
Anti-Detection by Design.
A Google Pixel hardened at the distribution level. Tor, Signal, eSIM in privacy-friendly jurisdictions, no IMEI exposure, software kill switch. Honest about what it is — and what it is not.
A Pixel, Hardened at the Distribution Level.
We start from Google Pixel hardware with an IP-verified bootloader. Stock apps are removed and the network stack is reconfigured at the distribution level — not by an app you install on top of stock Android. There is no misconfiguration path for the user.
Pixel Hardware, Locked Bootloader
Stock Pixel hardware with an IP-verified bootloader. Hardening lives at the distribution layer.
Tor + Signal by Default
All network traffic routed through Tor. Signal preinstalled as the default secure messenger.
eSIM in Ghost Countries
Connectivity provisioned via eSIM in privacy-friendly jurisdictions. No IMEI or hardware identifier exposure.
Software Kill Switch
Emergency wipe destroys filesystem encryption keys. Recoverable only via support re-provisioning.
Honest About What This Is Not
We sell anti-detection, not magic. There is no hardware-level encryption, no PGP, and no physical circuit-cutting kill switches. If your threat model needs those, this is not the right device for you — and we would rather you knew before buying.
Read the Threat Model