Privacy

The Next 10 Years at REALLY — Our North Star

Written by

REALLY Wireless Logo

REALLY

10 year plan for REALLY Wireless

Summary

  • DeWi is underway, scaling global. We’re building PrivaG, a people-powered, privacy-first decentralized wireless fabric that can expand worldwide without creating identity-linked archives.


  • Multi-bearer by design (including satellites). A seamless fabric blending terrestrial DeWi, licensed macro coverage, and LEO/MEO satellite links, picked dynamically for reliability and privacy.


  • From “less data” to “zero-knowledge.” March toward verifiably minimal data, selective disclosure, and private-by-default communications using modern cryptography.


  • Open, interoperable, auditable. Core components move into open source for independent review and community contribution.


  • Reverse Number Proxy (Number Valet). We provision a carrier-facing proxy MDN that routes through a privacy “blackbox” to your everyday number, making it very hard to correlate the host’s MDN with the number you use for calling/texting.


  • Frontier R&D. Invest in post-quantum crypto and quantum networking research—ready to lead if practical breakthroughs in entanglement unlock new security/synchronization primitives (we’ll validate before productizing).

The Critic’s Question

“What do you have right now, what comes next, and how will anyone verify it?”

Phase 1 : What’s Live Today, and Why It’s Already the Best

What we already ship (today)

  • Anonymous service (no PII): Private accounts; no identity-linked dossier; no data monetization.

  • Our PrivateCore™: No centralized, identity-linked archive; no identifier mapping shared with hosts; minimal, short-lived records with published retention ceilings.

  • Hardened account safety: SIM-swap protections, monitored change flows, stronger recovery.

  • Modern voice posture: VoLTE/VoNR-first with an anti-downgrade stance; guidance to reduce legacy fallbacks.

  • Included protections (via Aura): VPN, AI call/text filters, credit monitoring, dark-web monitoring, up to $1M identity-theft insurance (policy terms apply).

  • Due-process model: Targeted, court-supervised requests across relevant parties; no dragnet because there’s no one-stop identity-linked archive.

  • DeWi (PrivaG) underway: Community deployments in coverage-gap pilots; incentives and compliance baked in; playbooks being refined for scale and portability.

Why we’re the best today (apples-to-apples)

  • Privacy by default vs. dossiers: Others maintain identity-linked archives and upsell security; we run your line without PII, without an identity-linked archive, and include core protections.

  • Not an ad product: We don’t sell or broker customer data.

  • Stronger defaults: Modern encrypted call legs prioritized, anti-downgrade posture, SIM-swap hardening, and anonymous signup so impossible to store or sell PII data

  • Security included: VPN + AI filters + monitoring + insurance—built in, not nickel-and-dimed.

  • Lawful and narrow: Case-specific access works; mass surveillance doesn’t.

What we’re working on (execution milestones)

  • DeWi pilots → regional rollouts: Expand community nodes where coverage gaps exist; incentives + safety/compliance attestations; documentation for international replication.

  • Retention & interface hardening: Publish/enforce short TTLs; maintain field-whitelist interfaces that keep identity mapping in-house.

  • Voice-path improvements: Reduce legacy interconnect reliance; device 2G-off guidance matrices; verify TLS/SRTP on modern legs.

  • Public “Receipts” package:

    • Architecture & data-flow diagrams (what never crosses boundaries)

    • Retention Matrix with concrete ceilings + deletion tests

    • Law-enforcement transparency counts (received/complied/narrowed/rejected)

    • Sanitized packet-capture summaries for modern call legs

    • Third-party attestations that hosts/vendors do not receive our subscriber-identity mapping

Near-term targets

  • Scale DeWi pilots and publish the PrivaG draft spec (deploy, discover/auth, incentives, safety).

  • Release the first “Receipts” bundle (diagrams, TTL drills, interface inventories, voice-path tests, Number Valet traces).

  • Begin multi-bearer integrations (including satellite trials) with privacy-preserving path selection.

  • Open a public privacy/security changelog (dated improvements to retention, interfaces, interconnects, and Number Valet milestones).

Phase 2 : Open, Verifiable, and Multi-Bearer

Open DeWi + protocol hardening

  • PrivaG published and open-sourced: deployment guides, discovery/auth flows, incentive mechanics, and compliance controls across multiple regulatory regions.

Selective disclosure & zero-knowledge in B/OSS

  • Swap “trust me” joins for cryptographic claims (e.g., roaming eligibility, paid status) proved without revealing identity.

  • Receipts as code: machine-verifiable configs; continuous compliance checks; policy-as-code in public repos.

