Project Compass · Sovereign Tactical COP · Concept · TRL 1–2

Where ATAK ends, Compass begins. The sovereign common operating picture.

Every allied unit from a border patrol squad to a maritime boarding team needs the same three things: a shared map, secure voice, and a message that gets through even when the network is on fire. ATAK solves that problem well — on American terms, with American jurisdiction, American export controls, and American telemetry. Compass solves it on yours. Built in Sofia. Bonded across every radio you have. Wrapped in a traffic-analysis-resistant overlay. Running when the cloud is a smoking hole and the cellular network is Russian.

every radio · every terrain · no overlord
0
Radio Layers Bonded
HF, VHF, UHF MANET, L/S/Ku/Ka SATCOM, mmWave, sub-6 LTE/5G, WiFi 6E/7, LoRa. One tunnel. One picture.
30 + 30
Real + Decoy Shards
Every message fragments into 60 onion-wrapped shards. Half real. Half decoys. Multi-jurisdictional paths.
0
Stealth-Net Latency
Traffic-analysis resistance at the cost of a heartbeat. IP bypass when a clear channel exists.
PQ
Post-Quantum Hybrid
Noise IK + ML-KEM-768 hybrid. ChaCha20-Poly1305. Designed around NIST FIPS 203 migration.
EU
Sovereign Jurisdiction
Bulgarian HQ, EU data residency, source escrow available. No US re-export dependency.
0
Battery · Mesh-Only Ops
Ruggedized handset at low duty on LoRa mesh. Three days dark. No cellular, no SATCOM needed.

The picture you can't afford to lose, running on someone else's terms.

Every modern European defence, interior, and civil-protection force has reached the same uncomfortable realisation simultaneously: the battlespace picture is a dependency — and it is not ours. Four stress-lines are now visible at once.

01

Sovereignty drift on the tactical edge.

ATAK runs under US DoD stewardship. Export is ITAR- and EAR-controlled. The application speaks to infrastructure that can be turned off, audited, or silently updated from a jurisdiction that is not ours. Allied forces accept the trade because there is nothing else. There should be something else.

Compass answer → Sofia HQ, EU data residency, source escrow for sovereign customers, zero US-controlled dependencies in the critical path.
02

Jammed borders and contested spectrum.

The eastern flank of NATO now operates continuously under Russian GNSS denial and directional jamming. Finnish, Estonian, Polish, Romanian and Bulgarian border units regularly lose cellular, GPS, and sometimes UHF for hours at a time. A COP that assumes IP-over-LTE is not a COP.

Compass answer → bonded HF ↔ VHF ↔ UHF MANET ↔ SATCOM ↔ LoRa transport. The picture survives the loss of any three layers.
03

Passive traffic-analysis adversaries.

A capable signals intelligence apparatus does not need to break your cipher. It needs to observe who speaks to whom, when, and how much. Cable-tapping on the Baltic seabed, fibre-monitoring at IX-es, cooperative carriers — the flows are visible long before the payload is readable. Encryption alone is not enough.

Compass answer → Stealth-Net onion overlay. Fragmented, padded, decoyed, multi-jurisdictional. A passive observer sees noise.
04

A fragmented sensor & portfolio landscape.

A Bulgarian border brigade might field Silvus radios on the vehicle, TETRA handhelds on the person, Iridium on the command post, Starlink on the container, Meshtastic on the recon team — and four different apps to read them. Correlation happens in a staff officer's head. That is not a C2 system; it is an organizational hazard.

Compass answer → one runtime, one map, one message store. Every radio is a transport. Every sensor in the Nexus Atlas portfolio is a native feed.
BG

Sofia-headquartered. EU-resident. Source-escrowed.

Nexus Atlas Ltd is a Bulgarian company (Tax ID 208756891). Compass runs on infrastructure you can physically inspect and code you can optionally hold in escrow against continuity-of-operations clauses. This is not a slide about geopolitics — it is an operational fact: you can compile it, you can audit it, you can run it without asking anyone's permission.


A sovereign tactical COP, bonded across every radio, dark on the wire.

Three non-negotiable properties. Pick any two from a competitor. Compass ships all three.

Property · 01

Radio-agnostic transport.

HF for beyond-line-of-sight without satellites. VHF and UHF for legacy-handset interop. MANET for high-bandwidth vehicle mesh. SATCOM when you have sky. LoRa when you have nothing. mmWave when you have a forward base. All of them, bonded through Nexus Atlas, surfaced to the user as one tunnel.

  • 9 distinct RF layers, first-class
  • Link-aware scheduler; sub-second failover
  • Legacy radio adapters via audio + PTT lines
Property · 02

Traffic-analysis resistant by default.

Stealth-Net is the onion-style overlay for when your egress crosses hostile fibre. Thirty real shards, thirty decoys, multi-jurisdictional relays, fixed padding, randomised jitter, and plausible deniability for who is talking to whom. Opt-in per session. Invisible to the operator.

  • Onion routing with per-hop keys
  • Decoy shards to decoy destinations
  • Zero-knowledge mailbox store-and-forward
Property · 03

Sovereign by construction.

Designed, built, and held in the European Union. No US export licence in the critical path. No opaque US-controlled update channel. Source escrow available to sovereign customers. Post-quantum hybrid crypto aligned with NIST FIPS 203. No telemetry. No phone-home. Air-gap mode is a first-class deployment, not a workaround.

  • Bulgarian jurisdiction · EU data residency
  • GDPR-clean by design · zero default telemetry
  • Source escrow · audit-ready build pipeline
"An ally should not need to ask a foreign capital for permission to see its own border." — Compass design doctrine · Sofia · 2026

HF to mmWave. Nine radio layers. One bonded tunnel.

