Canonical Spec Sheet
VaultPhone Pro
A Google Pixel hardened at the distribution level: stock apps removed, Tor routing and Signal preinstalled, eSIM in privacy-friendly jurisdictions, no IMEI or hardware identifier exposure, and an emergency kill switch. Honest about what it does — and what it does not.
Source: .seedgpt/client-meetings/meeting-1.md · Every claim on this page is traceable to the product owner’s technical input. Honesty is part of the product.
Hardware
- Base device
- Google Pixel
- Bootloader
- IP-verified / locked
- Kernel
- Stock kernel; hardening at distribution level
Distribution
- Stock apps
- Removed
- Hardening layer
- Distribution level (not runtime)
- First-boot behavior
- Differs from stock Pixel by design
Network & Messaging
- Network routing
- Tor (default-on)
- Default messenger
- Signal
- Connectivity
- eSIM in privacy-friendly jurisdictions (ghost countries)
Identity & Anti-Detection
- IMEI exposure
- None
- Hardware identifier exposure
- None
- Design intent
- Avoid passive network fingerprinting
Emergency & Recovery
- Kill switch
- Software-triggered emergency wipe
- Recovery
- Re-provision via support after a wipe
Encryption (honest disclosure)
- Filesystem encryption
- Software-level
- Hardware encryption
- Not present
- PGP
- Not included
Explicit Non-Features
The following are not part of the product. Anyone who needs them should look elsewhere.
- • No hardware-level encryption
- • No PGP
- • No physical circuit-cutting kill switches (the kill switch is a software wipe)
- • No baseband removal — the device is a Pixel; baseband exists