Photo by Gábor Szűts on Unsplash source · Unsplash License

I built UmbrellaX as a direct alternative to Signal and I am not going to pretend the two are the same product. UmbrellaX wins on four axes I care about: group scaling, jurisdiction outside the Five Eyes, phone-number independence, and operational architecture sized for a billion users from day one. Signal wins on one I respect, a decade of adversarial track record on one-to-one messaging. Pick UmbrellaX when any of my four axes matter to you. Stay on Signal if conservative one-to-one cryptography is the only thing you need.

DimensionUmbrellaXSignal
ProtocolMLS (RFC 9420) plus post-quantum hardeningSignal Protocol (Double Ratchet plus X3DH)
Group key operationsO(log N) tree-basedO(N) pairwise layered
JurisdictionKazakhstan, outside Five EyesUnited States, 501(c)(3)
Phone number for registrationNot requiredRequired
DPI bypass protocols9 built in from day oneReactive bridges added as needed
Backend architecture167 microservices, 6 nodes at launch, designed for 1B usersScaled reactively with demand
Post-quantum key agreementShipped in current buildOn Signal’s roadmap
Field track recordPre-launch in 2026Approximately 10 years
PricingFree core, Premium $4.99 per month, VIP $1 000 per monthFree, donation-funded

Below: the four axes where I went a different way to Signal, the one axis where Signal still wins, and the honest trade-offs on each.

Where UmbrellaX sits

UmbrellaX is the messenger I built. It runs on MLS with post-quantum hardening, registered as UmbrellaX LLP in Kazakhstan, and I sized the backend for a billion users on day one rather than the day the load shows up. Clients run on iOS, Android and desktop. I did not put a phone-number field on registration. I shipped nine DPI-bypass protocols, including a WebTunnel variant my team wrote, in the first release rather than as a reaction to the first ban. The backend is 167 Rust microservices on 6 nodes at launch (3 dedicated plus 3 cloud edge across 4 regions) for roughly 160 euros per month. The same code scales horizontally to thousands of nodes without a rewrite when user counts move by orders of magnitude.

Signal is the messenger most of you already know. It is run by Signal Foundation, a US-incorporated 501(c)(3) non-profit, originally capitalised by a 50 million dollar loan from Brian Acton after the WhatsApp acquisition and kept alive by donations since. Meredith Whittaker became President in 2022. Signal Protocol is the most field-tested end-to-end messaging cryptography in the world and I am happy to say that out loud. Registration is by phone number. Contact discovery runs server-side against hashed phone numbers.

Both messengers encrypt end-to-end. Both support voice and video. Both publish source for their clients. The rest of this article is about the four places I made a different call to Signal and why.

1. Protocol

I picked MLS, the IETF’s standardised group-messaging protocol formalised in RFC 9420. On top of MLS I ship post-quantum hardening on the key-agreement path. I spent two months on the post-quantum question before I committed. The answer in 2026 is hybrid, classical X25519 plus ML-KEM-768, because pure post-quantum still spooks me on key sizes and field history. The layer stays secure even once a large quantum computer exists, which best estimates place inside the useful lifetime of data being sent today.

Signal runs on the Signal Protocol. Double Ratchet for the forward-secrecy ratchet, X3DH for the initial handshake, pre-keys for asynchronous contact. The protocol has been in field use since 2013 and has survived a decade of adversarial analysis without a practical confidentiality break. Signal has been publicly exploring migration to MLS since 2023. I think they are right to do that, but they are doing it after the fact.

When I sat down to pick the protocol I went through this comparison line by line. Three concrete reasons I went MLS from day one.

Groups are first-class. MLS was designed from the very first whiteboard with groups as the primary case. The data structure is a balanced tree. Adding or removing a member is O(log N) in key operations. Signal Protocol was designed for pairs and extended to groups by layering pairwise sessions, which is O(N) per membership change. On a 500-member broadcast list it defines the user experience. The 200,000-member group ceiling on UmbrellaX is not a marketing target. I needed it for protest coordination in countries where Telegram channels get blocked, and Signal’s 1,000-member cap will not carry that load.