Compass treats each RF layer as a transport, not a feature. The link-scheduler watches every layer continuously, measures latency, jitter, loss and residual bandwidth, and steers traffic to wherever the numbers are least bad. The operator sees one connected icon. The truth underneath is a live contest between nine physical realities.

layer activity · HF / VHF bonded throughput · 4.2 Mbit/s active paths · 6 of 9 link-scheduler tick · 12 Hz failover budget · ≤ 800 ms
HF3 – 30 MHz
NVIS skywave · 300–3000 km · 75–2400 bps
VHF30 – 300 MHz
P25 / DMR / TETRA interop · 9.6 kbps
UHF MANET225 – 2500 MHz
Silvus · Persistent · TrellisWare-class · 4–40 Mbit/s
L / S-band1 – 4 GHz
Iridium · Inmarsat · Govsatcom · 2.4 – 492 kbps
Ku / Ka SATCOM12 – 40 GHz
Starlink · Eutelsat · Hispasat · 20–220 Mbit/s
mmWave24 – 100 GHz
Private 5G · 60 GHz PtP backhaul · 1–10 Gbit/s
Sub-6 LTE/5G0.6 – 6 GHz
Civil carriers · private bubbles · 5 – 450 Mbit/s
WiFi 6E / 72.4 / 5 / 6 GHz
Forward base LAN · vehicle mesh · 0.5–2 Gbit/s
LoRa / Meshtastic433 / 868 / 915 MHz
Community mesh · low power · 0.3 – 37 kbps

Why HF is not a museum piece.

3–30 MHz

Near-vertical-incidence skywave carries a voice and a 300-byte situation report across 800 km with no satellite, no cell tower, no relay — just an ionosphere and a long-wire antenna. Compass runs Codec2 @ 700 bps for voice and a fragmented, FEC-protected data profile for text. HF is the last thing to die when everything else does.

Legacy handhelds still count.

VHF / UHF

Most interior ministries, border guards and civil-protection units own warehouses of P25, DMR and TETRA radios they are not scrapping before 2035. Compass plugs into them via audio-over-PTT adapter boxes and surfaces them as logical transports — unit markers, chat and short reports ride through legacy iron with no hardware replacement cycle.

LoRa is the quiet superpower.

Meshtastic-native

Sub-GHz LoRa meshes carry ~100 bytes across tens of kilometres on a watch battery. First-class Meshtastic integration means a squad without radios, without towers, without permission still has the map. Position reports, casevac triggers and one-line messages propagate across a continent for the price of a dev-board.

"The right radio is not the one on the slide. It is the one that is working right now." — Compass link-scheduler maxim

Thirty real shards. Thirty decoys. Multi-jurisdictional. Not inferable.

Stealth-Net is the Compass answer to passive global adversaries — the cable-tapper, the cooperative-carrier, the IX-sniffer, the backbone-aggregator. It is an onion-style overlay network where every message is fragmented, padded, decoyed, and scattered across a multi-jurisdictional mesh of relays. A global observer sees flows to many destinations from many sources, of uniform size and timing, with no inferable pair, no inferable volume, no inferable schedule.

message fragments in flight · 60 (30 real · 30 decoy) active relays · 8 across 7 jurisdictions hop count · 3 – 5 per shard per-shard fixed size · 1024 B padded timing jitter · 120 ms σ

The seven steps of a Compass message.

Step 01 · Sender
Compress.
Payload runs through a context-dictionary compressor tuned for tactical text, protobuf COT frames, and telemetry. Short messages shrink 3–8×.
zstd · dict 64 KB · level 9
Step 02 · End-to-end
Encrypt.
ChaCha20-Poly1305 under a session key derived from Noise IK + ML-KEM-768 hybrid handshake. Long-term keys pinned. Classical-and-post-quantum both must break to read it.
Noise_IK + ML-KEM-768 · X25519
Step 03 · Fragment
Shatter.
Ciphertext is split into N = 30 real shards with erasure coding. Any 22 of 30 shards are enough to reconstruct. Lost shards do not stop delivery.
Reed–Solomon · 30, 22 · 1 KB each
Step 04 · Pad with ghosts
Decoy.
M = 30 decoy shards are synthesised — indistinguishable on the wire from real ones, encrypted to random or plausible recipient keys. 60 shards total enter the network.
fixed 1024 B padded · random IVs
Step 05 · Onion-wrap
Layer.
Each shard is onion-wrapped with 3–5 per-hop keys, one for each relay on its chosen path. No relay knows the full path. No relay sees cleartext.
Sphinx-style packet · 3 – 5 hops
Step 06 · Multi-path · multi-jurisdiction
Scatter.
Each shard is routed independently. Sofia → Tallinn → Amsterdam for one; Lisbon → Reykjavík → Taipei → Montevideo for another. Shards take legally distinct paths across ≥ 3 jurisdictions.
relay mesh · ≥ 3 jurisdictions
Step 07 · Delivery
Reassemble.
Receiver B collects real shards, reconstructs once 22 arrive. Decoy shards that reached their decoy destinations are silently dropped. A passive observer sees traffic to the wrong B-addresses.
ack · forward-secure receipt
Step 08 · Store & forward
Mailbox.
If B is offline, shards park in a distributed zero-knowledge mailbox set — servers see blinded tokens, never content or identity. B pulls on reconnect. Post-ack, server-side delete.
blind token · ephemeral · t ≤ 14 d

What a passive adversary sees.

Attacker view
  • Many → many traffic at a fixed packet size and jittered cadence.
  • Correlations are destroyed by independent shard paths across jurisdictions.
  • Decoys create plausible traffic to parties who never receive a real message.
  • No cleartext envelope. No consistent source/dest pair. No volume signal.

