
Security Is More Than Encryption
There’s a common — and increasingly risky — assumption in modern product development: “We use AES-256, so the device is secure.”
Encryption matters, but it only protects data in transit. It does nothing to address compromised firmware, opaque toolchains, untrusted silicon, or supply chains you don’t control. Yet across defense and critical-infrastructure markets, products are routinely marketed as “secure” even when the companies behind them don’t write their own firmware, don’t control manufacturing, and don’t fully understand what their hardware is doing at the chip level.
This gap is not theoretical. It is where modern vulnerabilities live. In contemporary conflict and competition, compromise does not always arrive loudly. Sometimes it is kinetic and sometimes it is silent — embedded in firmware, introduced through a component substitution, or hidden behind an undocumented interface that no one bothered to audit. Once deployed, those weaknesses propagate downstream, inserted directly into operational systems. Security, in this context, is not a feature — its' a system property.
Engineered for Trust Under Constraint
PATCH is designed with the assumption that it will be deployed in environments where infrastructure cannot be trusted and scrutiny is guaranteed. That assumption drives architectural decisions across the entire system.
Roper is the original equipment manufacturer (OEM) for PATCH. Circuit board design, fabrication, programming, and device assembly occur in the United States under our direct oversight. All firmware and software, including the PATCH mobile application, are developed and maintained by our team of U.S. citizens. PATCH is fully NDAA compliant.
The system is intentionally designed with a reduced attack surface:
- No Internet connectivity or IP-based networking
- No operating system (bare-metal firmware)
- No open-source code
- No physical ports or external interfaces
Devices intended solely for tracking and situational awareness operate with Bluetooth disabled.
PATCH is designed with no persistent data storage. Location, activity, and message data are not stored on the device. Encryption keys and network configuration data exist only for the duration of an active session and are wiped when the SnapMesh network is shut down or when a device loses power.
Data transmitted over SnapMesh is encrypted using AES-256 with a one-time-use key generated at network initialization. Communications between PATCH and a paired smartphone use Bluetooth Low Energy Secure Connections with AES-128 encryption and ECDH key exchange (P-256), along with LE Privacy to limit device tracking and correlation.
PATCH also actively monitors network integrity. Replay attacks are detected and blocked, with users notified if an attack is detected while maintaining network operation. PATCH has been independently tested in the field to be resistant to jamming outside 277 yards.
Why This Matters
Secure systems are not declared. They are engineered. When hardware, firmware, manufacturing, and supply chain are treated as separate concerns, trust collapses under real-world conditions. When they are designed as a coherent system, security becomes durable — not because it is advertised, but because it is difficult to undermine.
This is what disciplined engineering looks like in an era where failure is often silent, asymmetric, and irreversible.


