Dedicated Hardware for Uncompromised Privacy

SimpleGo is the world's first native C implementation of the SimpleX Messaging Protocol, running on bare-metal microcontrollers. No smartphones. No app stores. No baseband processors. No metadata. No user identity of any kind. Purpose-built from the ground up for one thing: private communication that cannot be traced back to you.

Smartphones Were Never Designed for Privacy

Every smartphone shares fundamental architectural weaknesses that cannot be patched away. The attack surface isn't a bug. It's the design. Even "hardened" phones like GrapheneOS or the Purism Librem 5 merely isolate the threats rather than eliminate them.

The Baseband Problem

Every smartphone contains a secondary computer running proprietary firmware with DMA access to main memory. The BASECOMP study (USENIX Security '23) found 29 critical vulnerabilities in Samsung and MediaTek baseband firmware. BaseMirror uncovered 873 undisclosed commands and 8 zero-days in Samsung Exynos devices. Even the Purism Librem 5 merely isolates the baseband on a separate M.2 card connected via USB. The Bittium Tough Mobile 2C, a EUR 2,000 NATO-certified device, still runs on a Qualcomm Snapdragon with an integrated baseband. No smartphone eliminates this attack vector. SimpleGo has no baseband processor at all.

50 Million Lines of Attack Surface

A modern smartphone runs approximately 50,000,000 lines of code across OS, drivers, and background services. Hundreds of processes run simultaneously with network access. Telemetry is continuous and unavoidable. Even GrapheneOS or CalyxOS cannot eliminate the fundamental complexity of a general-purpose computer pretending to be a secure communications device. The criminal encrypted phone networks (EncroChat with 60,000 users, Sky ECC with 170,000 users, FBI honeypot ANOM) were all compromised because they ran on modified Android or BlackBerry smartphones. SimpleGo runs approximately 50,000 lines of auditable C code on a single-purpose microcontroller.

Metadata Reveals Everything

Even with end-to-end encryption, smartphones leak metadata: who you talk to, when, how often, your location, your contacts graph, your behavioral patterns. As former NSA General Counsel Stewart Baker stated: "Metadata absolutely tells you everything about somebody's life." Standard E2E protocols like Signal protect message content but the servers still know exactly who is communicating with whom. SimpleX is the only messaging protocol where relay servers cannot determine sender-recipient relationships because communication happens through ephemeral unidirectional queues with no user identifiers of any kind.

What you did is impressive. It seems like you're the first third-party SMP implementation.
Evgeny Poberezkin Founder & Lead Developer, SimpleX Chat

Seven Independent Encryption Layers, Four Per Message

SimpleGo implements the complete SimpleX Protocol with seven independent encryption layers. Four nested cryptographic envelopes protect every single message, traveling through three separate TLS 1.3 tunnels via two relay servers. Content is padded to fixed 16KB block sizes at each layer. No other messaging protocol or hardware device implements anything comparable.

4
Application Layers
3
TLS 1.3 Tunnels
16 KB
Fixed Block Padding
0
User Identifiers

Four Application Envelopes

Each message sent through SimpleX is wrapped in four independent cryptographic envelopes before reaching the transport layer. Every envelope serves a distinct defensive purpose, and each one uses different keys, different algorithms, and different nonces. Compromising one layer does not weaken any other.

Layer 1: Double Ratchet E2E. The innermost layer provides end-to-end encryption with perfect forward secrecy and post-compromise security. It uses X3DH key agreement with Curve448, AES-256-GCM for message encryption, and a new symmetric key for every single message. Since SimpleX v5.6, this layer is augmented with hybrid post-quantum key exchange using CRYSTALS-Kyber and Streamlined NTRU Prime for protection against future quantum computers.

Layer 2: Sender to Destination Relay. A per-queue NaCl cryptobox (X25519 + XSalsa20-Poly1305) unique to each message queue. This layer prevents traffic correlation between different queues if the TLS tunnel to the destination relay is compromised. Each queue has its own independently generated X25519 keypair.

