Privacy is a basic human right.

Privacy is a basic
human right.

Our mission is to return humanity to real connection by building private, AI-native communications.

Our mission is to return humanity to real connection by building private, AI-native communications.

US fines telecoms $200M for sharing customer location data without consent

US fines telecoms $200M for sharing customer location data without consent

April 30, 2024

US fines telecoms $200M for sharing customer location data without consent

April 30, 2024

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.

That's not a glitch in the system. It is the system.

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.


That's not a glitch in the system. It is the system.

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.

That's not a glitch in the system. It is the system.

We live in a world where everything we do on our phone is tracked and stored — unless we fight back with privacy focused services. How could this affect you today or tomorrow? And what could the data collection lead to if we don't resist?

We live in a world where everything we do on our phone is tracked and stored — unless we fight back with privacy focused services. How could this affect you today or tomorrow? And what could the data collection lead to if we don't resist?

"Hackers stole call and text records on nearly all AT&T customers" - AT&T

"Hackers stole call and text records on nearly all AT&T customers" - AT&T

"Hackers stole call and text records on nearly all AT&T customers" -AT&T

This is a real search warrant from authorities.

This is a real search warrant from authorities.

Your cell phone carrier stores all of this information about you and even sells it:

Your cell phone carrier stores all of this information about you and even sells it:

SEARCH WARRANT

SEARCH WARRANT

SEARCH WARRANT

We need the following information about your customer:

We need the following information about your customer:

Subscriber Information

Subscriber Information

  • Date of birth, social security number, and government-issued ID

  • Device information including make, model, IMSI, MIN and IMEI

  • Credit application

  • Place of purchase

  • Account opening date

  • IP addresses used to access the mobile account with destination logs

  • All phone numbers and devices listed on the account

  • Payment information and history with credit-card information

  • Service/lease agreements

  • Customer-care recordings

Call Detail Records with Cell-Site Information

Call Detail Records with Cell-Site Information

  • Including local and long-distance connection records

  • IPDR with cell-site information

  • Including information passed through network extenders

Stored Electronic Communications

Stored Electronic Communications

  • Text-messaging detail and content

  • SMS and MMS content

  • Voicemail and stored-voicemail reproduction

  • IP sessions and destinations with location information

  • Email

Historical Precision Location Data

Historical Precision Location Data

  • NELOS / TruCall / Time-on-Tower

  • PCMD

  • RTT

Location Information

Location Information

  • GPS precision-location information

  • Pen Register / Trap-and-Trace with cellular-site location

  • Cell-Site Simulator (CSS)

No one should have all this data about you and it’s getting out of control.

No one should have all this data about you, and it’s getting out of control.

And since your phone number is attached to your accounts, every breach is another vulnerability.

And since your phone
number is attached to your
accounts, every breach is
another vulnerability.

86 million

Names, phones, addresses, 44M SSNs

560 million

Names, phones, emails, credit cards

57 million

Users, phones, emails, licenses

106 million

Names, phones, SSNs, bank info

143 million

Names, phones, addresses, SSNs

338 million

Names, phones, passports, birthdates

3 billion

Names, phones, birthdates, emails

37 million

Names, phones, passports & licenses

Today, microchips are already being implanted into human brains and successfully reading thoughts. What’s next?

Today, microchips are already being implanted into human brains and successfully reading thoughts. What’s next?

Your current wireless carrier does almost nothing to protect your privacy

Your current wireless carrier does almost nothing to protect your privacy

How they expose you

How they expose you

Your carrier gathers sensitive personal details—PII, credit card numbers, SSNs—and stores them on unprotected servers. While your phone’s connection to the cell tower is encrypted, everything beyond that point (DNS lookups, call records, core network) is vulnerable to hackers and data brokers. In short, your carrier’s minimal protection leaves your private information in plain view.

Your carrier gathers sensitive personal details—PII, credit card numbers, SSNs—and stores them in place they can access and hackers have breached. While your phone’s connection to the cell tower is encrypted, everything beyond that point (certain types of DNS lookups, call records, core network) is vulnerable to hackers and data brokers. In short, your carrier’s minimal protection leaves your private information in plain view.

Your data & information is constantly at risk

Your data & information is constantly at risk

Big wireless carriers expose your personal data through unprotected networks, unsecured storage, and constant surveillance.

Big wireless carriers expose your personal data through vulnerable networks, undersecured storage where they have the keys for access, and constant surveillance.

Personal data collected and full registration required

Personal data collected and full registration required

Personal data collected and full registration required

Your data flows through unsecured channels

Your data flows through unsecured channels

Your data flows through unsecured channels

Browse with zero privacy protection

Browse with zero privacy protection

Browse with zero privacy protection

Here’s what REALLY does to protect your privacy

REALLY enters the chat

1

1

We collect almost no data about you.

We collect almost no data about you.

Big Wireless

Really Wireless Logo White

2

2

We go through insane lengths to protect what we do have.

We go through insane lengths to protect what we do have.

REALLY uses cutting edge cryptography and authentication protocols to protect your account, ensuring that any data stored or that goes through our systems is secured with the highest standards

REALLY uses best in class cryptography and authentication protocols to protect your account, ensuring that any data stored or that goes through our systems is secured with the highest standards and military grade encryption.

Connect anonymously - no personal info required

Connect anonymously - no personal info required

True anonymous connection

Fully anonymous connection.

Your data travels through encrypted tunnel

Your data travels through encrypted tunnel

256-bit encryption protects everything

256-bit encryption protects subscribers.

Browse the internet privately

Browse the internet privately

Your real location and identity stay hidden

REALLY or our partners cannot see or track.

3

3

We include ALL these privacy & security tools for EVERY phone plan

We include ALL these privacy & security features with EVERY phone plan

Feature

Big Wireless

Really Wireless Logo White

PrivateCore™

Built-in software layer that provides privacy and anonymity. Learn more

Encrypted Browsing & Calling

Browsing and app usage encrypted by a powerful VPN. Learn more

Privacy Assistants + Spam Blockers

Only messages from real contacts get through.
Learn more

Anti-Spy Tools

Lock down your mic, camera, and location. Learn more

SIM Swap Protection

Multi-layer security and zero access from shady reps. Learn more

$1MM ID Theft Insurance

Covers you in case you’re a victim. Learn more

4

4

Our own mobile core technology on REALLY DeWi

Our own mobile core on REALLY DeWi

We are growing the REALLY DeWi network to provide better coverage and enhanced privacy. REALLY subscribers seamlessly roam on and off our network as coverage allows. (The majority of service today comes from our partners).

We are growing the REALLY DeWi network to provide better coverage and enhanced privacy. REALLY subscribers seamlessly roam on and off our network as coverage allows.

Even with Clone, your data is private

Even with Clone, your data is private

Clone processes everything inside a secure enclave. Locked, encrypted, and processed in isolated hardware that nobody else can access.

YOUR PHONE

YOUR PHONE

Data locked

before it leaves

Data locked before it leaves

SECURE ENCLAVE

SECURE ENCLAVE

Clone processes your

data in secure hardware

Clone processes your data in secure hardware

BACK TO YOU

BACK TO YOU

Result returns

still encrypted

Result returns still encrypted

We never see your data

We never see your data

Not while it's stored. Not while it travels. Not while it's processed.

Not while it's stored. Not while it travels. Not while it's processed.

Switch now in less than a minute

Join the only carrier that makes privacy non-negotiable.