What costs.

Trade-offs
  • +150 – 600 ms median latency vs. direct TLS.
  • 2 × bandwidth (30 real + 30 decoy shards).
  • Relay nodes cost something to run. Compass operates a default set; sovereign customers run their own.
  • Opt-in. Direct mode is always available for low-sensitivity or air-gap deployments.

What an active adversary cannot do.

Resilience
  • Seizing one relay leaks no plaintext and no path metadata — the relay only saw one hop.
  • Sybil decoys are rate-limited by proof-of-work and operator attestation.
  • Delaying shards widens jitter; delivery degrades gracefully, does not fail.
  • Blocking a jurisdiction shifts routing weight; the picture survives.

Seven layers. One runtime. Open at every boundary.

Compass is a layered system. Each layer has a single responsibility and a replaceable implementation. Apps depend on the runtime, the runtime depends on Stealth-Net, Stealth-Net depends on Nexus Atlas multi-path, Nexus Atlas depends on the radio abstraction, the radio abstraction depends on physical iron. You can swap any layer for a sovereign equivalent without touching the layers above or below.

AppsLayer 7 · surface
The user surface: COP map, unit-tracker, chat, voice / PTT, file transfer, casevac templates, sensor viewer, admin console. Android, iOS, Linux, Windows. Same feature set, same keys, same server state.
Qt / Kotlin / Swift · shared Rust core
Compass runtimeLayer 6 · orchestration
Account, identity, multi-device sync, group membership, map-state replication, CRDT-backed collaboration, offline queue, PTT session manager. The layer that decides what a user sees and when.
Rust · CRDT + ratchet
Stealth-Net overlayLayer 5 · transit anonymity
Onion routing, shard fragmentation, decoy generation, relay selection, mailbox store-and-forward, receipt aggregation. Opt-in per session; transparent to everything above.
Sphinx-style · 3 – 5 hops
Nexus Atlas transportLayer 4 · multi-path bonding
Noise IK + ML-KEM-768 hybrid tunnel, Reed-Solomon erasure coding across heterogeneous radio paths, link-aware scheduler, path diversity enforcement, congestion control per radio. Survives loss of any three layers below.
Rust daemon · 9 transports
Radio abstractionLayer 3 · transport drivers
Driver per radio class: HF modem, VHF audio-PTT adapter, UHF MANET IP, SATCOM modem, mmWave Ethernet, LTE modem, WiFi NIC, LoRa/Meshtastic bridge. Each driver exports bandwidth, latency, jitter, and residual budget to the scheduler.
pluggable · stable ABI
Physical · antenna + ampLayer 2 · spectrum
RF front-ends, antennas, amplifiers, modems, SIMs, SATCOM terminals. The bit of physics that has to survive weather, jamming, mud and soldiers. Compass is agnostic to make, model, and country of origin.
COTS + MILSPEC · vendor-neutral
OperatorLayer 1 · the one thing that matters
A human with a radio, a tablet, a headset, a mission. Compass design rule: if the operator has to read a paragraph, the feature has failed.
trained · tired · right

Replaceable at every boundary.

Every interface between layers is a versioned protocol, not an internal API. A sovereign customer can build its own Stealth-Net relay software, its own radio driver, its own app, and plug it into a Compass deployment — provided the protocol is honoured. We publish protocol specs before we publish products.

protobuf · gRPC Noise protocol framework CRDT replication · Automerge-class source escrow · on demand reference impl · Rust

Deployable from air-gap to Starlink.

Compass has three canonical deployment modes, all first-class. Air-gap runs inside a compound on LoRa / WiFi / MANET with no outside link. Sovereign cloud runs on customer-operated relays and mailboxes. Overlay mode borrows public internet transport and puts Stealth-Net on top. Customers mix and match per unit.

air-gap · no egress sovereign cloud public internet overlay hybrid · per-unit policy

Text, voice, file, receipt. Offline or over HF.

Compass messaging is not bolted onto the COP — it is the primary operator interface under stress. When the network collapses to a 700-bit-per-second HF channel, text still moves. When the HF link collapses to zero, a message parks in a zero-knowledge mailbox and arrives when the recipient next breathes.

P2P chat

Point-to-point, forward-secure.

Two operators, one ratchet. Each message has its own key. Compromise of a device does not retroactively leak prior traffic. Messages encrypt to the recipient's long-term key; decrypt never leaves the endpoint.

  • Noise-IK double ratchet
  • Out-of-band key verification (QR / short code)
  • Device revocation ≤ 30 s network-wide
Group chat

Conferences with admin control.

Multi-party chats up to 256 members per group, with admin-controlled membership, forward-secrecy after a member leaves, and a tamper-evident membership log. Build a mission net on the fly, tear it down when the mission ends.

  • Sender-keys with tree rekeying
  • Admin add / remove with global rekey
  • Message history optional — per group policy
Voice & PTT

Codec2 on HF. Opus on IP.

Push-to-talk across every transport. Codec2 @ 700 bps keeps a voice call up over an HF data channel. Opus @ 8 – 32 kbps on IP delivers clean audio on LTE or MANET. Both ends negotiate the lowest-common-denominator automatically.

  • Codec2 · 700 – 3200 bps (HF ready)
  • Opus · 8 – 32 kbps (IP / Ka / WiFi)
  • PTT latency ≤ 240 ms end-to-end on MANET
File transfer

Maps, imagery, orders. Resumable.

Fragmented chunk-addressable transfer. Every chunk is integrity-checked, erasure-coded, and can resume from any peer who already has it. A map tile pushed to a battalion propagates across the mesh; nobody downloads it twice.

