Privacy

Our Aura Partnership: Extra Privacy & Security, On Us

Written by

REALLY Wireless Logo

REALLY

AURA and REALLY Wireless partnership

Summary

  • What you get: Included at no extra cost—VPN, AI call/text filtering, credit monitoring, dark web monitoring, and up to $1M identity theft insurance (coverage terms apply).


  • Privacy-first boundary: Aura does not receive any telco usage data (no CDRs, tower events, or network metadata from your phone service). They only get what’s required to run the Aura features you activate.


  • Two stacks, two purposes: REALLY runs your phone service (private-by-design). Aura adds opt-in personal security tools that live outside your core phone records.


  • Control & clarity: You choose which Aura features to turn on, can turn them off anytime, and can delete your Aura account independently.

The Critic’s Question

“If Aura is included, does that mean my phone records or identity are flowing to a third party?”

The Short Answer

No. Your phone service data stays with REALLY. Aura gets only what’s needed to deliver the consumer security features you enable (e.g., an email for breach alerts). No tower logs, no CDRs, no telco metadata are shared with Aura.

What You Get with Aura (Included)

  • VPN (Aura today): Encrypts your data connection on and off-network (e.g., public Wi-Fi). Complements our telco-native protections.

  • AI Call Filter: Screens likely spam/scam calls.

  • AI Text Filter: Flags suspicious SMS/MMS patterns (phishing, impersonation).

  • Credit Monitoring: Alerts on changes to your credit profile.

  • Dark Web Monitoring: Notifies you if your credentials show up in known breaches.

  • Up to $1M Identity Theft Insurance: Reimbursement and restoration assistance (policy terms apply).


How the Boundary Works (In Plain English)

  • REALLY (Telco side): Runs the REALLY PrivateCore™ (provisioning, billing, support). We don’t ship identity-linked phone usage or network metadata to Aura.

  • Aura (Security side): Runs consumer security tools. They need basic account info (e.g., email), and only the indicators you provide (e.g., emails to monitor).

  • No cross-pollination: Aura’s features do not require your call detail records, tower location history, or RADIUS/IMS logs—and we don’t share them.


Controls You Have

  • Opt-in features: Turn specific Aura features on/off.

  • Data minimization: Provide only the identifiers you want monitored (e.g., which emails).

  • Independent account management: You can delete or export Aura data directly with Aura, separate from your phone account.

  • Transparency: See exactly what’s monitored and why alerts were triggered.

Practical Examples

Public Wi-Fi at a café

  • Aura VPN encrypts your traffic on the hotspot.

  • REALLY never shares your phone’s call/tower metadata with Aura.

Suspicious text

  • Aura’s AI Text Filter flags a likely phishing message.

  • No need for Aura to see your telco logs to make that determination.

Password breach

  • Dark Web Monitoring finds your email in a breach; you get an alert to reset credentials.

  • This uses your chosen identifiers, not your phone usage history.


Why We Include Aura (and Still Keep Your Privacy)

  • Defense-in-depth: Telco privacy + device/app protections are stronger together.

  • Separation of concerns: Keeping telco operations separate from consumer security avoids the data-grab many “bundles” try to justify.

  • You stay in control: No adtech, no selling of telco data, no hidden pipelines.

Honest Limits & Boundaries

  • Aura’s tools aren’t perfect: If a device is infected with advanced malware, specialized remediation may be required.

  • Policy terms apply: Identity theft insurance is governed by Aura’s policy documents.

  • Feature evolution: We’ll continue to improve and will document changes in a public changelog.

Wrap-Up

You get serious personal-security tools included, without shipping your phone service data to a third party. Two stacks, two purposes, one clear privacy boundary.

Sources: Aura product docs/policy links (for features/insurance terms); your Privacy Spec & Retention Matrix.

Proof & verification (in progress)

  • Policy: Public statement that Aura receives no telco usage data (no CDRs/tower metadata/identifier mapping); list of allowed fields for account creation and feature indicators.

  • Architecture: Data-flow diagram showing REALLY B/OSS + core ↔ Aura with a labeled “No Telco Data Shared” boundary.

  • Audit: Vendor due-diligence summary; Aura’s independent audit/certification summaries (e.g., SOC 2) + your vendor risk review.

  • Tests: Network inspection showing the app makes no calls to Aura carrying telco metadata; feature activation logs demonstrating indicator-only flow.

  • Transparency: Feature changelog; link to Aura’s privacy policy in plain English; your page listing the exact identifiers each feature needs.

  • Contracts: DPA with Aura including field whitelist, purpose limitation, retention ceilings, no secondary use/re-ID, no adtech.

Join the only carrier that makes privacy non-negotiable.