Formal verification is part of the design. Large portions of MLS were model-checked with the explicit goal of catching whole classes of attack before any implementation existed. Signal Protocol components have been analysed over the years, but the protocol grew up in the field and got the formal treatment second. For a messenger that takes a state-level adversary seriously (Tier D in the threat-modelling I work to), I want to start from foundations someone has already proved cannot fail in particular ways.

Post-compromise recovery is cleaner on a tree. If a device key is compromised, the tree update after recovery mathematically pushes the compromised key out within a bounded number of message rounds. Signal Protocol gives you post-compromise security too, but the audit trail depends on reconstructing ratchet state. An auditor who turns up mid-conversation has a harder job, and I have done that work, so I know.

Where Signal Protocol is still ahead: a decade of adversarial exposure at scale. Ten years of real users gives you a kind of cryptographic proof that no formal model replaces on the same timescale. I will not pretend MLS-plus-post-quantum has that yet. If conservative one-to-one cryptography with the longest field record is what you need, Signal is the right call.

2. Jurisdiction

I incorporated UmbrellaX in the Republic of Kazakhstan. Kazakhstan is not in the Five Eyes, not in the Fourteen Eyes, and has no mutual legal assistance treaty with the United States covering communications surveillance. Kazakh law has its own awkward edges and I am not going to pretend this is a civil-liberties utopia. It is a jurisdiction that sits outside the main channel of US legal compellability. I left Russia. I incorporated here because the Five Eyes treaties do not reach this country and the legal framework on encryption is not openly hostile. That is not branding. That is where my data lives.

Signal Foundation is incorporated in the United States. That exposes it to the CLOUD Act, the Stored Communications Act, and a stack of instruments that let US authorities compel a US entity to hand over whatever data it still holds. Signal’s strategy, which I think is right for an entity in their seat, is to hold almost nothing. But “almost nothing” is not “nothing”. Account creation dates, last-connection timestamps, and IP addresses at connection time all sit in the category of “data Signal would be compelled to surrender if it existed”. Signal’s defence is to not have it.

I went one step further. UmbrellaX is not the entity US authorities could compel in the first place. I run the company from Kazakhstan because Five Eyes treaty obligations do not apply here, and I also minimise what the server holds. The two strategies are complementary but not identical, and for a real threat model the distinction matters more than people realise.

Meredith Whittaker has said publicly that Signal would leave the United Kingdom if the Online Safety Act were used to break end-to-end encryption. I think that is the right stance and my position is the same. The difference is that I do not have to defend it against the compellability of my own home country. I start from outside.

3. Operational architecture

Signal scaled reactively. I am not throwing rocks at their engineers, it is how most software gets built. The Signal SGX-based private contact discovery story is the textbook example: an elegant cryptographic design ran into the operational reality of Intel’s SGX roadmap and had to change shape. When I was sizing the cluster I budgeted for 1 billion users on day one. Signal’s recent outages tell me they did not, and I read that as a design choice, not an accident.

I chose the opposite starting point. I designed the backend, before the first user landed, for one billion concurrent users. In practice that is 167 Rust microservices on 6 nodes at launch (3 dedicated machines in Europe, 3 cloud-edge nodes across 4 regions, around 160 euros per month). The code on those 6 nodes is the same code that would run on 6,000 nodes at a billion users. What changes is the number of replicas, not the shape of the system. I think that is the only honest way to claim “designed for scale”.

The choice buys two things you do not see in normal times and absolutely need in abnormal ones.

Availability under hostile network conditions. Messenger traffic gets deprioritised or blocked during protests, elections, and wartime. UmbrellaX ships 9 DPI-bypass protocols at the transport layer, including a WebTunnel variant my team wrote. When one transport is blocked, the client fails over to the next without the user touching anything. Signal has bridges and fallbacks too, but they were bolted on as reactions to specific bans, not shipped as defaults from the first release.

Latency that stays flat as user count grows. I target p99 message send under 50 ms and chat-open time under 200 ms, end-to-end, including cryptographic operations. I picked the backend layers specifically to hold those numbers across orders-of-magnitude scaling: TiDB for coordinated data, ScyllaDB for high-throughput paths, Pulsar for fan-out.