Layer 3: Destination Relay to Recipient. An additional NaCl encryption layer between the destination relay server and the recipient, preventing the server from correlating incoming messages with outgoing deliveries even if TLS is compromised.

Layer 4: Forwarding Relay to Destination (Onion). Since SimpleX v5.8, messages travel through two relay servers using onion-style routing. The forwarding relay encrypts toward the destination relay, creating a 2-hop path where neither relay has a complete picture. This is what SimpleX calls Private Message Routing (PMR), and it prevents relay servers from constructing communication graphs based on IP addresses.

7-Layer Protocol Stack
4 application envelopes + 3 transport tunnels
L1
Double Ratchet E2E
X3DH (Curve448) + AES-256-GCM + PFS
Hybrid PQ: CRYSTALS-Kyber + NTRU Prime
L2
Sender → Destination NaCl
Per-queue X25519 + XSalsa20-Poly1305
Unique keypair per queue, prevents correlation
L3
Destination → Recipient NaCl
Server re-encryption with recipient key
Prevents in/out traffic correlation at relay
L4
Forwarding → Destination (Onion)
2-hop onion routing via PMR (since v5.8)
Neither relay sees complete sender-recipient path
L5 TLS 1.3
→ Fwd Relay
L6 TLS 1.3
→ Dest Relay
L7 TLS 1.3
→ Recipient
+ fixed 16KB block padding at each encryption layer
Independently Audited
The Trail of Bits cryptographic design review (July 2024) assessed SimpleX's SMP protocol and found it sound, with formal verification of the queue negotiation protocol.
AspectSmartphoneSimpleGo Device
Codebase Size~50,000,000 lines (Android/iOS)~50,000 lines (auditable C)
Baseband ProcessorClosed-source, DMA access, always activeNone. Eliminated by design.
Operating SystemAndroid/iOS (general-purpose, 100s of services)FreeRTOS bare-metal (single-purpose firmware)
Background ServicesHundreds with network access, telemetrySingle application, zero telemetry code
User IdentityPhone number, IMEI, Apple/Google ID, SIMNone. SimpleX Protocol has no user identifiers.
Encryption Layers per Message2 (E2E + TLS)7 (4 application envelopes + 3 TLS tunnels)
Metadata ProtectionMinimal. Server sees sender + recipient.Complete. No party can correlate communicants.
Key StorageSoftware keychain or single TEEHardware Secure Elements (up to 3 vendors)
Tamper DetectionNone or verified boot onlyActive monitoring + sub-microsecond zeroization (Tier 2/3)
Message StorageSQLite on phone flash, app sandboxAES-256 encrypted MicroSD, PIN-protected, portable
Contact CapacityUnlimited (phone resources)150+ contacts (520 bytes ratchet state each)
DisposabilityImpractical ($500+, identity-bound)Designed for it (from EUR 100, no identity)

Six Security Features No Device Has Ever Combined

After exhaustive research across more than 70 devices and platforms spanning consumer, military, criminal, DIY, and mesh-networking domains, the maximum feature overlap found in any single device is three out of six. SimpleGo targets all six.

Multi-Layer Per-Message Encryption

Four independent cryptographic envelopes around every single message, each using different keys and algorithms. No hardware device implements SimpleX Protocol's triple-layer architecture, let alone the full 4+3 stack. The maximum found in any existing device was two layers (Meshtastic v2.5+ or GSMK CryptoPhone).

Bare-Metal Firmware

No Android, no iOS, no Linux, no general-purpose OS. SimpleGo runs directly on FreeRTOS with a single-purpose firmware. Approximately 50,000 lines of C code compared to 50 million in a smartphone. Every line is auditable. The entire firmware compiles from source in under 60 seconds.

