Frequently Asked Questions

Are your devices legal?

Yes. Completely. There are no laws against selling, nor possessing privacy and security centric technology for lawful use. We are not cellular service providers, so we are not subject to CALEA nor FCC licensing.

How much security can I gain from one of your devices?

Depending on how you operate currently, potentially a MASSIVE amount. Journalists working intensive stories often have to deal with attempted location tracking, text message and phone call interception, exploitation of their device using hostile or Government hacking tools like Cellebrite. Our devices address ALL of these issues from the hardware and software level.

What information do you maintain on me?

Absolutely none. If you choose to pay via CashApp or Zelle, that history will exist. If you choose to pay via Postal Money Order, we will temporarily have the return address, as well as the address that we are shipping to. We don’t even need your name. As soon as the transaction is complete, all information is disposed of.

Sounds complicated.

A lot less than you’d think. We pre-configure all of the crucial settings, sideload basic OPSEC software and Aurora Store so that you can keep your apps up to date. Plug in your SIM card, activate your VPN, and you’re up and rolling.

What do I do once I get my device?

Your purchase does not just include a piece of hardware. It also includes a comprehensive guide on how to use your device, as well as tips for setting up things like cellular service up as anonymously as possible (all legal methods).

Are you liable if I get in trouble with your device?

Sorry my friend, that’s on you. We sell our devices for lawful use only. Our products are designed to protect the the operator, and be resilient against attackers, such as a government, malicious hackers, local law enforcement and militias, etc. For our journalist customers, it provides them a way to quickly destroy information that could lead to their arrest in another country due to a story they may be covering.

What software powers these devices?

Our good friends over at GrapheneOS power our devices. We also use products from the Signal Foundation, Mullvad VPN, and several open source pieces of software under the MIT license.

How do I know this isn’t just a honeypot for you to sell me a phone that will spy on me?

Glad you asked. You can verify your installation integrity via an encryption hash check which can be found on the “verifying installation” of GrapheneOS:

The verified boot and attestation features provided by the supported devices can be used to verify that the hardware, firmware and GrapheneOS installation are genuine. Even if the computer you used to flash GrapheneOS was compromised and an attacker replaced GrapheneOS with their own malicious OS, it can be detected with these features.

Verified boot verifies the entirety of the firmware and OS images on every boot. The public key for the firmware images is burned into fuses in the SoC at the factory. Firmware security updates also update the rollback index burned into fuses to provide rollback protection.

The final firmware boot stage before the OS is responsible for verifying it. For the stock OS, it uses a hard-wired public key. Installing GrapheneOS flashes the GrapheneOS verified boot public key to the secure element. Each boot, this key is loaded and used to verify the OS. For both the stock OS and GrapheneOS, a rollback index based on the security patch level is loaded from the secure element to provide rollback protection.

Verified boot key hash

When loading an alternate OS, the device shows a yellow notice on boot with the ID of the alternate OS based on the sha256 of the verified boot public key. 4th and 5th generation Pixels only show the first 32 bits of the hash so you can’t use this approach. 6th generation Pixels onwards show the full hash and you can compare it against the official GrapheneOS verified boot key hashes below:

Pixel 6: f0a890375d1405e62ebfd87e8d3f475f948ef031bbf9ddd516d5f600a23677e8

Pixel 10 Pro Fold: 55a2d44103e56d5ec65496399c417987ba77730e6488fc60ba058d09fc3caee3

Pixel 10 Pro XL: 141d7fc32af7958a416f2661b37cf6f27bfb376fb5ce616aeaa27a82c7a04f74

Pixel 10 Pro: 4e8ee8f717754052198ca6d2d3aaa232e2461b4293c0d6f297e519cc778de093

Pixel 10: 3f7415ea26f5df5b14ea6d153256071a7a1af9ce7b0970b7311cc463c7ea02c7

Pixel 9a: 0508de44ee00bfb49ece32c418af1896391abde0f05b64f41bc9a2dfb589445b

Pixel 9 Pro Fold: af4d2c6e62be0fec54f0271b9776ff061dd8392d9f51cf6ab1551d346679e24c

Pixel 9 Pro XL: 55d3c2323db91bb91f20d38d015e85112d038f6b6b5738fe352c1a80dba57023

Pixel 9 Pro: f729cab861da1b83fdfab402fc9480758f2ae78ee0b61c1f2137dd1ab7076e86

Pixel 9: 9e6a8f3e0d761a780179f93acd5721ba1ab7c8c537c7761073c0a754b0e932de

Pixel 8a: 096b8bd6d44527a24ac1564b308839f67e78202185cbff9cfdcb10e63250bc5e

Pixel 8 Pro: 896db2d09d84e1d6bb747002b8a114950b946e5825772a9d48ba7eb01d118c1c

Pixel 8: cd7479653aa88208f9f03034810ef9b7b0af8a9d41e2000e458ac403a2acb233

Pixel Fold: ee0c9dfef6f55a878538b0dbf7e78e3bc3f1a13c8c44839b095fe26dd5fe2842

Pixel Tablet: 94df136e6c6aa08dc26580af46f36419b5f9baf46039db076f5295b91aaff230

Pixel 7a: 508d75dea10c5cbc3e7632260fc0b59f6055a8a49dd84e693b6d8899edbb01e4

Pixel 7 Pro: bc1c0dd95664604382bb888412026422742eb333071ea0b2d19036217d49182f

Pixel 7: 3efe5392be3ac38afb894d13de639e521675e62571a8a9b3ef9fc8c44fd17fa1

Pixel 6a: 08c860350a9600692d10c8512f7b8e80707757468e8fbfeea2a870c0a83d6031

Pixel 6 Pro: 439b76524d94c40652ce1bf0d8243773c634d2f99ba3160d8d02aa5e29ff925c