Back to product

Canonical Spec Sheet

VaultPhone Pro

A Google Pixel hardened at the distribution level: stock apps removed, Tor routing and Signal preinstalled, eSIM in privacy-friendly jurisdictions, no IMEI or hardware identifier exposure, and an emergency kill switch. Honest about what it does — and what it does not.

Source: .seedgpt/client-meetings/meeting-1.md · Every claim on this page is traceable to the product owner’s technical input. Honesty is part of the product.

Hardware

Base device
Google Pixel
Bootloader
IP-verified / locked
Kernel
Stock kernel; hardening at distribution level

Distribution

Stock apps
Removed
Hardening layer
Distribution level (not runtime)
First-boot behavior
Differs from stock Pixel by design

Network & Messaging

Network routing
Tor (default-on)
Default messenger
Signal
Connectivity
eSIM in privacy-friendly jurisdictions (ghost countries)

Identity & Anti-Detection

IMEI exposure
None
Hardware identifier exposure
None
Design intent
Avoid passive network fingerprinting

Emergency & Recovery

Kill switch
Software-triggered emergency wipe
Recovery
Re-provision via support after a wipe

Encryption (honest disclosure)

Filesystem encryption
Software-level
Hardware encryption
Not present
PGP
Not included

Explicit Non-Features

The following are not part of the product. Anyone who needs them should look elsewhere.

  • No hardware-level encryption
  • No PGP
  • No physical circuit-cutting kill switches (the kill switch is a software wipe)
  • No baseband removal — the device is a Pixel; baseband exists

Related