  • Content-addressed chunks (BLAKE3)
  • Peer-assisted fetch / mesh-propagation
  • Up to 4 GB single-object; unlimited by manifest
Receipts

Cryptographic delivery and read.

A receipt is signed by the recipient's device key — not by a middlebox, not by the mailbox, not by the relay. "Read" means read. Unforgeable on either side. Visible as a tick on the operator UI, auditable as a line in the command log.

  • Ed25519 signed receipts
  • Delivered · Read · Acknowledged
  • Attached to the command log with timestamp proof
Store & forward

Zero-knowledge mailbox.

When the recipient is offline, ciphertext shards park on a distributed mailbox set. The servers hold blinded tokens, not identities. They cannot read the message, cannot identify the recipient, cannot link messages to each other. On reconnect, the recipient pulls, acks, and the servers delete.

  • Blinded recipient tokens (OPAQUE-class)
  • TTL ≤ 14 days · server-side auto-purge
  • Encrypted-at-rest on disk · auditable purge log
Multi-device

Phone + tablet + laptop + MDT.

One account, as many devices as the operator needs. A member's phone, tablet, vehicle terminal, and wearable all share ratchet state via the account root key. Add or revoke a device in one tap; the rest of the net learns within seconds.

  • Account-key signed device certs
  • Seamless PTT hand-off between devices
  • Lost-device revocation from any other device
COT compatibility

Speaks Cursor-on-Target natively.

CoT frames move across Compass as a native message type. Existing CoT-speaking ATAK and WinTAK plug-ins, sensors, and sims can publish into a Compass net with a thin bridge — no rewrite. Allied interop is a configuration setting, not a migration project.

  • CoT 2.0 ingest & emit
  • MIL-STD-2525 symbology
  • Optional TAK-Server bridge mode
HF data profile

Short reports over skywave.

A dedicated low-bitrate profile carries position, status, casevac and short free-text across an HF link. FEC, ARQ, and ionospheric path prediction keep the rate honest. Think text message, not video call — but across 800 km of nothing.

  • 75 – 2400 bps, adaptive
  • Ionogram-fed path prediction
  • Works with legacy HF modems via audio-line adapter

Map. Units. Routes. Sensors. Drones. Casualties.

The map is the product. Everything else — chat, voice, file transfer, receipts — orbits it. Compass ships a ruggedized, offline-first COP with the feature vocabulary a seasoned ATAK operator knows by muscle memory, plus a sensor-ingestion surface that accepts the entire Nexus Atlas portfolio out of the box.

Live map

Unit markers, waypoints, geofences.

Real-time blue-force tracking with configurable symbology (MIL-STD-2525 and a sane civil set). Shared waypoints, routes, corridors, exclusion zones, geofenced alerts. Edit on one device, see it on every device within a ratchet-round-trip.

Drone video

ISR feed ingest.

Drone video and sensor feeds, including our own Blackbird counter-ISR platform, stream directly to the map. Geotag, ident, and playback in-app. Low-bandwidth preview mode falls back to thumbnails at 1 fps over HF-free links.

Casevac nine-line

Pre-filled templates, instant dispatch.

One-tap nine-line casevac with pickup grid auto-populated from the device GPS, casualty state pickers, frequency & call-sign, security at pickup site. Routes straight to the medic and the watch. Acknowledgement is a cryptographic receipt.

Blue-force tracking

Friend, foe, unknown, suspected.

Position reports from every connected device every 15 – 120 seconds (policy-configured). Track friendly units, named known-hostile tracks, and unknown contacts with a confidence score. IFF handshake for nearby friendlies over MANET.

Overlays & annotations

Draw, share, acknowledge.

Free-hand annotation, KMZ imports, NGA pattern-of-life overlays, event timelines. Everything you mark is a first-class object — owned, timestamped, signed, and ack-able by receivers. Operator accountability by default.

Offline tiles

Pre-staged by region.

Map packs download ahead of mission. Raster, vector, elevation, imagery — gigabytes of pre-staged tiles. In the field, no network is needed to pan, zoom, plan, or navigate. Packs are content-addressed; updates delta-patch.

Sensor fusion

The whole portfolio as feeds.

Backtrack co-travel detections, Bastion IMSI-catcher alerts, Phantom decoy-swarm health, Blackbird track data, Meshtastic pings, EverywhereHub IoT — all arrive as typed events on the same map. Correlation is a query, not a briefing.

Geofence alarms

Triggered by presence, path, or silence.

Define a polygon. Define a rule: "alert if any non-friendly enters", "alert if any friendly exits", "alert if there is no friendly inside for 20 minutes". Alarms propagate as prioritised messages — survive outage, ack on reconnect.

Command log

Tamper-evident record of the mission.

Every map edit, message, receipt and ack is written to a hash-chained log. Exportable at mission end for after-action review, legal defence, or audit. The log is the source of truth; the map is a projection.

Operator IFF

Short-range cryptographic handshake.

Two Compass devices within MANET range exchange a short-lived handshake over a dedicated IFF slot. The map marks them as verified friendly, separately from reported-friendly. A hostile actor with a captured radio cannot fake it without the account key.


Noise IK + ML-KEM-768. Post-quantum hybrid. Live.

Every Compass session begins with a hybrid handshake. Classical Curve25519 and post-quantum ML-KEM-768 both contribute to the session key. An adversary must break both to read traffic — no "harvest now, decrypt later" window when quantum capability arrives.

mode · Noise_IK + ML-KEM-768 session key · derived rekey interval · 15 min / 32 MB round trips · 1 (0.5 RTT message)

Why hybrid, not pure PQ.

