best secure communication hardware 2026, encrypted phone alternative without baseband, dedicated messaging device without smartphone, SimpleX Protocol hardware implementation.