Privacy

REALLY Privacy & Security Features

Written by

REALLY Wireless Logo

REALLY

REALLY Wireless privacy and security features

Summary

Built in by REALLY

  • Anonymous signup (no Personally Identifiable Information)

  • The REALLY PrivateCore™

  • No centralized, identity-linked archive

  • No identifier mapping shared with hosts

  • Short retention with public ceilings

  • SIM-swap protection & account hardening

  • Encrypted-calling protections (VoLTE/VoNR-first, anti-downgrade stance)

  • Device hygiene tools Device Scanner, Anti-Spy Setup

  • Data-removal service (helps remove your info from data brokers)

Powered by Aura (included)

  • VPN

  • AI call filter

  • AI text filter

  • Credit monitoring

  • Dark web monitoring

  • Identity-theft insurance up to $1M (policy terms apply)

Big picture

  • Private phone service by default

  • Practical security tools included…not upsells

The Critic’s Question

“What exactly are the privacy and security features I get with REALLY, and which ones are yours vs. Aura’s?”

Built In by REALLY (Telco-Native)

1) Anonymous Accounts (No PII)

  • Start and use service without personal identifiable information.

  • Your service is not an ad product; we don’t monetize customer data.

2) Our PrivateCore™ Technology

  • We run the “brains” of the network ourselves: provisioning, policy, billing, and care.

  • No centralized, identity-linked archive of your historical usage.

  • No identifier mapping (IMSI/eSIM/ICCID ↔ account) shared with hosts.

3) Minimal Data, Short Retention

  • Clear retention ceilings; delete on schedule.

4) SIM-Swap Protection & Account Hardening

  • Extra verification for SIM changes and recovery flows.

  • Monitored, auditable change workflows.

5) Encrypted-Calling Protections (Network Side)

  • VoLTE/VoNR-first; anti-downgrade stance where devices support it.

  • Guidance to reduce legacy fallbacks (e.g., 2G-off where available).

6) Device Hygiene (Optional Helpers)

  • Device Scanner: quick checks for risky settings/signals.

  • Anti-Spy Setup: step-by-step hardening guide for iOS/Android (permissions, OS updates, lockdown tips).

7) Data-Removal Service

  • One-tap jumpstart to remove your info from data brokers (outside the telco system).

  • Helpful for shrinking your overall digital footprint.


Powered by Aura (Included, Lives Outside Your Telco Data)

8) VPN (Aura)

  • Encrypts your internet traffic on public Wi-Fi and other untrusted networks; supports major platforms.

  • Complements our network-side privacy.

9) AI Call Filter

  • Screens likely spam/scam calls to reduce social-engineering risk.

10) AI Text Filter

  • Flags suspicious SMS/MMS (phishing, impersonation, malware links).

11) Credit Monitoring

  • Alerts on changes to your credit profile.

12) Dark Web Monitoring

  • Notifies you if your selected identifiers (e.g., email) appear in known breaches.

13) Identity-Theft Insurance (up to $1M)

  • Reimbursement/restoration assistance if identity fraud occurs (policy terms apply).

Note: Aura receives only what’s needed to run the features you enable (e.g., an email to monitor). Aura does not receive telco usage data (no CDRs, tower history, or our subscriber-identity mapping).

What’s Built-In vs. Powered by Aura (One Look)

Area

YOU GET

Provided By

PrivateCore™

Private account, no PII required

REALLY

No identity-linked archive

Minimal, siloed, short-lived records

REALLY

No identifier mapping to hosts

Mapping kept in-house

REALLY

SIM-swap protection

Hardened change & recovery flows

REALLY

Encrypted-calling protections

VoLTE/VoNR-first, anti-downgrade stance

REALLY

Device hygiene tools

Device Scanner & Anti-Spy Setup

REALLY

Data-removal service

Automated broker opt-outs

REALLY

VPN

On-device VPN app

Aura (included)

AI call & text filters

Spam/scam and phishing defense

Aura (included)

Credit & dark web monitoring

Alerts on credit changes & breach hits

Aura (included)

Identity-theft insurance

Up to $1M coverage

Aura (included)

Practical Examples

  • Traveling & hotel Wi-Fi: Use Aura VPN for encrypted browsing; your phone-service records remain private and separate.

  • SIM change request: Our SIM-swap protections add verification and logging; casual takeovers get much harder.

  • Unknown caller/text: AI call/text filters lower scam risk; your telco data isn’t shared to provide these features.

  • Breach alert: Dark web monitoring spots your email in a leaked dataset; use our data-removal service to shrink exposure.

  • High-risk voice: Keep calls on VoLTE/VoNR where possible; for sensitive topics, consider an e2e app (our VPN helps those data sessions).

FAQs

Do I have to use Aura to get privacy?
No. Your phone service is private by design. Aura adds extra security features at no extra cost.

Does Aura see my phone usage or location history?
No. Aura does not receive telco usage data from us.

Do you sell or broker my data?
No. We do not monetize customer data.

Can hosts tie tower logs to me?
Not via us. We don’t share our account↔identifier mapping.

Do you store call content or build a lifetime history?
No. We keep minimal, short-lived operational records—no centralized, identity-linked archive.


Wrap-Up

With REALLY, your phone service is private by default, anonymous accounts, minimized records, short retention, and hardened account/voice protections, plus a powerful set of included personal-security tools via Aura. It’s the combination of less data about you and more protection for you.

Honest limits

  • Carrier voice isn’t end-to-end encrypted (PSTN reality). We improve the defaults (VoLTE/VoNR-first, anti-downgrade), but for maximum confidentiality use e2e apps.

  • If a device is compromised (spyware/malware), network protections can’t fix the endpoint—follow our Anti-Spy Setup.

  • Identity-theft insurance and certain Aura features have policy/plan terms and platform differences.

Proof & verification (in progress)

  • Policy: No-PII signup; Privacy Spec (datasets, purpose, access, TTL); Lawful-Process policy (targeted, case-based; no dragnet); No-Monetization statement.

  • Architecture: Data-flow showing REALLY Core/B/OSS boundaries; interface field whitelists; “no identifier mapping shared” line to hosts; separation diagram for Aura features.

  • Audit: SOC 2 / ISO 27701 control summaries (access control, logging, retention enforcement, vendor oversight).

  • Tests: TTL drills (“request after window” → no data found); field-level export checks; voice-path captures confirming modern encryption legs; app-level checks that no telco usage data flows to Aura.

  • Transparency: Law-enforcement transparency report; privacy/security changelog (e.g., reduced TTLs, tightened fields).

  • Contracts: Vendor/roaming DPAs with purpose limitation, retention ceilings, no re-ID, no secondary use, no adtech.

Join the only carrier that makes privacy non-negotiable.