Pure post-quantum ciphers are young. They have been studied for a decade, not three. A cryptographic mistake in ML-KEM would be catastrophic. Pure classical is vulnerable the day a capable quantum machine ships. Hybrid is defence in depth: break both to read a single message. Every serious NATO cryptographic modernisation plan arrives at the same conclusion.

Noise_IK pattern X25519 classical ML-KEM-768 post-quantum ChaCha20-Poly1305 AEAD BLAKE3 key derivation
  • Session key = KDF( X25519_shared ‖ ML-KEM_shared ‖ transcript )
  • Transcript hash binds every handshake message; replay is a non-start.
  • Rekey on interval or bytes; old keys destroyed on rekey.
  • 0.5-RTT first-flight payload means messages arrive before the full handshake completes on low-bandwidth links.

The whole Nexus Atlas family. Native feeds. One map.

Compass is the consumer of everything else in the portfolio. Each sibling product is a sensor, an effector, or a transport — and every one of them publishes into the Compass data model without translation layers. When you deploy the portfolio, the COP gets measurably smarter.

Nexus Atlas
Flagship · multi-path transport

The Rust daemon that bonds WiFi, LTE, VSAT, microwave and LoRa into a single encrypted tunnel. Compass sits directly on top — Nexus Atlas is the reason the picture survives the loss of any single link.

role → transport · feeds → link health, per-radio metrics
Backtrack
Surveillance · co-travel detection

Spots the vehicle that is following the principal. In Compass, every Backtrack detection lands as a typed contact on the map, with confidence, trajectory, and operator-ack.

role → sensor · feeds → co-travel alerts, camera events
Bastion
Counter-surveillance · IMSI-catcher detection

Cellular counter-surveillance. Bastion alerts for rogue base stations and over-powered IMSI-catchers; those alerts arrive on the Compass map as geofenced threat overlays to avoid during principal movement.

role → sensor · feeds → RF threat overlays
Blackbird
Counter-ISR · autonomous drone

The counter-ISR drone. Video, track data, and engagement state stream into the Compass map in real time. Blackbird is controllable from a Compass terminal when operator policy permits.

role → sensor + effector · feeds → video, tracks
Phantom
Distributed RF decoy swarm

The RF decoy swarm. Compass shows Phantom node health, emission profile, and swarm geometry on the map; operators trigger emit windows and swarm relocations from the same COP surface.

role → effector · feeds → swarm state, emit log
EverywhereHub
Aggregation gateway · IoT & radios

Partner gateway product that aggregates heterogeneous radios, IoT devices, sensors and feeds behind a single endpoint. Compass treats EverywhereHub as a native transport and ingest source — no separate integration.

role → gateway · feeds → IoT, radios, sensors
Meshtastic
LoRa mesh · open ecosystem

First-class LoRa mesh integration. Meshtastic nodes appear as devices, send position and short text natively, and inherit Compass end-to-end encryption when talking to another Compass endpoint.

role → transport + node · feeds → position, telemetry
Stealth-Net
Overlay · traffic-analysis resistance

The onion overlay that ships with Compass. Not a sibling product — a runtime subsystem. Listed here because it is the layer that lets the rest of the portfolio be useful when the fibre is being watched.

role → overlay · feeds → relay / mailbox state
3rd-party bridges
ATAK / WinTAK / CoT

CoT-speaking plug-ins, third-party sensors, allied tablets — all bridge into a Compass net via a thin translator. Interop first, migration later.

role → bridge · feeds → CoT 2.0

Handset. Tablet. Laptop. Vehicle. Wearable. Adapter box.

Compass runs on the devices the operator already carries, plus a small family of dedicated hardware for cases where a phone is not enough. Same runtime, same account, same map, everywhere.

MOB

Android & iOS handset

Full COP, chat, PTT and file transfer on a stock Samsung S-series or Pixel. Ruggedized XCover for border/interior ministry fleets. Foregrounded battery profile ≥ 18 hours at typical duty.

TAB

Ruggedized tablet

Samsung XCover, Getac, Panasonic Toughbook. The preferred operator surface on foot and in vehicles. Glove-friendly input, sunlight-readable, MIL-STD-810H drop, IP67.

LAP

Linux / Windows laptop

Watch-officer, intel, and planning role. Multi-monitor layouts, bulk map-pack authoring, after-action export, forensic command-log review. The keyboard lives here.

MDT

Vehicle mobile data terminal

Dash-mount ARM-Linux MDT with ignition-keyed PSU, external antenna pass-throughs for HF, VHF, UHF MANET and SATCOM, and a 1-button operator PTT. Boots to the map.

WBR

Body-worn wearable

Chest-mounted Compass companion with GPS, IMU, PTT mic, and a subset of the app. Paired with the operator handset or tablet over Bluetooth LE. For roles where a tablet gets in the way.

ADP

Radio-adapter box

Field-ruggedised adapter that turns a legacy HF, VHF or UHF radio into a Compass transport. Audio-line + PTT keying via a standard Motorola, Harris, or NATO audio connector. POE or DC powered.


No mandatory cloud. No telemetry. No overlord.

Trust in Compass is not a promise — it is a set of structural choices. Each one is a deliberate exclusion of a category of risk, not a marketing statement. Here are the five that matter.

Trust · 01

No mandatory cloud.

Compass runs fully air-gapped on a local MANET or LoRa mesh. Outbound connectivity is a choice, not a precondition. A unit in a cut-off compound keeps the map, the chat, the voice, the receipts. Only functions that physically require remote peers (store-and-forward to distant users) need external transport.

Trust · 02

Stealth-Net is opt-in.