The honest cost: I carry more infrastructure complexity up front than Signal does, because I am anticipating a scale Signal does not yet operate at. That complexity is a liability today and an asset later. UmbrellaX charges 4.99 dollars per month for Premium and 1,000 dollars per month for VIP, with the free core usable indefinitely. Signal is a donation-funded non-profit, which is a different game.

4. Phone number

Signal requires a phone number to register and uses it for contact discovery. The client hashes the number, the server holds only the hash, matches against other hashes, and returns which of your contacts are also on Signal. The cryptography around the hash is carefully implemented. But the phone number itself is a persistent identifier already attached to your legal identity by phone companies, banks, and intermediaries you never picked. Phone numbers are metadata. I watched Signal users get deanonymised through phone-number leaks twice in 2023 and I refused to ship a product that requires one.

I do not use the phone number as identity on UmbrellaX. Identity is a cryptographic key pair generated on the device, paired with a display handle the user picks. Contact discovery runs through optional, revocable identifiers: a username, a QR code, or a one-time token handed in person. Any of these can be rotated or destroyed without changing the underlying account. You can also share nothing tied to your phone at all and the account still works.

This sits between Signal’s strict phone-number identity and the more radical approaches of Session (random account ID, no phone) or SimpleX (per-conversation queues, no persistent identity). I respect Moxie, but I think tying every account to a phone number was a mistake Signal cannot undo without rebuilding from scratch. A phone number is metadata most jurisdictions can subpoena, and chaining account identity to it hands an adversary a stable handle on the user before any cryptography even starts.

The trade-off worth saying out loud: onboarding is genuinely easier on Signal. If every contact you want to reach already has your phone number, Signal is zero-friction. On UmbrellaX you have to share something (a username or a QR code) at least once. That is a real cost. For some of you it is a deal-breaker. For others it is exactly the point.

Where Signal still wins

Three honest places where Signal is still the better choice.

Field track record. Ten years of adversarial real-world exposure on Signal Protocol is a kind of cryptographic proof that no formal verification replaces on the same timescale. My MLS-plus-post-quantum stack is under continuous review by an independent audit scheduled before the first stable release, but the time-in-field number today is zero. I am not going to lie to you about that. If your only requirement is the most battle-tested one-to-one cryptography in the world, Signal is the honest answer.

Recognition in the journalism and activism communities. When you tell a source “use Signal”, they know what you mean. Every major news outlet has written source-protection guides for Signal. UmbrellaX is building toward that recognition, but today a journalist handing a source UmbrellaX is adding a five-minute explanation step, and under time pressure that step matters.

Structural non-profit alignment. Signal Foundation cannot drift toward ad-tech the way a private company can. That is a structural guarantee, not a promise. I run UmbrellaX as a commercial company with a transparent pricing model and public architecture documentation, which I think is defensible, but structural non-profit status is a harder guarantee. If you specifically value that, Signal wins on its own terms.

Which to pick

Here is the rule I give people who ask me directly.

Pick UmbrellaX when any of these apply: you need groups larger than tens of people with sane key operations, you care about jurisdiction outside the Five Eyes, you need reliable transport under censorship or DPI blocking, or you want your messenger identity decoupled from your phone number.

Pick Signal when you want the most adversarially-tested one-to-one cryptography in the world with a decade of field record, you specifically value structural non-profit ownership, or you are handing a source a messenger under time pressure and need the shortest explanation.

A lot of people I know run both. Signal for the contacts who already use it. UmbrellaX for everything Signal cannot do.


I’m Kirill Abramov, founder and CEO of UmbrellaX TOO, a privacy-first messenger company registered in Kazakhstan, outside the Five Eyes alliance. I built UmbrellaX as a direct alternative to the US-incorporated incumbents, and I write about end-to-end encryption, post-quantum cryptography, and the regulatory pressure on private communication. More about my work and why I run UmbrellaX from Kazakhstan: umbrellax.io/about.

Sources