Happy to see a privacy-focused carrier, and it has better policies than any other carrier out there. But founder is formerly from Palantir and there’s a lot of VC money behind it (not inherently a problem, just flagging).
Thoughts?
Happy to see a privacy-focused carrier, and it has better policies than any other carrier out there. But founder is formerly from Palantir and there’s a lot of VC money behind it (not inherently a problem, just flagging).
Thoughts?
https://cyberscoop.com/cape-phone-privacy-calea-tracking/
Good article which points to a few promising aspects. They seem to have their own phones (as of Nov 24) as part of this. Second, that their market is “high risk” individuals. So people with money, it sounds like. If the pricing reflects a market for governments, celebs, and crypto bros trying to not get SIM swap attacked, then it’s not likely a honeypot for Feds. Maybe.
I hate the idea of only being allowed to use their phones, but that might just be their “easy mode” for idiot celebrities or government contracts. If they can give me a physical SIM, I’m interested.
I would not be an early adopter. Hang and see who isn’t a plant that joins.
The feds have already pulled a similar stunt with another manufacturer+software combo. (https://en.m.wikipedia.org/wiki/Operation_Trojan_Shield#Distribution_and_usage)
The only thing that makes this smell legit is the fact that it is a provider and probably only eSIMs. But even then, this is not very good opsec to be deliberately using a marketed product that will likely have an identifier for their cell traffic. Graphene works as well as it does because it runs of pre-existing hardware to be more inconspicuous.
Thanks for that link. I didn’t know that. We are below the US in privacy laws! Is there any first world country worst than Australia?
They said all users were criminals, but who knows what they are calling a crime, specially with the retarded laws down here…
It shows what I suspected, that Australian software and servers must be avoided even more than Americans.
Well, opsec can only go so far. At some point you need data packets traveling over real wires, and it’s a question of who do you trust with unencrypted data like SMS? Using a data only VPN is “clunky” for wealthy manbabies, who demand less friction in everything they do.
Simply having your data going to their service is immaterial since it’s likely the phone number also indicates it’s a Cape carrier phone, and the IMEI of the phone doesn’t ping for any other carrier.
It’s a strong “ugh…maybe, we’ll see” from me, but I wouldn’t bother with it for another 6 months and see if it ends up one of those super elitist things wealthy people talk about only to each other.
So, they have their own phone that is for high risk individuals and is not available to the general public. Then, separately they have their own mobile network that you can use with any regular phone and they sell Pixels on their website (for $50, you can have them pre-load GraphineOS). The AD i posted is for their cellular network, which is not related to their own first-party device.
It’s a good call to post, but waaay too soon IMO too bother with it. It might simply be flash in the pan marketing for VC funding and not work. It might be a total scam. It might be legit and poorly run. It might be the real deal. It’s hard to say without more data.
You should not use a phone with preloaded graphene without first checking the hash. It’s also kind of insane to charge $50 for it, when Graphene’s web installer just has you click buttons to install. You can even use another phone to do it.
100% agree. I would definitely not have them install graphene for you. Do it yourself so you know what’s in the installation
The best answer