- SimpleX avoids persistent identifiers and protects metadata using one-way queues.
- Out-of-band key verification is essential against MITM attacks.
- OPSEC: Isolated devices and networks, encrypted backups, separate habits.
- Self-hosting SMP/XFTP over Tor increases control and reduces reliance on third parties.
¿How to create a secure anonymous profile in SimpleX Chat without phone or email? In a world where every click leaves a trace, creating a profile that doesn't reveal your true identity is key. With SimpleX Chat, you can communicate without tying your account to a number or email, and do so with robust measures that protect both content and metadata. The goal of this guide is to have an anonymous and operational profile in SimpleX without phone or email, minimizing risks from the first minute.
In addition to practical steps, here you'll find essential security concepts, common threats (such as man-in-the-middle attacks), and recommendations on which apps and architectures to use or avoid. We integrate OPSEC best practices, self-hosting options, and ecosystem alternatives., so you can choose the balance between comfort and protection that best suits you.
What is SimpleX Chat and why it's different
SimpleX Chat is based on the SMP protocol, which uses one-way queues to deliver messages through intermediate servers without assigning persistent IDs to users. Each connection uses pairs of independent, ephemeral queues, as if you had different “accounts” per contact, making it difficult to connect your interactions with each other.
The servers (SMP for messaging and XFTP for files) only act as a bridge: they temporarily store and forward, without knowing the real identity or maintaining sensitive data beyond what is essential for delivery. The source IP is hidden from the recipient and client-server connections travel encrypted and authenticated., increasing resistance to correlations.
End-to-end encryption protects content from third parties and is designed with post-quantum resilience in mind. The client's local database is encrypted and portable, which allows you to securely export/backup your profile. Optionally, audio/video calls via WebRTC are supported, for which you'll need ICE/TURN servers.
Another key difference: the first public key is not exchanged over the same channel as the messages, which reduces the attack surface at startup. SimpleX favors initial key exchange over an out-of-band channel (e.g., by showing a QR code in person), which reinforces the integrity of the connection.
Real Threats: Man-in-the-Middle Attacks and Key Verification
A man-in-the-middle (MITM) attack involves interposing between two people who believe they are speaking directly, in order to reread and re-encrypt each message. If an attacker replaces the public key during the initial exchange, you can read everything without altering the content, and your interlocutors will think that it is still end-to-end encrypted.
Whenever the key exchange occurs over the same channel as the messaging, the risk is greater. SimpleX reduces that exposure by forcing the initial exchange out of bandHowever, if the alternative channel is also compromised (for example, an insecure messenger), the attacker could slip through. Therefore, it's a good idea to verify the fingerprint/security code in person or through a truly trusted channel.
For reference, other popular apps (Signal, WhatsApp) also include key verification features to mitigate MITM. Verifying the integrity of the exchange is a non-negotiable practice. if you are looking for anonymity and lasting confidentiality.
Beyond the content, there is metadata (time sent, size, connection patterns). SimpleX's design minimizes what a server learns from you, but your threat model should take into account usage habits, networks you connect from, and compromised devices; if you need to identify profiles, consult how to know who is behind a Facebook profile.
Finally, remember that the website stalks you with cookie banners like “We value your privacy.” Accepting cookies on third-party sites (such as Reddit) increases tracking and correlation, so reduce that friction if you're worried about the footprint.
Create an anonymous profile in SimpleX without phone or email (step by step)
SimpleX doesn't require a phone number or email address to create your identity, but anonymity doesn't come without a price: it requires a method. Follow these guidelines to maximize anonymity from the first start. and prevent unintentional leaks.
1) Secure installation
Download SimpleX Chat from official sources for your platform (Android, iOS, Windows, macOS, Linux). Avoid unverified stores or repos and check signatures whenever possible., especially on the desktop. Keep the client updated to receive security patches.
2) Isolate the device and the network
The more separate your new identity is from your previous habits, the better. If you can, use a dedicated device. Connect through Tor or a trusted VPN to break IP correlations., and consider using Wi-Fi that doesn't associate your real identity. Don't reuse networks you use under your name.
3) Start the profile without personal data
When you first log in, don't include a name, photo, or description that could identify you. Activate "incognito mode" to hide your name and image from new contacts. SimpleX allows you to operate without static identifiers, take advantage of it and avoid any clues that might give you away.
4) Add contacts safely
The most robust route is to scan QR codes face-to-face. If this isn't possible, route the link through an alternative channel with strong encryption and identity verification (e.g., learn how to make anonymous chats on Telegram). Then, verify the fingerprint/security code with your contact. by a reliable means (preferably in person), to rule out MITM.
5) Separation by contexts
Because SimpleX uses queues per connection, it creates distinct identities or connections for different areas (work, activism, friendships). This way you avoid a commitment on one front from spilling over to the rest. and reduce the correlation surface.
6) Privacy and storage settings
Enable PIN/biometric app lock, disappearance timers, and discreet notifications. Export the encrypted database only if you need it, and save the backup offline (encrypted USB), without mixing it with personal accounts.
7) File transfer
For files, SimpleX uses XFTP. It assesses what you upload and from where. If you can, use trusted or self-hosted XFTP servers, preferably accessible via Tor, to minimize metadata exposure.
8) Voice and video calls
SimpleX supports WebRTC calls. Configure ICE/TURN servers that don't keep logs and, if possible, are under your control. Avoid providers that link the account to the phone or email, and review log policies.
9) Groups and dissemination
Sharing a group link is convenient, but moderation control depends on the group owner. If that profile is lost, the group is left orphaned. For sensitive groups, use access links wisely and renew roles periodically., with managers operating strictly separate profiles.