No Baseband Processor

Not isolated. Not firewalled. Not on a separate bus. Simply not present. The ESP32-S3 and STM32U5 microcontrollers have no cellular modem at all. Network connectivity is provided through WiFi, and optionally through external 4G/5G or LoRa modules that are electrically separate from the crypto engine.

No Persistent Identity

SimpleX Protocol uses no phone numbers, no usernames, no cryptographic keys as identity, no accounts, and no central directory. Communication happens through ephemeral unidirectional message queues. A factory reset produces a cryptographically unrelated device. There is nothing to subpoena.

Triple-Vendor Secure Elements

The Tier 3 Vault uses secure elements from three different manufacturers: Microchip ATECC608B, Infineon OPTIGA Trust M, and NXP SE050. This concept has never appeared in any commercial product, military device, or academic prototype. The NinjaLab "Eucleak" attack (2024) proved that even EAL5+-certified chips from a single vendor can harbor critical flaws for 14 years.

Fully Open Source

Every line of firmware code is published under AGPL-3.0. Every PCB trace is documented under CERN-OHL-W-2.0. No binary blobs. No proprietary modules. The entire device can be built from source by anyone with a compiler and a soldering iron. Security through transparency, not through obscurity.

6 / 6
Target features. The closest existing device achieves 3/6.
Meshtastic, MeshCore, Reticulum: bare-metal + no baseband + open source (3/6)

Three Security Tiers, One Codebase

Different threat models require different levels of protection. The same firmware runs across all tiers. Security features activate based on detected hardware capabilities. All devices are fully functional messaging devices from day one. Made in Germany.

Tier 1

DIY from EUR 100

Threat model: Protection against casual surveillance, mass data collection, and opportunistic adversaries. You buy the development board yourself, flash SimpleGo firmware via our web tool, and have a working secure messenger within minutes.

Processor
ESP32-S3 (Dual-Core Xtensa LX7)
240 MHz, 512KB SRAM, 8MB PSRAM, 16MB Flash. Built-in Secure Boot v2 and Flash Encryption (AES-256-XTS) via eFuse keys. Hardware AES acceleration for storage encryption. WiFi 802.11 b/g/n and Bluetooth 5.0 LE.
Encryption
Full SimpleX Protocol Stack
All 7 encryption layers implemented natively in C. Double Ratchet with X3DH (Curve448), XSalsa20-Poly1305 per-queue encryption, Ed25519 signing. The first and only third-party implementation of the complete SimpleX Messaging Protocol outside the official Haskell codebase.
Storage
NVS + Encrypted MicroSD
Cryptographic keys and ratchet state (520 bytes per contact) in NVS flash with optional eFuse encryption. Chat history on MicroSD card with AES-256-GCM encryption and user PIN protection. The SD card is portable between SimpleGo devices. Up to 128GB storage supporting millions of text messages or 128,000+ voice messages.
Form Factor
LilyGo T-Deck Plus
Off-the-shelf development board with 2.8" IPS display, physical QWERTY keyboard, trackball navigation, built-in microphone, MicroSD slot, 2000 mAh battery. Available worldwide for approximately EUR 70-90. No soldering required.
Connectivity
WiFi + Optional LoRa
WiFi 802.11 b/g/n for relay server communication. The T-Deck Plus includes an SX1262 LoRa transceiver for future mesh messaging capabilities. Bluetooth 5.0 LE available for local device pairing.
Contacts & Capacity
150+ Contacts, Unlimited Messages
Each contact requires only 520 bytes of ratchet state in NVS (128KB), supporting over 150 active contacts. SD card message storage is practically unlimited: a 128GB card holds approximately 256 million text messages, 128,000 one-minute voice messages, or 42,000 photos. At typical mixed usage (50 texts, 5 photos, 3 voice messages per day), storage lasts approximately 19 years.

Target audience: Developers, privacy enthusiasts, tinkerers, security researchers. Anyone comfortable buying a development board and flashing firmware. Full source code access. Community-driven development.

