Abstract Privacy Hero

Anti-Detection by Design.

A Google Pixel hardened at the distribution level. Tor, Signal, eSIM in privacy-friendly jurisdictions, no IMEI exposure, software kill switch. Honest about what it is — and what it is not.

Encrypted Phone Product

A Pixel, Hardened at the Distribution Level.

We start from Google Pixel hardware with an IP-verified bootloader. Stock apps are removed and the network stack is reconfigured at the distribution level — not by an app you install on top of stock Android. There is no misconfiguration path for the user.

  • Pixel Hardware, Locked Bootloader

    Stock Pixel hardware with an IP-verified bootloader. Hardening lives at the distribution layer.

  • Tor + Signal by Default

    All network traffic routed through Tor. Signal preinstalled as the default secure messenger.

  • eSIM in Ghost Countries

    Connectivity provisioned via eSIM in privacy-friendly jurisdictions. No IMEI or hardware identifier exposure.

  • Software Kill Switch

    Emergency wipe destroys filesystem encryption keys. Recoverable only via support re-provisioning.

Honest About What This Is Not

We sell anti-detection, not magic. There is no hardware-level encryption, no PGP, and no physical circuit-cutting kill switches. If your threat model needs those, this is not the right device for you — and we would rather you knew before buying.

Read the Threat Model