Global, multi-bearer fabric (including satellites)

  • Integrate LEO/MEO satellite links for backhaul and, where feasible, direct-to-device; policy engines choose the privacy-best path moment-to-moment.

  • Privacy-preserving observability endpoints expose quality metrics globally without identity leakage.

Number Valet v2

  • Programmable aliases (work/personal/temporary) with policy-based routing.

  • Time-boxed or context-scoped proxy MDNs (events, travel, classified ads).

  • One-tap “burn/rotate” controls with safe continuity rules.

Phase 3 (Year 5–10): Private-by-Default Communications at Global Scale

Network-layer privacy

  • Post-quantum cryptography across control and media paths as standards mature—future-resistant privacy.

  • Physically un-linkable identifiers (R&D): frequent, policy-aware rotation of device/network handles; targeted due-process access still works via multi-party requests.

End-to-end options by default

  • Seamless on-ramps to e2e voice/messaging profiles with graceful PSTN fallbacks.

  • Private relays/mesh assists for resiliency during disasters—decentralized yet policy-bound to avoid data honeypots.

Frontier: Quantum networking research

  • Aim to lead if practical entanglement-based techniques enable new security/synchronization primitives.

  • Promise: no hype. We’ll publish methods, seek peer review, and only ship what stands up scientifically (today’s physics does not allow FTL data transmission; if constraints shift, we’ll lead responsibly).


What’s Non-Negotiable (Guiding Principles)

  1. No identity-linked archive. We will not build a one-stop dossier.

  2. Anonymous by default. Accounts don’t require PII; we do not monetize customer data.

  3. Separation of powers. Keep radio events, identities, and business ops siloed—no unnecessary joins.

  4. Verifiability beats marketing. Designs, tests, and audits others can reproduce and critique.

  5. Lawful, targeted access—never dragnet. Due-process requests proceed across relevant parties; mass surveillance doesn’t work here.

  6. Global by design. Architecture, docs, and compliance that travel, so communities worldwide can contribute and benefit.

What’s Already Underway (Receipts you can expect)

  • DeWi (PrivaG) pilot summaries: deployment playbooks, coverage diffs, internationalization notes.

  • Public architecture diagrams: RAN ↔ Core/B/OSS boundaries; what fields never cross; where encryption applies.

  • Retention Matrix & changelog: specific TTLs; dates of reductions; deletion verifications.

  • Interface audits: third-party reviews confirming hosts/vendors don’t receive our subscriber-identity mapping.

  • Voice-path tests: sanitized packet captures confirming modern encrypted legs; downgrade/2G-off device matrices.

  • Satellite integration proofs: path-selection demo runs showing privacy-preserving handoff to LEO/MEO links.

  • Number Valet demos: proxy assignment, rotation, and audit-trail correctness.

Risks & Reality (and how we handle them)

  • Standards & hardware cadence: Prioritize compatibility, then layer privacy features as devices/specs catch up.

  • Decentralization complexity: Require safety/compliance attestations for community nodes; remove violators; reward good actors.

  • PQ & ZK evolution: Follow conservative cryptographic guidance; stage rollouts; publish tests.

  • Quantum uncertainty: Treat quantum networking as exploratory R&D with public benchmarks; no claims without peer-reviewed evidence.

  • Global regs: Policy engines and documentation that map to regional requirements without compromising core privacy guarantees.

The Next Milestones (high level)

  • 6–12 months: DeWi pilots scale; PrivaG draft spec; first global “Receipts” bundle; initial satellite path-selection trials; Number Valet GA in supported regions/devices.

  • 12–36 months: Open-source core components; selective-disclosure pilots; privacy-preserving observability endpoints; early international DeWi communities online; Number Valet v2 (programmable aliases).

  • 3–7 years: PQ-ready control plane; wider satellite integration; relay/mesh assists in emergencies; community incentives scaled across continents.

  • 7–10 years: Private-by-default calling modes mainstream; physically un-linkable identifiers mature; if quantum breakthroughs arrive, REALLY leads in validated applications.

Wrap-Up

We’re not just shrinking data — we’re re-architecting phone service so privacy, resiliency, and verifiability come standard, everywhere. DeWi is the engine, already in motion, expanding globally and augmented by satellites. With Number Valet, we add another powerful layer against correlation. Over the decade, we’ll prove—in code, audits, and worldwide coverage maps—that a national-to-global network can be powered by people, private by default, auditable in public, and ready to harness genuine breakthroughs, including the most exciting frontiers in quantum research.

Join the only carrier that makes privacy non-negotiable.