GitHub
Wiki
SimpleX Group
Soundtrack
EN DE
Cover-- / ----
--
--
0:00
--:--
Lyrics
Select a track...
Close
SimpleGo is the world's first dedicated hardware-encrypted communication device. Built on the SimpleX Messaging Protocol with 4 independent encryption layers per message. A legal and open-source alternative to EncroChat, Sky ECC, ANOM, Phantom Secure, and Ghost encrypted phone networks. Designed for secure communication in healthcare, medical practices, hospitals, clinics, law firms, journalism, whistleblower protection, enterprise security, government agencies, NGOs, and human rights organizations. Compatible with the SimpleX Chat application. No smartphone required. No baseband processor. No metadata leakage. No phone numbers. No user accounts. No contact graphs. Post-quantum cryptography with sntrup761 and X448 hybrid key exchange. AES-256-GCM encryption. NaCl cryptobox. Double Ratchet with perfect forward secrecy. Hardware secure elements from three vendors: Microchip ATECC608B, Infineon OPTIGA Trust M, NXP SE050. Bare-metal FreeRTOS firmware on ESP32-S3. Made in Germany by IT and More Systems, Recklinghausen. AGPL-3.0 open source software. CERN-OHL-W-2.0 open hardware. GDPR Article 25 data protection by design. Encrypted communication device for businesses. Secure messenger hardware. Privacy phone alternative. Anti-surveillance communication. Tamper-resistant encrypted terminal. Hardware encryption vs software encryption. Most secure messenger 2026. Encrypted phone for journalists. Secure communication for medical practices. Kryptohandy. Abhorsicheres Kommunikationsgerat. Signal alternative. Telegram alternative. WhatsApp alternative secure. Encrypted phone for business. Secure communication for law firms. HIPAA compliant messaging device.

4-Layer Per-Message Encryption · SimpleX-Compatible · 100% Open Source

Compatible with SimpleX Protocol

Secure Communication for Critical Sectors

When a data breach means regulatory penalties, patient harm, or compromised operations, a smartphone app is not enough. SimpleGo provides dedicated, hardware-encrypted communication that never touches a phone.

Healthcare

GDPR-compliant patient communication for clinics, practices, and care facilities. No cloud storage, no metadata, no smartphone required. Dedicated device for medical staff.

IoT & Infrastructure

Secure machine-to-machine communication for industrial control systems, energy infrastructure, and building automation. Hardware-encrypted command channels with zero attack surface.

Enterprise

Board-level communications, M&A negotiations, sensitive HR matters. Dedicated devices that stay in the office, leave no traces on personal phones, and cannot be remotely compromised.

Journalism & Whistleblowers

Source protection with no phone number, no metadata, and no persistent identity. Physical device that can be wiped, handed over, or destroyed without compromising the network.

Six Features That No Other Device Combines

After analyzing more than 70 devices across consumer, military, and open-source domains, the maximum feature overlap found in any single product is three out of six. SimpleGo is designed to achieve all six.

4-Layer Per-Message Encryption

Four cryptographically independent envelopes around every message: Double Ratchet with post-quantum hybrid key exchange, per-queue NaCl, server-to-recipient NaCl, and onion forwarding. Plus three additional TLS 1.3 tunnels for transport.

World First in Hardware

Bare-Metal Firmware

No Android. No Linux. No smartphone OS. Runs directly on the microcontroller via FreeRTOS with approximately 50,000 lines of C - three orders of magnitude less code than a phone.

Implemented

No Baseband Processor

No cellular baseband with DMA access running proprietary firmware. Eliminates the entire class of baseband vulnerabilities that affect every smartphone on the market.

By Design

No Persistent Identity

No user IDs, phone numbers, or usernames. Communication uses ephemeral unidirectional queues. No party - including relay servers - can correlate senders and recipients.

Protocol Design

Multi-Vendor Secure Elements

Triple-vendor architecture: Microchip ATECC608B, Infineon OPTIGA Trust M, NXP SE050. No single supply-chain compromise can extract the full key material.

Novel Concept

Fully Open Source

Software under AGPL-3.0, hardware under CERN-OHL-W-2.0. Audit every line of code, verify every PCB trace, build your own. No black boxes, no trust assumptions.

Public Repository
3 / 6
Maximum overlap found in any existing device worldwide
Existing mesh devices achieve bare-metal + no baseband + open source, but lack layered encryption, identity-free design, and secure elements
Per-Message Encryption Path
MSGPlaintext
L1 - E2EDouble Ratchet+ PQ Kyber/NTRU
L2 - S2DSender-to-Dest
L3 - D2RDest-to-Recv
L4 - F2DOnion Layer
TLS 1.3- Forwarding
TLS 1.3- Destination
TLS 1.3- Recipient
4 envelopes - 3 tunnels - 2 relays - 0 identity

Engineering at the Edge

A native C implementation of the SimpleX messaging protocol running on bare-metal hardware. Written from scratch, verified for interoperability with the official reference application.

