0:02 It's impossible to track someone if they
0:03 keep changing who they are at every
0:06 location. And that's exactly what this
0:07 phone does. Sell me providers,
0:10 organizations, and hackers use three
0:12 elements to build your digital profile
0:15 and track you. They use the ad ID, which
0:17 is how advertisers track your activity.
0:20 They use the IMEI number, which is a set
0:22 of 15 character numbers that identifies
0:25 the type of phone that you have. And
0:28 they use the ISY number. Now, this is a
0:29 unique number that is used by the
0:31 cellular providers and it's used to
0:34 authenticate your device to be able to
0:36 use their network. But watch what you
0:40 can do with this phone, right? You fire
0:42 up the Cape app on the phone and it
0:43 looks pretty blank because the first
0:46 thing we want to do is create a persona.
0:48 Now, a persona is essentially a profile
0:51 and to each profile, you can actually
0:53 allocate its own unique information. So
0:55 in this case, I'm going to choose an MZY
0:58 number for this profile. And I'm going
1:00 to choose an IMEI number, which is
1:02 essentially what is this going to
1:05 pretend to be? An LG V20 as an example.
1:07 And then I'm going to allocate it an
1:10 advertising ID. So whenever this profile
1:12 is used, this is the information that
1:14 people are going to be able to
1:17 technically track. Now let's go add
1:20 another profile, another persona. This
1:21 one is going to call it meeting. And
1:24 again, I'm allocating MZ, IMEI, and an
1:27 AD ID. Now I have two profiles on my
1:29 device. And that means I can rotate
1:31 between the profiles. If anybody's
1:33 tracking me on the one location, as soon
1:36 as I rotate, well, basically I'm a new
1:38 person. But it gets even better. Let me
1:40 create another profile called airports.
1:43 And now what I do is I go to the geo
1:46 fencing. And this is where it gets
1:48 ridiculously cool. I can choose any
1:50 place on a map. I can choose a polygon
1:53 or a circle here. This is the DFW
1:55 airport. I'm going to click into it. I'm
1:58 going to then draw my circle, give it a
2:00 diameter in miles. How many miles around
2:02 the airport? In this case, it's 2.5
2:05 miles. And what I do is I'm going to
2:08 assign it a persona. So, I'm going to
2:10 click on that. I'm going to choose my
2:11 airport persona, which remember it's got
2:14 a new MC, a new IMEI number, and a new
2:16 ad ID. Then I'm just going to simply
2:18 give it a name, something I'll recognize
2:21 for later on. DFW airport as an example,
2:23 and I click on the save button and
2:26 confirm it. So if somebody's tracking my
2:28 location as soon as I hit within the 2.5
2:31 mile radius of the DFW airport, I'll
2:33 automatically get a new MC number, a new
2:36 IMEI number, and a new ad ID. So I'm
2:37 going to be seen as a completely
2:39 different person and no longer be able
2:41 to get tracked. And I can repeat this
2:43 multiple times creating multiple geol
2:46 locations based on where I'm going and
2:48 what I'm doing. Okay, but how do we know
2:50 that it actually works and just doesn't
2:52 show you pretty graphics on the screen?
2:54 Well, there's actually a way to test it.
2:56 So, here I have my persistent persona,
2:58 which is basically the one that I use
3:00 constantly. I can go to my phone
3:02 information and then you can see the
3:05 IMEI number is 9519 and the MZY number
3:08 ends in 2623.
3:10 Now, let's go back to the Cape app.
3:12 Let's switch the persona and let it kind
3:15 of reset and rotate. And then let's go
3:17 back to the phone information. You can
3:19 see there we go. IMEI number has been
3:22 updated to 6792 and the MZY number is
3:26 now 2853. So, it works. This is some
3:30 next level anti-tracking privacy stuff.
3:32 This device is specifically made for
3:34 those in governments or those in
3:36 high-profile individuals who may be
3:39 targeted or under surveillance. But
3:42 let's be honest, that is not 95% of us.
