
Summary
Built in by REALLY
Anonymous signup (no Personally Identifiable Information)
The REALLY PrivateCore™
No centralized, identity-linked archive
No identifier mapping shared with hosts
Short retention with public ceilings
SIM-swap protection & account hardening
Encrypted-calling protections (VoLTE/VoNR-first, anti-downgrade stance)
Device hygiene tools Device Scanner, Anti-Spy Setup
Data-removal service (helps remove your info from data brokers)
Powered by Aura (included)
AI call filter
AI text filter
Credit monitoring
Dark web monitoring
Identity-theft insurance up to $1M (policy terms apply)
Big picture
Private phone service by default
Practical security tools included…not upsells
The Critic’s Question
“What exactly are the privacy and security features I get with REALLY, and which ones are yours vs. Aura’s?”
Built In by REALLY (Telco-Native)
1) Anonymous Accounts (No PII)
Start and use service without personal identifiable information.
Your service is not an ad product; we don’t monetize customer data.
2) Our PrivateCore™ Technology
We run the “brains” of the network ourselves: provisioning, policy, billing, and care.
No centralized, identity-linked archive of your historical usage.
No identifier mapping (IMSI/eSIM/ICCID ↔ account) shared with hosts.
3) Minimal Data, Short Retention
Clear retention ceilings; delete on schedule.
4) SIM-Swap Protection & Account Hardening
Extra verification for SIM changes and recovery flows.
Monitored, auditable change workflows.
5) Encrypted-Calling Protections (Network Side)
VoLTE/VoNR-first; anti-downgrade stance where devices support it.
Guidance to reduce legacy fallbacks (e.g., 2G-off where available).
6) Device Hygiene (Optional Helpers)
Device Scanner: quick checks for risky settings/signals.
Anti-Spy Setup: step-by-step hardening guide for iOS/Android (permissions, OS updates, lockdown tips).
7) Data-Removal Service
One-tap jumpstart to remove your info from data brokers (outside the telco system).
Helpful for shrinking your overall digital footprint.
Powered by Aura (Included, Lives Outside Your Telco Data)
8) VPN (Aura)
Encrypts your internet traffic on public Wi-Fi and other untrusted networks; supports major platforms.
Complements our network-side privacy.
9) AI Call Filter
Screens likely spam/scam calls to reduce social-engineering risk.
10) AI Text Filter
Flags suspicious SMS/MMS (phishing, impersonation, malware links).
11) Credit Monitoring
Alerts on changes to your credit profile.
12) Dark Web Monitoring
Notifies you if your selected identifiers (e.g., email) appear in known breaches.
13) Identity-Theft Insurance (up to $1M)
Reimbursement/restoration assistance if identity fraud occurs (policy terms apply).
Note: Aura receives only what’s needed to run the features you enable (e.g., an email to monitor). Aura does not receive telco usage data (no CDRs, tower history, or our subscriber-identity mapping).
What’s Built-In vs. Powered by Aura (One Look)
Area | YOU GET | Provided By |
|---|---|---|
PrivateCore™ | Private account, no PII required | REALLY |
No identity-linked archive | Minimal, siloed, short-lived records | REALLY |
No identifier mapping to hosts | Mapping kept in-house | REALLY |
SIM-swap protection | Hardened change & recovery flows | REALLY |
Encrypted-calling protections | VoLTE/VoNR-first, anti-downgrade stance | REALLY |
Device hygiene tools | Device Scanner & Anti-Spy Setup | REALLY |
Data-removal service | Automated broker opt-outs | REALLY |
VPN | On-device VPN app | Aura (included) |
AI call & text filters | Spam/scam and phishing defense | Aura (included) |
Credit & dark web monitoring | Alerts on credit changes & breach hits | Aura (included) |
Identity-theft insurance | Up to $1M coverage | Aura (included) |
Practical Examples
Traveling & hotel Wi-Fi: Use Aura VPN for encrypted browsing; your phone-service records remain private and separate.
SIM change request: Our SIM-swap protections add verification and logging; casual takeovers get much harder.
Unknown caller/text: AI call/text filters lower scam risk; your telco data isn’t shared to provide these features.
Breach alert: Dark web monitoring spots your email in a leaked dataset; use our data-removal service to shrink exposure.
High-risk voice: Keep calls on VoLTE/VoNR where possible; for sensitive topics, consider an e2e app (our VPN helps those data sessions).
FAQs
Do I have to use Aura to get privacy?
No. Your phone service is private by design. Aura adds extra security features at no extra cost.
Does Aura see my phone usage or location history?
No. Aura does not receive telco usage data from us.
Do you sell or broker my data?
No. We do not monetize customer data.
Can hosts tie tower logs to me?
Not via us. We don’t share our account↔identifier mapping.
Do you store call content or build a lifetime history?
No. We keep minimal, short-lived operational records—no centralized, identity-linked archive.
Wrap-Up
With REALLY, your phone service is private by default, anonymous accounts, minimized records, short retention, and hardened account/voice protections, plus a powerful set of included personal-security tools via Aura. It’s the combination of less data about you and more protection for you.
Honest limits
Carrier voice isn’t end-to-end encrypted (PSTN reality). We improve the defaults (VoLTE/VoNR-first, anti-downgrade), but for maximum confidentiality use e2e apps.
If a device is compromised (spyware/malware), network protections can’t fix the endpoint—follow our Anti-Spy Setup.
Identity-theft insurance and certain Aura features have policy/plan terms and platform differences.
Proof & verification (in progress)
Policy: No-PII signup; Privacy Spec (datasets, purpose, access, TTL); Lawful-Process policy (targeted, case-based; no dragnet); No-Monetization statement.
Architecture: Data-flow showing REALLY Core/B/OSS boundaries; interface field whitelists; “no identifier mapping shared” line to hosts; separation diagram for Aura features.
Audit: SOC 2 / ISO 27701 control summaries (access control, logging, retention enforcement, vendor oversight).
Tests: TTL drills (“request after window” → no data found); field-level export checks; voice-path captures confirming modern encryption legs; app-level checks that no telco usage data flows to Aura.
Transparency: Law-enforcement transparency report; privacy/security changelog (e.g., reduced TTLs, tightened fields).
Contracts: Vendor/roaming DPAs with purpose limitation, retention ceilings, no re-ID, no secondary use, no adtech.
Join the only carrier that makes privacy non-negotiable.




