Privacy is a fundamental human right

Privacy is a fundamental human right.

Our mission is to protect free expression by enabling humans to connect with total privacy and security.

We live in a world where everything we do on our phone is tracked and stored — unless we fight back with privacy focused services. How could this affect you today or tomorrow? And what could the data collection lead to if we don't resist?

US fines telecoms $200M for sharing customer location data without consent

US fines telecoms $200M for sharing customer location data without consent

April 30, 2024

US fines telecoms $200M for sharing customer location data without consent

April 30, 2024

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.

That's not a glitch in the system. It is the system.

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.


That's not a glitch in the system. It is the system.

Edward Snowden

@snowden

Your smartphone broadcasts your exact location thousands of times per day to dozens of different companies. Each has the power to follow individuals wherever they go, in near-real time.

That's not a glitch in the system. It is the system.

"Hackers stole call and text records on nearly all AT&T customers" - AT&T

"Hackers stole call and text records on nearly all AT&T customers"

"Hackers stole call and text records on nearly all AT&T customers" -AT&T

This is a real search warrant from authorities.

Your cell phone carrier stores all of this information about you and even sells it:

We need the following information about your customer:

We need the following information about your customer:

Subscriber Information

Subscriber Information

Date of birth, social security number, and government-issued identification

Device information including make, model, IMSI, MIN, MSID, IMEI, and MAC address

Credit application

Place of purchase

Account opening date

Customer account notes

IP addresses used to access the mobile account with destination logs

All phone numbers and devices listed on the account

Payment information and history with credit-card information

Service/lease agreements

Customer-care recordings


Call Detail Records with Cell-Site Information

Including local and long-distance connection records

IPDR with cell-site information

Including information passed through network extenders


Stored Electronic Communications

Text-messaging detail and content

SMS and MMS content

Voicemail and stored-voicemail reproduction

IP sessions and destinations with location information

Email

Date of birth, social security number, and government-issued identification

Device information including make, model, IMSI, MIN, MSID, IMEI, and MAC address

Credit application

Place of purchase

Account opening date

Customer account notes

IP addresses used to access the mobile account with destination logs

All phone numbers and devices listed on the account

Payment information and history with credit-card information

Service/lease agreements

Customer-care recordings


Call Detail Records with Cell-Site Information

Including local and long-distance connection records

IPDR with cell-site information

Including information passed through network extenders


Stored Electronic Communications

Text-messaging detail and content

SMS and MMS content

Voicemail and stored-voicemail reproduction

IP sessions and destinations with location information

Email

Historical Precision Location Data

Historical Precision Location Data

NELOS / TruCall / Time-on-Tower

PCMD

RTT

NELOS / TruCall / Time-on-Tower

PCMD

RTT

Location Information

Location Information

GPS precision-location information

Pen Register / Trap-and-Trace with cellular-site location

Cell-Site Simulator (CSS)

GPS precision-location information

Pen Register / Trap-and-Trace with cellular-site location

Cell-Site Simulator (CSS)

No one should have all this data about you and it’s getting out of control.

And since your phone number is attached to your accounts, every breach is another vulnerability.

86 million

Names, phones, addresses, 44M SSNs

560 million

Names, phones, emails, credit cards

57 million

Users, phones, emails, licenses

106 million

Names, phones, SSNs, bank info

143 million

Names, phones, addresses, SSNs

338 million

Names, phones, passports, birthdates

3 billion

Names, phones, birthdates, emails

37 million

Names, phones, passports & licenses

Today, microchips are already being implanted into human brains and successfully reading thoughts. What’s next?

Your current wireless carrier does almost nothing to protect your privacy

How they expose you

Your carrier gathers sensitive personal details—PII, credit card numbers, SSNs—and stores them on unprotected servers. While your phone’s connection to the cell tower is encrypted, everything beyond that point (DNS lookups, call records, core network) is vulnerable to hackers and data brokers. In short, your carrier’s minimal protection leaves your private information in plain view.

Your data & information is constantly at risk

Your data & information is constantly at risk

Big wireless carriers expose your personal data through unprotected networks, unsecured storage, and constant surveillance.

Personal data collected and full registration required

Personal data collected and full registration required

Your data flows through unsecured channels

Your data flows through unsecured channels

Browse with zero privacy protection

Browse with zero privacy protection

But here’s what REALLY does to protect your privacy

REALLY enters the chat

1

1

1

We collect no almost data about you.

Big Wireless

Really Wireless Logo White

2

2

2

We go through insane lengths to protect what we do have.

We go through insane lengths to protect what we do have.

REALLY uses cutting edge cryptography and authentication protocols to protect your account, ensuring that any data stored or that goes through our systems is secured with the highest standards

Connect anonymously - no personal info required

Connect anonymously - no personal info required

True anonymous connection

True anonymous connection

Your data travels through encrypted tunnel

Your data travels through encrypted tunnel

256-bit encryption protects everything

256-bit encryption protects everything

Browse the internet privately

Browse the internet privately

Your real location and identity stay hidden

Your real location and identity stay hidden

3

3

3

We include ALL these privacy & security tools for EVERY phone plan

We include ALL these privacy & security tools for EVERY phone plan

Feature

Big Wireless

Really Wireless Logo White

Anonymous

You can’t track someone you don’t know

Encrypted Browsing & Calling

Cannot see internet or app activity or listen to calls

Privacy Assistants + Spam Blockers

No more spam calls or texts

Anti-Spy Tools

Your phone is safe from spying

SIM Swap Protection

Hacker’s cannot use your number to steal

$1MM ID Theft Insurance

Covers you in case you’re a victim

4

4

4

We run our own mobile core technology on REALLY DeWi

We are growing the REALLY DeWi network to provide better coverage and enhanced privacy. REALLY subscribers seamlessly roam on and off our network as coverage allows. (The majority of service today comes from our partners).