For sensitive sessions crossing hostile fibre, Stealth-Net is engaged. For short-range direct MANET or a trusted sovereign cloud, it is off — no sense paying the latency bill. Per-session and per-group policy. The operator does not decide; the configured policy does.

Trust · 03

All crypto is auditable.

Every primitive in Compass is public, standard, and reviewable: Noise IK, X25519, ML-KEM-768, ChaCha20-Poly1305, BLAKE3, Ed25519, Reed–Solomon. No house cipher. No mystery curve. The cryptography fails the same way as the rest of the world's — which is to say, rarely, and loudly.

Trust · 04

Post-quantum ready.

Hybrid classical + post-quantum handshake from day one. Migration from ML-KEM-768 to a successor is a version bump, not a rewrite. Captured ciphertext today does not become readable when a capable quantum machine ships.

Trust · 05

No telemetry, no phone-home.

The Compass runtime does not emit anonymous-usage metrics. It does not auto-update from a remote server. It does not beacon its existence to anyone. Updates arrive through signed artefacts that the customer explicitly applies. This is unusual in 2026. It is also correct.

Trust · 06

Source escrow.

Sovereign customers can place the full Compass source under escrow at a neutral third party, with rights to compile and run independently under defined continuity-of-operations clauses. We expect this to be used once a decade and made a condition for it to exist at all.


The numbers, published.

All values are design targets for the Compass reference deployment as of April 2026. They will drift — downward on latency, upward on battery and bandwidth — as the runtime matures. Customers get a datasheet per release.

SubsystemParameterValue
CryptographyHandshakeNoise_IK pattern · hybrid X25519 ∥ ML-KEM-768
CryptographyAEADChaCha20-Poly1305 · 256-bit key · 96-bit nonce
CryptographyHash / KDFBLAKE3 · MAC & key derivation
CryptographySignaturesEd25519 · device certs, receipts, command log
CryptographyRekeyEvery 15 min or 32 MB, whichever first
CryptographyForward secrecyDouble ratchet on P2P · sender-keys tree on group (≤ 256 members)
Stealth-NetReal / decoy shards30 / 30 default · tunable 10 – 60 each
Stealth-NetShard size1024 B padded · uniform on wire
Stealth-NetErasure codingReed–Solomon (30, 22) · 8-shard loss tolerance
Stealth-NetHop count3 – 5 onion hops · operator-policy selectable
Stealth-NetJurisdiction diversity3 distinct legal jurisdictions per message
Stealth-NetMedian overhead+ 150 – 600 ms vs. direct TLS · ~2 × bandwidth
Stealth-NetMailbox TTL14 days · blinded tokens · server-side auto-purge
VoiceHF codecCodec2 · 700 – 3200 bps · FreeDV-compatible profile
VoiceIP codecOpus · 8 – 32 kbps · adaptive
VoicePTT latency (MANET)240 ms end-to-end · Opus 16 kbps
MessagingMax group size256 members · forward-secure tree rekey
MessagingMax file size4 GB single object · unlimited via manifest
MessagingFile chunkingBLAKE3-addressed chunks · 64 KB default
MessagingCoT interopCoT 2.0 ingest & emit · MIL-STD-2525 symbology · TAK-Server bridge
TransportSupported layersHF · VHF · UHF MANET · L/S · Ku/Ka · mmWave · LTE/5G · WiFi 6E/7 · LoRa
TransportLink-scheduler tick12 Hz · per-radio bandwidth / latency / jitter / residual
TransportFailover budget800 ms across a full layer outage
TransportHF data rate75 – 2400 bps · ionogram-fed adaptive
TransportLoRa / MeshtasticNative · 0.3 – 37 kbps · sub-GHz · Meshtastic firmware bridge
PlatformsMobileAndroid 12+ · iOS 16+ · Qt front-end, shared Rust core
PlatformsDesktopLinux (Ubuntu 22.04+, RHEL 9+) · Windows 11 · offline install artefact
PlatformsVehicle MDTARM64 Linux · ignition-keyed · external antenna pass-throughs
PlatformsWearablenRF52 / nRF53 companion · BLE to host · GPS + IMU + PTT
DeploymentAir-gap modeFull feature set on local MANET / LoRa · zero external egress
DeploymentSovereign cloudCustomer-operated relay + mailbox pool · K8s or systemd
DeploymentHybridPer-unit transport & Stealth-Net policy · live reconfigurable
BatteryHandset · mesh-only72 h on LoRa at low duty · 5 Ah handset
BatteryHandset · LTE + MANET18 h at typical duty · sustained PTT bursts
BatteryTablet · XCover Pro14 h with sustained map & video
OpsUpdate channelSigned artefact pull · operator-explicit apply · no auto-update
OpsTelemetryoff by default · on-demand support bundle only
OpsAuditHash-chained command log · exportable · replayable
ComplianceData residencyEU (Bulgaria-headquartered) · GDPR-clean
ComplianceCrypto alignmentDesigned around NIST FIPS 203 migration · Noise protocol framework
ComplianceInteropDesigned for STANAG-grade interop · CoT 2.0 · MIL-STD-2525

The honest comparison.

ATAK is an excellent product. It is also not a sovereign one. This table is not an attack — it is a decision framework. If the rows below do not matter for your mission, ATAK is probably the right answer. If any of them do, Compass exists for that reason.