3:45 So, how do we get something that is
3:48 close to this level of protection? Well,
3:50 the company that provides this device is
3:53 called Cape and they built an entire
3:57 mobile carrier that prioritizes privacy
3:59 and security. and they're also the
4:02 sponsors of today's video. They do not
4:05 collect your data and they don't sell it
4:08 unlike other providers. Even on their
4:10 website where it normally has a cookie
4:12 notification, it says this website
4:15 doesn't use cookies because we mean it
4:20 when we say we track less. And this is
4:22 what they mean. Right. This is the Cape
4:25 app on a regular Android phone or an iOS
4:27 phone. I'm using an Android version of
4:29 this. And the first thing it tells me is
4:30 look, this is what it's going to cost.
4:33 This is unlimited privacy, enhanced
4:35 signal protection, SIM swap protection,
4:37 anonymous signup, and cancel at any
4:38 time. So, I'm going to choose a new
4:41 phone number and I'm going to be able to
4:43 select where do I want that phone number
4:45 to be. And in my case, I'm going to
4:47 choose New York. And then I can choose
4:49 an area code. And it gives me obviously
4:52 only the New York-based codes. Okay,
4:53 let's move on. And now I want to read
4:55 the terms and condition. And no, it's
4:57 not a 9,000page document. is pretty
4:59 clear that you can see we will never
5:02 sell your personal data to any third
5:04 party. You can cancel at any time.
5:06 Transparent about data collections etc.
5:08 So I click on pay now. I obviously enter
5:10 my credit card details and now I'm ready
5:13 to activate my cape services. Now the
5:16 next screen is it you will see a 24
5:18 words on the next page. This is the
5:21 recovery passphrase. Let me show you
5:23 what that's about. I have here 24
5:25 different words. Obviously, I'm blurring
5:27 them out because this is super important
5:29 for the safety of my account, but there
5:31 is 24 words in here. And on the next
5:33 screen, it basically wants to make sure
5:34 that you've written them down. So, you
5:36 got to play this little game of putting
5:38 the right words in the right spot
5:40 because everything revolves around this
5:43 passphrase. Once you go through that,
5:45 you're ready to activate your ESIM and
5:47 you're ready to use the service. So,
5:49 what just happened? Well, the first
5:52 thing you would have noticed was that 24
5:55 keywords. This is where the real magic
5:57 comes in. Cape has built their own
6:00 mobile cloudnative core which is like
6:03 the central nervous system of a network.
6:06 The core controls everything and manages
6:08 all the complexity of connecting people
6:11 moving across the networks across nodes
6:14 across operators and across countries.
6:16 And since the entire system was built
6:18 with security first and implemented by
6:20 expert vetted cryptography and security
6:23 protocols, it means it's a secure
6:27 system. Even their internal processes
6:31 are encrypted. So that unique 24 words
6:34 is actually your passphrase. It's the
6:36 only way for you to verify your account
6:39 and ensures that nobody can hack into
6:42 your account or steal your phone number.
6:44 But we'll get on to that shortly. Think
6:47 of it like a password manager. Only you
6:49 know the master password to unlock your
6:52 password manager and see your passwords.
6:54 Even the company that provides the
6:57 password manager services cannot access
7:00 your own password. It is that secure.
7:02 Same thing here. If you want to move
7:05 your Cape account from one phone to
7:07 another, as an example, only you can do
7:10 it by knowing your passphrase. If you
7:13 lose that passphrase, you cannot get
7:16 Cape to reset it or issue a new one. And
7:19 why is this super important? Because it
7:21 prevents one of the biggest issues when
7:24 it comes to fraud and scams, which is
7:27 SIM swaps. Look, as much as the networks
7:30 are trying to stop cyber criminals from
7:32 getting their hands on your phone number
7:35 to get your one-time PIN from your bank
7:37 and to take over your phone calls. We
7:40 know that cyber criminals are literally
7:42 sending out text messages to staff
7:44 working at cellular companies offering
7:48 them up to $300 to do a SIM swap. So, we
7:51 have seen a massive rise in SIM swap
7:54 attacks. In fact, the FBI has dealt with
7:56 millions and millions of dollars worth
8:00 of losses due to SIM swaps. In 2021,
8:03 that number of losses jumped to $68
8:07 million. And in 2022, losses total
8:10 nearly $73 million. So this is a big
8:13 issue with Cape. Even if the cyber
8:16 criminals offered their staff buckets
8:18 and buckets of money to do a SIM swap,
8:21 they simply cannot. The entire system is
8:24 designed so that only you can do it with
8:27 that 24word passphrase. Now the second
8:28 thing that you would have noticed when
8:30 we set up the Cape service is that you
8:33 can position your phone to be in any
8:36 state. So that gives you an additional
8:37 layer of location protection as the
8:40 phone number that you hand out doesn't
8:43 tie back in to where you actually live.