Self-Hosting SimpleX: SMP and XFTP Servers (Advanced Optional)
If your threat requires eliminating third-party services, set up your own. You can deploy SMP (messaging) and XFTP (files) servers, and choose ICE/TURN for WebRTC. Self-hosting reduces the need to rely on third-party providers and allows you to set logging policies (ideally, none).
Where to host? On your own infrastructure or on a VPS. A VPS often requires payment/identification information, and the provider may release logs under court order. Whenever possible, expose services via Tor (.onion) and limit their visibility on the Internet., minimizing surface area and dependence on DNS.
Keep in mind that deploying Signal-Server is complex and expensive; however, setting up SMP/XFTP is feasible for modest technical teams. Document access, backups, and key rotation to avoid creating single points of failure.
Key technical concepts for decision making
Architectures: client-server (fast, centralized), P2P (direct, more fragile if the two ends do not match), and mesh (nodes that forward). Federation allows servers to talk to each other, as in XMPP or mail, at the cost of more metadata in transit.
End-to-end encryption protects content, but does not remove all metadata (times, size, relationship between interlocutors). Information security is summarized in confidentiality, integrity and availability: encrypts content, signs/verifies keys, and plans redundancies to continue communicating.
“Server” can mean software (like Prosody for XMPP) or machine/domain (xmpp.is, xabber.org, etc.). When comparing options, distinguish between implementation and concrete deployment, because it changes who manages and what is recorded.
What to use and what to avoid depending on your risk profile
Avoid: WhatsApp, Telegram and social media DMs for sensitive topics. The server is proprietary, there are data sharing policies, and Telegram doesn't allow E2EE by default (only "secret chats"). Telegram collects and stores metadata and IP addresses; it's not a more secure alternative to WhatsApp. for real threats.
Recommended: SimpleX and Signal. Signal is usable, audited, with minimal metadata, and now includes usernames; it requires a username to register, but you can opt out of sharing it. On Android, Molly FOSS adds extra controls, and it is advisable to use usernames to avoid exposing your phone number.
With reservations: XMPP well configured and without federation, best as a service on Tor, can serve in trusted private environments. OMEMO does not match the robustness of SimpleX/Signal, and XMPP does not protect metadata with the same rigor.
Not recommended in this context: Matrix (historical cryptography issues, massive replication of unencrypted metadata), Briar (great idea for mesh/Wi-Fi/Bluetooth but poor UX and limited usability), and Session (no PFS and network and jurisdiction concerns). These decisions prioritize minimizing metadata and maintaining critical cryptographic properties..
Other options on the scene: Threema doesn't ask for a phone number and minimizes metadata (paid); Wire is complete and open source (asks for a phone number or email); iMessage/Google Messages encrypt within their own ecosystem, but They don't work across platforms and filter out SMS messages.. Use them knowing these limitations.
OPSEC practice to maintain anonymity
Device: If possible, use a dedicated one; if not, create an isolated system profile, without syncing with personal accounts. Disable analytics, wallpapers, or photos that can identify you, and always lock the app with PIN/biometrics.
Network: Avoid networks linked to your identity. If you use a VPN, pay using untraceable methods and choose a provider with audits and no logs. For maximum anonymity, route everything through Tor whenever possible., accepting the possible loss of performance.
Habits: Don't reuse schedules, phrases, or contacts between identities. Separate contexts and don't mix channels. Check your contacts' passwords periodically, especially if you detect suspicious activity or reinstallations.
Backups: Export the encrypted database only when needed, to encrypted offline media, with key management outside your device. Rehearse the restoration so you don't lose access under pressure., and securely delete old backups.
Updates: Apply patches quickly, monitor official channels, and avoid unverified builds. Have a plan B (alternate channel) to communicate key rotations or migrations if something is compromised.
Anonymous mail and auxiliary channels for key exchange
For out-of-band key sharing, anonymous email can be useful if used wisely. There are temporary services (Guerilla Mail, Mailnesia, Spambog) and others with encryption/PGP or a privacy focus (Torguard Anonymous Email, Secure Mail). Anonymous remailers (W-3, CyberAtlantis) and solutions like AnonymousEmail.me allow for unanswered submissions., at the cost of limited functionality.
Keep in mind that many free services monetize through advertising and tracking. Consider paying for or using PGP with providers that minimize metadata., and never use your real IP for sensitive operations.
“Extreme” route: new/dedicated device, disposable prepaid number (only if required for an ancillary service), unlinked networks, Tor/VPN from the very beginning, and high-level fake data. Buy the VPN with anonymous cryptocurrency or gift cards, and don't save credentials on the same computer. If you don't need that many, at least separate your browser/profile and clear your cookies/logs.
Notes on cookies, policies and tracking
When a website displays “We value your privacy,” it is asking for permission to use cookies and similar technologies. If your priority is privacy, reject non-essentials and use blockersOn platforms like Reddit, even if you reject some cookies, they'll still use some for "functionality," so reduce your exposure.
SimpleX allows you to communicate without a phone or email and, when properly configured, minimizes your metadata display, but your anonymity will depend primarily on your habits and how you verify your passwords. With a well-isolated device and network, out-of-band verification, and, if necessary, self-hosting via Tor, you'll have a robust anonymous profile ready for sensitive conversations.
Passionate about technology since he was little. I love being up to date in the sector and, above all, communicating it. That is why I have been dedicated to communication on technology and video game websites for many years. You can find me writing about Android, Windows, MacOS, iOS, Nintendo or any other related topic that comes to mind.