Dimension Compass ATAK-class alternatives
Jurisdiction EU · Bulgaria-HQ · source escrow available · no US re-export dependency US DoD stewardship · ITAR / EAR controlled · export licence per deployment
Transport model 9-layer radio-agnostic bonded transport · HF ↔ mmWave ↔ LoRa, all first-class IP-over-whatever-you-configured · single link at a time; HF is a plug-in
Traffic analysis Stealth-Net onion overlay · 30 + 30 shards · multi-jurisdiction · decoys to decoy destinations Observable flows · TLS terminates at a known server · timing and volume infer pairs
Multi-path / link bonding Nexus Atlas native · sub-800 ms failover across full-layer outage Single primary link; failover is an operator-visible event
LoRa / Meshtastic First-class native integration · position, short text, receipts end-to-end Community plug-ins · varying depth, varying maintenance
Post-quantum crypto Hybrid X25519 + ML-KEM-768 from day one · aligned with FIPS 203 migration Classical-only by default · PQ on roadmap
Telemetry / auto-update Off by default · operator-explicit signed update apply Remote update channel · telemetry on by default in some distributions
Sensor portfolio Native Backtrack · Bastion · Blackbird · Phantom · Meshtastic · EverywhereHub feeds CoT plug-ins · integration quality varies per vendor
Source access Source escrow option for sovereign customers · documented build pipeline Community variants (ATAK-CIV) open · civ/mil variants diverge · gov variants closed
Interop Speaks CoT 2.0 natively · bridges to ATAK, WinTAK, TAK-Server Full native CoT · interop with Compass via bridge
Air-gap deployment First-class mode · no outside egress · full feature set on local mesh Supported; typically presumes a TAK-Server reachable somewhere
HF voice Codec2 @ 700 bps native · FreeDV-compatible profile · runs over ALE link HF plug-ins exist · bitrate & modem support vendor-specific
Cost of ownership Per-endpoint licence · sovereign customers may self-host all infrastructure Per-seat licensing · hosted-server or government-hosted infrastructure
"This is not a better ATAK. It is what you build when the alliance needs a COP that does not require an alliance." — Compass product brief · Plovdiv · 2026

Where Compass earns its keep.

Seven missions Compass was built for. Each one failed a predecessor at least once in the last five years. None is hypothetical.

BG-TR border · Kapitan Andreevo

Border patrol under persistent GPS denial.

A border-guard squad on a forested ridgeline loses GPS for four hours and LTE for two. HF carries a position report to the district HQ every 90 seconds via Compass's ionogram-tuned profile; UHF MANET links the squad internally; LoRa reaches a downstream observation post without line-of-sight. The map never goes blank. The squad leader does not need to know which radio is carrying what.

HF + MANET + LoRaGPS-deniedblue-force tracking
Black Sea · VBSS interdiction

Naval boarding party on a hostile cargo vessel.

A Bulgarian or allied navy boarding party drops onto a merchant ship in contested Black Sea waters. Ship hull kills LTE; SATCOM is intermittent at low elevation. The team runs UHF MANET between the boat and the boarding team, with SATCOM for higher-bandwidth bursts and HF as the last-resort link to the patrol vessel. Compass multi-path keeps chat and voice alive through all three.

UHF MANETIridium / InmarsatHF fallbackmulti-path
Sofia · close-protection detail

Moving a principal through a hostile city.

A close-protection team runs a principal across town. Bastion flags a persistent IMSI-catcher near a route segment; Backtrack surfaces a co-travelling vehicle two blocks back; the detail leader diverts the motorcade on the Compass map, chat and PTT stay Stealth-Net-wrapped so adversary SIGINT cannot infer who is talking to whom. Arrival is logged into the command log; receipts are signed by every team lead.

close-protectionStealth-NetBastion + Backtrack
Beyond-line-of-sight SOF raid

Special-forces team, HF backhaul to HQ.

A small SOF element operates 600 km from its headquarters with no satellite window in the planned engagement hour. Compass carries position, voice at Codec2 700 bps, and short mission-update text across a single HF skywave link. The headquarters watch officer sees the team on the map; the operator on the ground hears his call-sign over PTT. This is what HF is for.

HF NVISCodec2 700 bpsBLOS
Plovdiv · M 6.4 earthquake response

Disaster response with cellular flattened.

An earthquake drops cellular towers and knocks out road-bridge power. Civil-protection teams spread across a province with only LoRa and a few Starlink terminals. Compass meshes both, carries casevac nine-line templates from field medics back to coordination cells, and distributes the shared damage map without any team having to know where the data is coming from.

civil-protectionLoRaStarlinkcasevac nine-line
NGO & journalist operations

Operational privacy in a hostile jurisdiction.

Accredited journalists or an NGO coordinating aid inside an authoritarian state need to move, message, and receive files with traffic-analysis resistance. Compass in Stealth-Net mode routes fragments across multi-jurisdictional relays; decoy traffic to plausible third parties destroys the contact graph. Not circumvention — operational privacy as a first-class feature.

Stealth-Netprivacy-firstzero-knowledge mailbox
Critical infrastructure · NIS2 scope

Hybrid-warfare coordination for operators.

A grid operator, a rail operator, and a port operator coordinate during a hybrid-warfare incident. The civilian management SCADA is degraded; the carrier's cellular is flaky; some of the fibre is suspicious. Compass gives the three incident teams a shared map, signed chat, and receipt-auditable decisions. Afterwards, the hash-chained command log is the evidence pack for the regulator.

NIS2critical infracommand-log audit
Finnish / Estonian eastern flank

Contested-spectrum defence.

Border-guard units under directional Russian EW operating in mixed terrain. LTE gone. GNSS denied. UHF sporadic. LoRa intact. Compass runs position and short text across the LoRa mesh, PTT across the MANET windows when they open, HF when the ionosphere cooperates. The operators have the map; the dispatcher has the picture.

EW-jammedLoRa + MANET + HFeastern flank

A Compass runtime, talking to itself.