REALLY’s Levels of Privacy for Mobile Carriers

LEVEL 1

No Privacy 

FOR THE NERDS

Key Feature: AccessibilityData is fully exposed (e.g., public Wi-Fi, unencrypted networks). No encryption or security measures in place.

IN PLAIN ENGLISH

Your data’s out in the open—like shouting your secrets in the middle of Times Square. No protection, no nothing. Think public Wi-Fi at your sketchy coffee shop.

LEVEL 2

Partially Encrypted

FOR THE NERDS

Key Feature: Partially Encrypted  Encrypted in transit but vulnerable to carrier access & the internet. Examples: Verizon, AT&T, T-Mobile standard networks.

IN PLAIN ENGLISH

A little better. Your stuff’s locked up on its way to where it’s going, but your carrier (like Verizon, AT&T) has the key and can peep anytime they want (and so can anyone they sell it to or who steals those keys). Some protection, but don’t bet on it. Do youread the news?

LEVEL 3

Fully Encrypted

FOR THE NERDS

Key Feature: Fully Encrypted Encrypted by a third-party with an open-source or audited zero-log policy. No carrier access. Requires trust in the VPN/encryption solution.

IN PLAIN ENGLISH

Using a VPN? Your data’s got some armor. Encrypted all the way with a “no log” policy. That means there’s no record of your secrets. Carriers can’t touch it, but you gotta trust your provider.

LEVEL 4

Disaggregated

FOR THE NERDS

Key Feature: Disaggregated Personally Identifiable Information (PII) is separated from Call Detail Records (CDRs) and usage data. Protects users from correlation attacks.

IN PLAIN ENGLISH

We split up your personal info from your call records and usage. It’s a lot more work for a hacker or big brother to solve this puzzle.

LEVEL 5

Really Wireless Logo White

As of 1/30/25

Anonymity

FOR THE NERDS

Key Feature: Anonymity No customer PII is ever collected. Users remain anonymous to the carrier. + Level 3 

IN PLAIN ENGLISH

No personal info collected, period. You’re invisible. Even the carrier doesn’t know who you are. Straight-up ninja mode. If someone hacks in, they can’t connect the dots back to you.

LEVEL 1

No Privacy 

FOR THE NERDS

Key Feature: AccessibilityData is fully exposed (e.g., public Wi-Fi, unencrypted networks). No encryption or security measures in place.

IN PLAIN ENGLISH

Your data’s out in the open—like shouting your secrets in the middle of Times Square. No protection, no nothing. Think public Wi-Fi at your sketchy coffee shop.

LEVEL 2

Partially Encrypted

FOR THE NERDS

Key Feature: Partially Encrypted  Encrypted in transit but vulnerable to carrier access & the internet. Examples: Verizon, AT&T, T-Mobile standard networks.

IN PLAIN ENGLISH

A little better. Your stuff’s locked up on its way to where it’s going, but your carrier (like Verizon, AT&T) has the key and can peep anytime they want (and so can anyone they sell it to or who steals those keys). Some protection, but don’t bet on it. Do youread the news?

LEVEL 3

Fully Encrypted

FOR THE NERDS

Key Feature: Fully Encrypted Encrypted by a third-party with an open-source or audited zero-log policy. No carrier access. Requires trust in the VPN/encryption solution.

IN PLAIN ENGLISH

Using a VPN? Your data’s got some armor. Encrypted all the way with a “no log” policy. That means there’s no record of your secrets. Carriers can’t touch it, but you gotta trust your provider.

LEVEL 4

Disaggregated

FOR THE NERDS

Key Feature: Disaggregated Personally Identifiable Information (PII) is separated from Call Detail Records (CDRs) and usage data. Protects users from correlation attacks.

IN PLAIN ENGLISH

We split up your personal info from your call records and usage. It’s a lot more work for a hacker or big brother to solve this puzzle.

LEVEL 5

Really Wireless Logo White

As of 1/30/25

Anonymity

FOR THE NERDS

Key Feature: Anonymity No customer PII is ever collected. Users remain anonymous to the carrier. + Level 3 

IN PLAIN ENGLISH

No personal info collected, period. You’re invisible. Even the carrier doesn’t know who you are. Straight-up ninja mode. If someone hacks in, they can’t connect the dots back to you.

LEVEL 6

LEVEL 7

LEVEL 8

Building for the future, leveling up

FOR THE NERDS

We are working on levels 6, 7 & 8 now! They include features like protecting MSIDN even more, and making sure your IMSI and IMEI are safe too. Soon we plan to get rid of CDRs totally using something called RADIUS instead. We also plan to use our own mobile core on the major networks giving us ability.

Eventually we plan to leverage Quantum Resistant Encryption to protect every human on earth (the universe?). Uses AES-512 or other post-quantum cryptography (PQC) for maximum protection. Future-proofed against quantum computing attacks.

IN PLAIN ENGLISH

We are working on levels 6, 7 & 8 now! They include features like protecting your phone number even more, and making sure other identifiers and protocols are secured too. Soon we plan to prevent all unnecessary data collection and only collect what necessary to operate a network and bill correctly!

Level 9: Quantum-Resistant Encryption coming less soon. This is the future-proof stuff. Encryption so strong, not even tomorrow’s quantum computers can crack it. Your data’s in a fortress with walls thicker than the Great Wall of China.

Ready to reclaim your human right?

Join the only carrier that makes privacy non-negotiable.