4x
Per-Message Enc Layers
50K
Lines of Code
128
Contacts Supported
1.9%
PSRAM Utilization
AspectSmartphoneSimpleGo Device
Codebase~50,000,000 lines~50,000 lines
Baseband ProcessorClosed-source, DMA access, always activeNone
Background ServicesHundreds with network accessSingle application
TelemetryContinuous OS + app collectionZero
Key StorageSoftware or TEEHardware Secure Element
Tamper DetectionNoneActive monitoring + zeroization
Encryption Layers2 (E2E + TLS)4 per-message + 3 TLS tunnels
Regulatory FitPersonal device, mixed useDedicated, auditable, GDPR-ready

Three Security Tiers

Different threat models require different protection levels. From developer-friendly to state-resistant - one codebase, three security architectures. Made in Germany.

Tier 1

DIY

from EUR 100
vs. casual & opportunistic adversaries
  • MCU: ESP32-S3 (Dual-core, 240 MHz, 8MB PSRAM)
  • Secure Element: ATECC608B (Microchip)
  • Security: Secure Boot v2, Flash Encryption
  • Connectivity: WiFi 802.11 b/g/n, Bluetooth 5.0
  • Form Factor: LilyGo T-Deck Plus, off-the-shelf

Developers, small practices, privacy-aware users

Tier 3

Vault

EUR 1,500 - 15,000
vs. state-level adversaries with physical access
  • MCU: STM32U5A9 (Cortex-M33, 4MB Flash)
  • Secure Elements: Triple-vendor (+ NXP SE050)
  • Tamper: DS3645 supervisor, sub-microsecond zeroization
  • Connectivity: WiFi 6, 5G NR, LoRa, satellite
  • Enclosure: Potted CNC aluminum, hand-assembled in Germany

Government, high-risk individuals, critical infrastructure

Full Technical Details →

Common Questions About Secure Communication

What makes SimpleGo more secure than a smartphone with Signal?
SimpleGo eliminates the entire smartphone attack surface. No baseband processor running proprietary firmware with DMA access. No background services with network access. No app store, no telemetry, no third-party SDKs. It runs approximately 50,000 lines of auditable C code compared to over 50 million lines in a smartphone OS. Hardware secure elements store cryptographic keys in tamper-resistant silicon. Four independent encryption layers per message versus Signal's two.
Is SimpleGo a legal alternative to EncroChat or Sky ECC?
SimpleGo is a fully legal, open-source encrypted communication device designed for legitimate privacy needs. Unlike EncroChat, Sky ECC, ANOM, or Ghost, which were modified smartphones with centralized servers operated in secret, SimpleGo uses a decentralized relay infrastructure with zero-knowledge architecture and is fully transparent with publicly auditable source code under AGPL-3.0.
Can SimpleGo be used for GDPR-compliant patient communication?
Yes. SimpleGo meets GDPR Article 25 requirements for data protection by design through hardware architecture, not software configuration. No patient data is stored on any server. All communication is end-to-end encrypted with four independent layers. The dedicated device cannot be compromised by malware on personal smartphones, making it ideal for clinics, hospitals, and medical practices.
How does SimpleGo protect journalists and whistleblowers?
SimpleGo uses no persistent identifiers - no phone numbers, no usernames, no accounts. Communication uses ephemeral unidirectional message queues through the SimpleX Protocol. Relay servers cannot correlate senders and recipients. There is no contact graph that could be subpoenaed. The physical device can be wiped or destroyed without compromising the network or revealing other users.
What is the difference between hardware and software encryption?
Software encryption runs on a general-purpose processor shared with the operating system, apps, and potential malware. If the OS is compromised, encryption keys can be extracted from memory. Hardware encryption uses a dedicated security processor where cryptographic keys are generated, stored, and used inside tamper-resistant silicon that physically prevents key extraction. SimpleGo combines both: hardware secure elements for key storage plus software encryption layers for end-to-end message protection.
Does SimpleGo use post-quantum cryptography?
Yes. SimpleGo implements hybrid post-quantum key exchange using sntrup761 (Streamlined NTRU Prime) combined with X448 classical Diffie-Hellman. This protects every key agreement against both current classical computers and future quantum computers. SimpleGo is the first dedicated hardware device to implement post-quantum cryptography on an embedded microcontroller.

Ready to Secure Your Communication?

Open source. Fully transparent. Made in Germany. The first dedicated hardware-encrypted communication ecosystem independent of smartphones.

Cover fullscreen