Synthetic CLI output streaming from a reference Compass node. Session establishment, shards in flight, decoys dispatched, receipts confirmed — rendered live. A small fingerprint of what the runtime says when it is working.

14
Active sessions
3,240
Shards in flight
11
Relays reachable
928
Messages delivered · last hour

Honest answers, asked in good faith.

Questions we expect — and answer — in every serious customer conversation. Click any line to expand. If something important is missing here, write to office@NexusAtlas.io.

What happens if a jurisdiction seizes one of the Stealth-Net relay nodes?
A relay operator only sees onion-wrapped shards. No cleartext, no full path, no sender–recipient pair. A seized relay leaks the fact that somebody used it as a hop — nothing more. The remaining relays keep routing; operator weight shifts automatically away from the compromised node. Customers who operate their own relay pool can exclude entire jurisdictions from their routing set at any time.
How do you prevent Sybil attacks on the decoy layer?
Decoy shards are synthesised locally by the sender and signed into the path; they are indistinguishable from real shards on the wire, which is the property we need. Relay registration uses operator attestation plus per-relay proof-of-work to raise the cost of a Sybil flood. Sovereign customers running their own relay pools simply maintain an allow-list — the problem does not arise.
What is the actual latency cost of Stealth-Net?
Median overhead is +150 – 600 ms over a direct TLS equivalent, depending on hop count (3 – 5), jurisdiction mix, and per-hop load. For tactical chat, file transfer, and near-real-time map updates, this is imperceptible. For PTT voice, the default profile downshifts hop count on voice streams; for truly time-critical voice, Stealth-Net can be disabled per-group, and a direct Nexus Atlas tunnel carries the PTT.
Does HF really carry a usable Compass session?
Yes — with expectations correctly set. HF carries the low-bandwidth data profile: position reports, short text, casevac nine-line, acks. HF carries Codec2 @ 700 bps voice, which is intelligible for operational traffic. HF does not carry video, large files, or group chats with 50 members talking at once. The link-scheduler knows this and steers heavyweight traffic to other layers automatically.
How does licensing and billing work?
Per-endpoint annual licence, with volume tiers for brigade- and ministry-scale deployments. Sovereign customers pay for a sovereign-relay support contract separately — or operate their own relay pool at no additional licensing cost. Source escrow is an optional add-on for customers who require code-access as a continuity-of-operations guarantee. No hidden SaaS fees. No per-user telemetry upcharge. No price difference between peacetime and wartime usage.
Is Compass open source?
Not today. A public reference implementation of the Stealth-Net relay and the Nexus Atlas transport are on the roadmap under a permissive licence — the ecosystem depends on multiple independent implementations for credibility. The Compass application itself is commercial. Sovereign customers may take source escrow with explicit rights to compile, modify and run.
How does Compass interoperate with existing ATAK deployments?
Compass speaks CoT 2.0 natively. A thin bridge translates between a Compass net and a TAK-Server so that ATAK / WinTAK / iTAK users appear on the Compass map and vice versa. Symbology is MIL-STD-2525 on both sides. Allied ops can run mixed fleets during a transition; the Compass receipt layer adds cryptographic delivery proofs the ATAK side does not natively have, which is handy for after-action review.
What about offline operations? Does the map work without a server?
Yes. Compass is offline-first. Map tiles are pre-staged per region, compressed, content-addressed, and delta-patched. A unit can operate for weeks on pre-staged data with no outbound connectivity. Peer-to-peer map updates propagate across any local mesh (MANET, WiFi, LoRa) — no server participation required. The "cloud" is where you choose to run one, if you choose to run one at all.
Can an adversary break the post-quantum crypto retroactively?
The session key is derived from both classical X25519 and post-quantum ML-KEM-768 shares. An adversary who records ciphertext today and gains quantum capability later still needs to break both components independently — breaking one is not sufficient. If ML-KEM-768 is found cryptographically weak, sessions fall back to the classical share; if X25519 is ever trivially broken, the PQ component still holds. Both must fail simultaneously to read a Compass message.
Who audits the code and the cryptography?
External cryptographic review is a procurement requirement for every major Compass release — conducted by an independent EU-based firm with no commercial relationship to Nexus Atlas beyond the review. Findings, with redactions only for unpatched vulnerabilities, are published in a signed audit report. Customers under NDA receive the full unredacted version. The Compass public status page tracks the current audit state per release.

Compass is a concept. Your C2 problem is not.

Compass is concept-stage. There is no shrink-wrapped product to ship, no booth to book, no handset to hand you. What there is: an architecture, a set of sibling products it plugs into, and a team that wants to talk to people whose unit, ministry, convoy, or close-protection detail is today running on ATAK-and-a-prayer. Operator briefings walk the architecture and the honest limits; technical briefings go deep on Stealth-Net, transport, crypto, and integration. Start a conversation and we will tell you what the product is today, what it will be in twelve months, and whether your timeline is realistic.

Concept stage · TRL 1–2 · 2026

Two ways in.

Operator briefing — for end-users, integrators, and procurement teams evaluating a sovereign ATAK alternative. We walk the architecture, the honest limits, the deployment math, and the integration path with existing CoT / NFFI / Link-16 estates.

Technical briefing — for engineers, research groups, and prime contractors. We go deeper: Stealth-Net shard geometry, Nexus Atlas transport, Noise IK + ML-KEM-768 handshake, mailbox / store-and-forward architecture, radio abstraction layer, and where we are looking for partners.

office@NexusAtlas.io
NexusAtlas.io
← See the whole portfolio
Reaches a human at Nexus Atlas. No marketing, no newsletter. We read every message and reply within one business day. Note: this form is a concept-stage placeholder and not yet wired to a backend — for anything urgent, please use office@NexusAtlas.io directly.