8:44 And the third thing that you would have
8:46 noticed is that we didn't have to sign
8:48 up with our home address, nor did we
8:51 have to use our ID or even an email
8:54 address. The only info we completed,
8:56 which of course I didn't show on camera,
8:58 was filling in my credit card
9:00 information. But even that isn't stored
9:03 with Cape. They use stripe tokenization
9:06 process intentionally splitting the
9:08 customer data between their payment
9:10 gateway and the Cape internal business
9:14 system. This is critical. Currently,
9:16 when we all sign up with our current
9:18 cellular provider, we had to give them a
9:21 whole bunch of information including a
9:23 government issue ID, our home address,
9:25 email, and a whole bunch of other
9:27 personal information just to get that
9:30 SIM card activated. So now we have to
9:33 trust that that provider will keep all
9:36 our info safe and secure, which they do,
9:39 right? Well, uh, they try. They keep
9:42 getting hacked and leaking our data
9:45 repeatedly. I mean, look at this. AT&T
9:48 got hit in March of 2024, which affected
9:52 7.6 million users and about 65.4 million
9:54 former customers when sensitive data was
9:57 leaked onto the dark web. And then they
9:59 got hit again in the same year in July,
10:01 a couple of months later, where data
10:04 from 109 million customer accounts
10:07 containing records of calls and text was
10:09 illegally downloaded to a third-party
10:12 cloud platform. And then in October of
10:15 2024, a couple of months later, AT&T was
10:18 one of at least eight major US cellular
10:21 providers that were targeted by Chinese
10:25 hackers identified as Salt Typhoon. 2024
10:28 was not a good year for AT&T. But it's
10:32 not just AT&T either. February of 2024,
10:34 Verizon had an internal breach where
10:36 somebody from their staff gained access
10:38 to a file containing a whole bunch of
10:41 sensitive information. In October same
10:43 year, the Verizon pushto talk platform
10:45 was actually breached and there were
10:48 incidents at T-Mobile and incidents at a
10:50 whole bunch of other providers too. So
10:52 whilst these carriers are trying to
10:54 protect our data
10:57 clearly there are issues with Cape the
11:00 data collection is limited only to what
11:03 is necessary to provide its service.
11:06 Cape does not use data to profile its
11:09 users and it doesn't sell user data.
11:11 Unlike other mobile carriers who may
11:14 sell and pull client data making it a
11:16 major part of their business model. Want
11:18 to see just how much data is collected
11:21 and sold by these providers? Check this
11:24 out. Now, if this doesn't piss you off,
11:26 I don't know what will. Look at just how
11:29 much data is being collected about us
11:31 all the time. Look at the level of
11:33 detail that is currently happening. And
11:35 of course, you can pause this video and
11:36 you can look at each category. I'm also
11:38 going to link to this in the description
11:39 below so you can check it out for
11:41 yourself. But this is the kind of stuff
11:43 that really really pisses me off because
11:45 we don't know that it's happening and
11:48 yet it certainly does and it's been sold
11:50 all the time. I mean, it's so bad that
11:53 the FCC actually find Verizon, T-Mobile,
11:57 and AT&T $200 million for sharing
12:00 customer location data. But wait, there
12:02 is more. We're only getting started. And
12:04 this is why I love working with Cape.
