Skip to main content

SimpleGo Security

Security

SimpleGo's security architecture is built on the principle that every layer must be independently defensible. Compromising one layer must not weaken any other.

Four Encryption Layers Per Message

LayerAlgorithmProtects Against
1. Double Ratchet (E2E)X3DH (X448) + AES-256-GCMEnd-to-end interception. PFS + post-compromise security.
2. Per-Queue NaClX25519 + XSalsa20 + Poly1305Traffic correlation between queues
3. Server-to-Recipient NaClNaCl cryptoboxCorrelation of server I/O frames
4. TLS 1.3mbedTLS, ALPN smp/1Network-level attackers

Content padding to 16 KB fixed blocks at every layer. A network attacker sees only equal-sized packets.

No Persistent Identity

No user IDs, phone numbers, or usernames. Communication uses ephemeral unidirectional queues. No party - including the server - can correlate senders and recipients.

No Baseband Processor

No cellular modem with DMA access running proprietary firmware. This eliminates the entire class of baseband vulnerabilities documented in academic research (BASECOMP, BaseMirror).

Three Hardware Classes

SimpleGo implements security across three hardware tiers, from development boards to high-security devices with triple-vendor secure elements.

FeatureClass 1 (ESP32)Class 2 (STM32 + SE)Class 3 (STM32 + Triple SE)
Key StorageeFuse HMAC-derivedSecure Element (EAL5+)Triple SE (EAL5+/6+)
Security Modes4 (Open/Vault/Fortress/Bunker)21 (always maximum)
Cost to Read Keys$2,000+ with vault$30,000+$200,000+ (3 vendors)
TargetAlpha testers, KickstarterJournalists, activistsHigh-risk individuals

Security Documentation

Hardware Class 1 Deep Dive (12 Documents)

#Document
01Overview and Threat Model
02ESP32-S3 eFuse Architecture
03HMAC-Based NVS Encryption
04Known Vulnerabilities and Attack Research
05Attack Equipment Economics
06Runtime Memory Protection
07Post-Quantum Readiness
08Flash Encryption Deep Dive
09Secure Boot V2
10Four Security Modes
11ESP32-P4 Evolution Path
12Implementation Plan

Hardware Class 2 and 3

Known Vulnerabilities

SimpleGo maintains an honest, public inventory of all known security gaps. No finding is downplayed or hidden.

IDSeverityDescriptionStatus
SEC-01CriticalDecrypted messages in PSRAM never zeroedOpen (Session 45)
SEC-02CriticalNVS keys plaintext (no HMAC vault yet)Open (Session 45)
SEC-03Highmemset instead of zeroize in smp_storage.cClosed (Session 42)
SEC-04HighNo memory wipe on display timeoutOpen (Session 45)
SEC-05MediumHKDF info parameter lacks device bindingOpen (resolves with SEC-02)
SEC-06MediumPost-quantum not yet activeDeferred (verified feasible)

See Known Vulnerabilities for the complete analysis including all published ESP32 CVEs and attack research.