Tier 2 · Recommended

Secure EUR 500 – 1,500

Threat model: Protection against skilled adversaries with physical access and equipment. Journalists, lawyers, activists, corporate executives, human rights workers operating in hostile environments. A production-ready device that you use out of the box.

Main Processor
STM32U585 (ARM Cortex-M33)
ARM TrustZone hardware isolation separating secure and non-secure execution worlds. Secure boot chain with root-of-trust, encrypted flash, hardware TRNG (True Random Number Generator), and AES/SHA hardware accelerators. All cryptographic operations execute in the isolated TrustZone secure world, inaccessible to application code.
WiFi Module
ESP32-C6 (WiFi 6 + BLE 5)
Dedicated wireless module electrically separated from the main crypto processor. The ESP32-C6 handles network I/O only and has no access to plaintext messages or cryptographic keys. WiFi 6 (802.11ax) for improved range and power efficiency. Communication with the main MCU through a defined serial interface.
Secure Elements
Dual-Vendor: ATECC608B + OPTIGA Trust M
Two independent hardware key vaults from two different manufacturers (Microchip + Infineon). Identity keys are generated inside the secure elements and never leave the silicon. If one vendor's implementation is compromised (as happened with Infineon's SLE78 in the Eucleak attack), the other provides fallback integrity. ECDSA/ECDH, SHA-256, AES-128, monotonic counters, and tamper-resistant key storage.
Tamper Detection
Active Physical Monitoring
Light sensors for enclosure breach detection. Battery-backed SRAM for power analysis protection. PCB mesh traces for drilling and probing detection. Automatic key zeroization on tamper event. The device detects physical intrusion attempts and destroys all cryptographic material before an attacker can extract it.
Enclosure
CNC-Milled Aluminum
Custom PCB design in a precision-machined aluminum enclosure. Hand-assembled and individually tested in Germany. Optional 4G LTE connectivity through an external cellular module (electrically separate from crypto engine). LoRa option available for mesh networking scenarios.
Storage Architecture
TrustZone-Isolated Key Storage + Encrypted SD
Cryptographic keys stored in TrustZone secure flash with hardware-enforced access control. Chat history on PIN-encrypted MicroSD. Same portable SD card format as Tier 1 for cross-device message transfer. Backup and restore functionality with password-encrypted archive files.

Target audience: Professionals who need strong physical security without understanding the technology. Journalists in hostile countries, lawyers handling sensitive cases, corporate security teams, NGO workers, whistleblowers. A device that protects you even if someone takes it from your hands.

Tier 3

Vault EUR 1,500 – 15,000

Threat model: Protection against state-level adversaries with physical access, lab equipment, and unlimited time and resources. Comparable to military-grade TEMPEST devices, but fully open source and without identity binding.