12:07 Cape doesn't sell your data as it
12:10 doesn't collect it. It's impossible to
12:13 do a SIM swap without knowing your 24
12:16 passphrase. So, what about a network
12:19 level attack? I mean, what is Cape doing
12:22 so that hackers cannot intercept your
12:26 phone calls or your text messages like
12:28 what happened here with Lionus? This is
12:31 Lionus from Lionus Tech Tips and we
12:33 hacked the phone network in order to spy
12:35 on him. We intercepted his phone calls
12:38 and stole his two factor passcodes. This
12:40 new protocol was called signaling system
12:44 number 7 or SS7 for short and it's still
12:47 broadly in use today, but it may not be
12:50 as secure as people thought. What's
12:52 crazy is that we exploited these
12:54 vulnerabilities and I'm just a YouTuber,
12:57 but I'm surprised at how easy it all is.
12:59 Now, imagine if I had the backing of a
13:00 government. Now, I'm going to have a
13:02 link to the video below. It's definitely
13:04 worth checking out. You see, we have to
13:06 remember that cellular providers grew
13:09 over years by buying out smaller
13:11 companies and integrating their
13:13 technology. As an example, T-Mobile
13:16 bought Sprint and Metro PCS and more
13:18 recently they bought Mint Mobile. So,
13:20 they had to deal with all that legacy
13:22 tech and make it all kind of work
13:25 together. But what's exciting is what
13:27 Cape has done to mitigate against this
13:30 is remove the legacy 2G and 3G
13:32 architecture. So the footprint is much
13:35 much smaller. They also have another
13:37 method which can ensure that your phone
13:40 is indeed in the right country. So if a
13:41 rogue connection tries to capture your
13:43 phone calls or your text messages from
13:45 another country, it simply won't be
13:48 allowed on their network. Now to be very
13:51 very clear, Cape doesn't protect you at
13:54 the phone level. In other words, it
13:57 cannot stop apps that you install from
14:00 leaking your data. If you purposefully
14:02 downloaded some cracked software that is
14:04 full of malware that steals your
14:07 information from your phone, don't blame
14:10 Cape. I It's just like you cannot blame
14:12 your internet service provider if you
14:14 got hit by ransomware because you
14:17 ignored the anti virus and now your
14:19 system is pretty screwed. But I will say
14:21 that Cape does give you an additional
14:23 layer of protection because it rotates
14:26 your IP address and heavily restricts
14:29 what is shown to others when you land on
14:31 their web page or interact with their
14:33 ads. So I'm using my T-Mobile at the
14:35 moment. You can see here's my IP
14:37 address. My location is Dallas and my
14:40 service provider is T-Mo. Now I'm
14:42 swapping over to the Cape services and
14:44 I'm going to rerun that website and
14:47 reload it. You can see the IP address
14:49 has changed, the location has changed,
14:50 and so has the internet service
14:52 provider. So, there's some protection.
14:55 So, knowing all of this, should you
14:58 switch over to Cape? Well, we can all
15:00 agree that this lack of control over our
15:03 own privacy and our own data has kind of
15:06 gotten out of hand. Yes, we can change
15:08 our email to use a secure email system.
15:11 Yes, we can use pass keys. Yes, we can
15:14 use a privacy browser. And yes, we can
15:17 install Graffine OS, but all of those
15:20 things are on the device. Up until now,
15:23 we didn't have an option for a privacy
15:25 focused cellular provider. So, we lost
15:28 all control the second our phones
15:30 connect to the nearest tower. And all of
15:33 that has now changed thanks to Cape. I
15:35 have been using Cape service for over a
15:37 month now, and I have not dropped a call
15:40 once, nor have I lost data connectivity
15:43 at any time. From a pure user point of
15:45 view, it's like having any other
15:47 cellular provider, but with the benefits
15:50 of having it all based around privacy,
15:53 no data collected or sold. And because
15:56 of that passphrase, nobody can do a SIM
15:59 swap behind my back. So, if you also
16:02 want this level of privacy and control,
16:04 I have a link in the description, and
16:06 you're welcome to check and verify
16:09 everything that I've showed you. And
16:11 whilst you're at it, please stop apps
16:14 from leaking your data. Check out how to
16:16 do that right over here. And if you want
16:19 to know about the worst cellular hack in
16:21 US history and why Cape is the perfect
16:23 solution, check this video out right
16:26 over here. Give the video a quick like
16:27 before you head out by clicking the
16:29 thumbs up button. And I'm going to see
16:33 you in this video or this video or I'll