4-Layer Per-Message Encryption · Native SimpleX Protocol · 100% Open Source

“This is literally the most private and secure device that is possible.”
Evgeny Poberezkin — Creator of the SimpleX Protocol, MoneroTopia 2026

No Device Has Ever Combined These Six Features

After exhaustive analysis of more than 70 devices across consumer, military, criminal, and open-source domains — spanning EncroChat, Meshtastic, Bittium, Sectra Tiger, and dozens more — the maximum overlap found in any single device is three out of six.

4-Layer Per-Message Encryption

Four cryptographically independent encryption envelopes around every single message: Double Ratchet E2E with post-quantum Kyber, per-queue NaCl, server-to-recipient NaCl, and onion forwarding layer. Three additional TLS 1.3 tunnels protect transport. No other messaging system implements this.

World First in Hardware

Bare-Metal Firmware

No Android. No Linux. No smartphone OS. Runs directly on the microcontroller via FreeRTOS with ~50,000 lines of C — three orders of magnitude less code than a phone.

✓ Implemented

No Baseband Processor

No cellular baseband with DMA access running proprietary firmware. Eliminates the entire class of baseband vulnerabilities documented in BASECOMP (USENIX '23).

✓ By Design

No Persistent Identity

No user IDs, phone numbers, or usernames. Communication uses ephemeral unidirectional queues. No party — including the server — can correlate senders and recipients.

SimpleX Protocol

Multi-Vendor Secure Elements

Triple-vendor architecture: Microchip ATECC608B, Infineon OPTIGA Trust M, NXP SE050. No single supply-chain compromise can defeat the device. No existing product does this.

Never Done Before

Fully Open Source

Software under AGPL-3.0, hardware under CERN-OHL-W-2.0. Audit every line, verify every trace, build your own. No black boxes. No trust required.

✓ Public Repository
3 / 6
Maximum overlap found in any existing device worldwide
Meshtastic, MeshCore, Reticulum — bare-metal + no baseband + open source only
Per-Message Encryption Path
MSGPlaintext
L1 · e2eDouble Ratchet+ PQ Kyber/NTRU
L2 · s2dSender→Dest
L3 · d2rDest→Recv
L4 · f2dOnion Layer
TLS 1.3→ Forwarding
TLS 1.3→ Destination
TLS 1.3→ Recipient
4 envelopes · 3 tunnels · 2 relays · 0 identity · Signal: 2 layers · WhatsApp: 2 · Military max: 3

Engineering at the Edge

The first third-party implementation of the SimpleX Messaging Protocol. Written from scratch in C, verified byte-for-byte against the official Haskell reference.

Per-Message Enc Layers
50K
Lines of Code
128
Contacts Supported
1.9%
PSRAM Utilization
AspectSmartphoneSimpleGo Device
Codebase~50,000,000 lines~50,000 lines
Baseband ProcessorClosed-source, DMA access, always activeNone
Background ServicesHundreds with network accessSingle application
TelemetryContinuous OS + app collectionZero
Key StorageSoftware or TEEHardware Secure Element
Tamper DetectionNoneActive monitoring + sub-µs zeroization
Encryption Layers2 (E2E + TLS)4 per-message layers + 3 TLS tunnels
DisposabilityImpractical ($500+)Designed for it (from €100)
12
Milestones Complete
2
In Progress
100%
Open Source
v0.1.17
Current Alpha

Project Status

The core protocol stack is fully functional. Bidirectional encrypted messaging between ESP32 hardware and the official SimpleX Chat application is confirmed and working.

TLS 1.3 Transport
SMP Handshake & Queue Ops
X3DH Key Agreement
Double Ratchet Encryption
4-Layer Per-Message Encryption
Wire Format Encoding
Bidirectional Messaging
Delivery Receipts ✓✓
Multi-Contact (128)
Persistent Crypto State
FreeRTOS Multi-Task
Hardware Abstraction Layer
Contact Management UI
Keep-Alive (PING/PONG)
SD Card Encrypted History
Custom Hardware (Tier 2/3)
Independent Security Audit
Kickstarter Campaign
1
Codebase
All tiers, one firmware
3
Threat Models
Casual → Skilled → State
3
SE Vendors
Microchip · Infineon · NXP
🇩🇪
Made in Germany
Hand-assembled, tested

Three Security Tiers

Different threat models require different levels of protection. From maker-friendly to state-level resistant — one codebase, three security levels.

Tier 1

DIY

€100–500
vs. casual & opportunistic adversaries
  • MCU: ESP32-S3 (Dual-core, 240 MHz, 8MB PSRAM)
  • Secure Element: ATECC608B (Microchip)
  • Security: Secure Boot v2, Flash Encryption
  • Connectivity: WiFi 802.11 b/g/n, Bluetooth 5.0
  • Form Factor: LilyGo T-Deck Plus, off-the-shelf

Developers, makers, privacy enthusiasts

Tier 3

Vault

€1,500–15,000
vs. state-level adversaries with physical access
  • MCU: STM32U5A9 (Cortex-M33, 4MB Flash)
  • Secure Elements: Triple-vendor (+ NXP SE050)
  • Tamper: DS3645 supervisor, sub-µs zeroization
  • Connectivity: WiFi 6, 5G NR, LoRa, satellite
  • Enclosure: Potted CNC aluminum, hand-assembled in Germany

Enterprise, government, high-risk individuals

Full Technical Details →

Ready to Build the Future of Privacy?

Open source. Fully transparent. Community-driven. Join the first hardware-based encrypted messaging ecosystem independent of smartphones.