Main Processor
STM32U5A9 (Cortex-M33, 4MB Flash, 2.5MB SRAM)
Maximum specification STM32U5 with full TrustZone implementation, hardware crypto accelerators (AES, SHA, PKA, TRNG), and 2.5MB SRAM for complex cryptographic operations. Firmware path to CRYSTALS-Kyber post-quantum cryptography for protection against future quantum computing attacks.
Secure Elements
Triple-Vendor: ATECC608B + OPTIGA + NXP SE050
Three secure elements from three different manufacturers, a concept that has never appeared in any commercial product, military device, academic prototype, or published patent. The Keystone 3 Pro hardware wallet comes closest with three chips from only two vendors. The NinjaLab "Eucleak" attack proved that a CC EAL5+-certified Infineon chip harbored a critical side-channel vulnerability for 14 years. Triple-vendor diversification means no single supply-chain compromise can expose all identity keys.
Tamper Supervisor
Maxim DS3645 with Sub-Microsecond Zeroization
Dedicated tamper supervisor IC providing 24/7 battery-backed monitoring even when the device is powered off. Temperature anomaly detection, voltage glitch monitoring, enclosure breach sensors, PCB mesh integrity verification. On tamper detection, all cryptographic material is destroyed in sub-microsecond timeframes, faster than any extraction equipment can operate. Comparable to the Boeing Black's self-destruct capability, but verifiable because the design is open source.
Enclosure & Assembly
Epoxy-Potted CNC Aluminum, Hand-Assembled
CNC-milled aluminum case with epoxy potting compound protecting circuit board traces against physical probing. TEMPEST-aware RF shielding to prevent electromagnetic emanation analysis. Premium AMOLED display. Laser-engraved serial numbers. Each device hand-assembled, individually tested, and photographically documented during production. Made in Germany like a luxury timepiece.
Connectivity Options
WiFi 6, 5G NR, LoRa, Satellite
WiFi 6 standard. Optional 5G New Radio module (electrically isolated, no DMA access to crypto engine). LoRa for off-grid mesh messaging. Satellite connectivity option for communication in areas without terrestrial infrastructure. All connectivity modules are electrically separate from the main processor and secure elements.
Post-Quantum Ready
CRYSTALS-Kyber + NTRU Prime Firmware Path
The STM32U5A9 has sufficient computational resources for post-quantum key encapsulation. SimpleX Protocol already supports hybrid classical + PQ key exchange since v5.6 using CRYSTALS-Kyber and Streamlined NTRU Prime. The Vault will implement this as a firmware update, providing protection against "harvest now, decrypt later" attacks by nation-state adversaries.

Target audience: Heads of state, intelligence professionals, defense contractors, ultra-high-net-worth individuals, organizations operating under direct state-level threat. People who need the absolute maximum achievable security in a communications device and are willing to pay for it.

Development Progress

SimpleGo is in active development across 35+ engineering sessions. The Tier 1 firmware is functional today with bidirectional encrypted messaging between ESP32 and the official SimpleX Chat app. Here is exactly what works, what is in progress, and what comes next.

Working Features

Bidirectional encrypted messaging
Double Ratchet (X3DH + AES-256-GCM)
Per-queue NaCl encryption (L2/L3)
TLS 1.3 (ChaCha20-Poly1305)
Ratchet state persistence (survives reboot)
Delivery receipts (sent/delivered)
Multi-contact support (150+)
SD card storage (64GB verified)
NTP time synchronization
Contact management (add/delete)
DisplayName extraction from peer
PING/PONG keep-alive
Ed25519 signing (SPKI format)
Zstd decompression for ConnInfo
LVGL touch UI with chat bubbles
Hardware keyboard input

In Progress

Encrypted chat history on SD card
PIN-protected SD encryption
Contact list with last message preview
German umlaut display (LVGL font)

Planned

XFTP encrypted file transfers
Voice messages (Opus codec)
QR code scanning for invitations
Private Message Routing (PMR/L4)
Multi-server support
Group messaging
NVS encryption with eFuse keys
Encrypted backup/restore
Post-quantum CRYSTALS-Kyber
Custom PCB for Tier 2/3

Fully Open Source

Security through obscurity is no security at all. Every line of SimpleGo code is publicly auditable. Every PCB trace will be documented. Trust is earned through transparency, not promised through marketing. The goTenna Pro X2 (a closed-source military messenger priced at $1,000-$2,000) had four critical vulnerabilities disclosed by CISA in 2024 including unauthenticated public key manipulation. Open source prevents this.

Software
AGPL-3.0

Copyleft license aligned with SimpleX Chat. All derivatives and network service modifications must remain open source. Fork it, audit it, improve it.

Hardware
CERN-OHL-W-2.0

CERN Open Hardware License. Schematics, PCB layouts, bill of materials. Build your own device from scratch with off-the-shelf components.

Start Building Today

The Tier 1 DIY firmware is functional now. Buy a LilyGo T-Deck Plus, flash the firmware through your browser, and start messaging securely with anyone running the SimpleX Chat app. No account required. No phone number. No identity.