Secure and Resilient "On the Edge" Communication Terminal

Context and Motivation

This project will likely appeal to fans of post-apocalyptic fiction, tech-savvy preppers, and anyone interested in resilient, off-grid communication.


Imagine a world without networks, without Internet, without centralized infrastructure—yet with a vital need to communicate securely and discreetly. This terminal was designed exactly for that. Not to simulate a collapse scenario—but to function in one.

Secure communication is still a major challenge in a world where connected devices—smartphones, laptops, tablets—are obvious targets for increasingly sophisticated attacks. These systems, built on millions of lines of code across OS, drivers, firmware, and applications, expose massive attack surfaces. A single memory management flaw or side-channel access to a GPU can compromise the integrity of a message—even when encryption is used.

The mere use of the Internet reveals sensitive metadata: who is talking to whom, when, and from where. In some cases, raw data packets can even be intercepted and potentially decrypted later. Even well-regarded secure, open-source apps rely on enormous software stacks that are nearly impossible to fully audit.

This project is a response to that reality: a self-contained, network-free, OS-free, app-free device designed with a single, uncompromising goal—to exchange textual and geolocation data in a completely secure, untraceable, and infrastructure-independent way.

Encryption is only a problem when the key is shorter than the message.
Here, it’s the opposite: short messages are protected using long, disposable, time-synchronized keys, drawn from a preloaded sequence that far exceeds the total volume of exchanged data.

Project Goal

This project proves that a well-designed, minimalist embedded system can offer stronger communication security than most modern consumer tech. It enables text and GPS coordinate exchange in offline environments, with high reliability and confidentiality. Thanks to LORA radio, it provides long-range communication, low power consumption, and strong resilience to jamming or interception.

Each message is encrypted using AES-256, with a new key selected every two minutes, synchronized between terminals using either GPS time or an ultra-stable RTC. These keys are stored in sequence on an SD card and are destroyed immediately after use, making post-capture decryption impossible.

Device Overview

The terminal is built around a Raspberry Pi Pico microcontroller—chosen specifically for its simplicity and lack of opaque or inaccessible subsystems. A 3.5" SPI-connected IPS touchscreen offers a smooth interface for navigating between the message composer, address book, GPS tools, radio setup, and repeater mode.

Messages are typed using a standard USB keyboard connected via GPIO-based USB Host emulation—no proprietary chips required. This provides user comfort with a commonly available peripheral while keeping hardware costs and complexity low.

GPS coordinates are provided by a NEO-M6 module. Synchronization is handled by either GPS or a DS3231 real-time clock, which can remain accurate to within seconds for many months without adjustment.

The radio module is a LORA E22 400T, operating in the 410–480 MHz band. In favorable conditions, it offers a range of several tens of kilometers and reliable operation in semi-urban terrain. Transmission power and data rate can be dynamically adjusted for range or energy savings. Reed-Solomon error correction is implemented in software to improve reliability under poor radio conditions.

The terminal can act as a repeater, bridging two areas that cannot directly communicate. Messages are sent in fixed-length frames. The first frame includes source and destination addresses, optional GPS data, and 48 message characters. A second frame can carry 112 additional characters. GPS navigation tools allow users to compute distance and azimuth...

Read more »