Blog
Cape weaves together a complex set of technologies to provide premium, anonymous, secure wireless coverage.
Read more about Cape’s innovations and our place in the growing movement for mobile privacy.
Featured
Announcing Our Open Beta, in Partnership with Proton
03.19.25 - 3 min read

Telco Data Breach Timeline
06.28.24 - 0 min read

Don’t Trust Us: Defense-in-Depth at Cape
02.05.25 - 7 min read

America’s Telecoms Need a Clean Install and a Full Reboot
12.18.24 - 5 min read

Announcing Our Open Beta, in Partnership with Proton
03.19.25 - 3 min read

Telco Data Breach Timeline
06.28.24 - 0 min read

Don’t Trust Us: Defense-in-Depth at Cape
02.05.25 - 7 min read

Inside Cape's Mobile Core
04.30.25 - 8 min read
Peek under the hood of Cape’s mobile network to see how we’ve built a secure, modern telecom core from scratch. This post breaks down how we keep your data private and secure—without relying on legacy carrier infrastructure.Built to Forget: Cape is a New Kind of Mobile Carrier
04.18.25 - 4 min read
At Cape, our network was designed to protect our subscribers from breaches, surveillance, and other attacks. This blog will walk you through Cape’s core protections, and how they could have stopped the attacks that made the news.Announcing Our Open Beta, in Partnership with Proton
03.19.25 - 3 min read
Cape is excited to launch our open beta to anyone in the U.S. seeking privacy in their mobile communications. Plus, we’re partnering with Proton to offer Cape subscribers exclusive access to Proton’s privacy suite for just $1 for 6 months.We Hired Private Investigators to Track Us—They Couldn’t
02.26.25 - 3 min read
We tasked licensed private investigators to try to find phones using the Cape network, versus those of other major carriers. See what they found.Don’t Trust Us: Defense-in-Depth at Cape
02.05.25 - 7 min read
True security starts with assuming nothing and trusting minimally. Cape’s defense-in-depth approach with layered encryption, access controls, and modern security practices protects your privacy from all sides.2024 Telecom Breach Headlines
01.23.25 - 1 min read
In this post, we break down the year’s biggest headlines and show how Cape’s privacy-first features are designed to keep us out of stories like these.How We’re Changing the Rules of Mobile Security and Privacy
11.21.24 - 2 min read
Cape’s CEO, John Doyle, shares thoughts on our journey building Cape, and the opening of our service to private citizens that need it most.Trust Made Clear
07.10.24 - 2 min read
Don’t trust us—see if for yourself. Introducing Cape’s new Trust Portal, a window into what we’re doing to keep your information private and secure.The Cape Network
05.17.24 - 3 min read
Our deep integration with an enterprise-grade cellular network is an industry-first, delivering unparalleled coverage and capabilities.Building the Future of Mobile Privacy
04.18.24 - 4 min read
Hear our CEO John Doyle’s take on why Cape raised $61 million to put your privacy back in your hands.Hello World
04.15.24 - 3 min read
We are proud to introduce Cape, where we’re challenging the assumption that being connected necessitates giving away your personal information.Ukraine’s Drone Strike Relied on Cell Networks
06.16.25 - 3 min read
From drone warfare powered by SIM cards to fresh telco breaches and product upgrades, the security landscape is shifting fast. Here’s what’s new in the world of mobile privacy, national security, and Cape.Product Feature: Encrypted Push Notifications
06.11.25 - 3 min read
Every push notification is at risk of being shared with governments and third parties. Cape's Encrypted Notifications feature fully encrypts mobile push notifications so that only your device can read them.Cell Phone Encryption: How Secure Is Your Device?
06.10.25 - 13 min read
Learn what cell phone encryption is and how it works on iOS and Android devices. Discover how to effectively bridge security gaps in cellular communication.Here’s How Major Mobile Carriers Compare in 2025
06.10.25 - 12 min read
How to find a secure phone service that puts your privacy first—learn about the security features and vulnerabilities of top commercial phone carriers in 2025.Senator Wyden Tells Colleagues to Change Carriers
05.28.25 - 2 min read
Sen. Wyden urges his colleagues to switch carriers, Salt Typhoon remains embedded in US telecom infra, and other Cape news.AT&T vs. Verizon: Which Carrier Delivers in 2025?
05.20.25 - 11 min read
Which mobile carrier offers better value? Compare AT&T vs. Verizon on plans, coverage, and real-world reliability to find out what aligns with your needs.Salt Typhoon Bounty, SS7 Exploits, and Cape in the News
05.13.25 - 2 min read
A bounty is placed on Chinese hacking group Salty Typhoon, legacy comms infrastructure is called out, and other Cape news."Signalgate", Verizon's Call Log Leak, and Cape in the News
04.11.25 - 3 min read
A journalist is mistakenly added to a White House signal group chat, a security researcher discovers a Verizon vulnerability leaking all customer call logs, and other Cape news.Product Feature: Encrypted Voicemail
03.18.25 - 4 min read
Attackers have exploited unencrypted voicemail systems to intercept sensitive messages, including 2FA codes. At Cape, we've eliminated this vulnerability by encrypting our voicemail, ensuring that no one—not even Cape—can tune in.Product Feature: Enhanced Signaling Protection
03.18.25 - 5 min read
Thanks to legacy telco signaling protocols, your phone can be tracked, and messages intercepted. Learn more about signaling attacks, and Cape's proprietary signaling proxy that can detect and block these attacks in real time.Cell Phone Privacy Laws
02.05.25 - 3 min read
It’s essential to understand your rights under cell phone privacy laws. This post breaks down key laws and regulations, what they mean for you, and how you can better protect your data.Collaborating with EFF to Improve CSS Detection
02.03.25 - 4 min read
Cape worked with The Electronic Frontier Foundation (EFF) to make a breakthrough discovery of suspicious activity indicative of a CSS possibly being deployed at the 2024 DNC.What Information Is Your Phone Broadcasting?
02.03.25 - 5 min read
Your phone is constantly communicating with the world around it. But have you ever wondered what information is actually being broadcast by your device? Find out in this post.America’s Telecoms Need a Clean Install and a Full Reboot
12.18.24 - 5 min read
America’s telecom networks need a reboot. Salt Typhoon exposed outdated systems and poor defenses—it's time to modernize and secure critical communications.Product Feature: Private Payment
11.21.24 - 3 min read
At Cape, payments are kept private through tokenization, which helps keep your financial data encrypted and safe.Product Feature: SIM Swap Protection
11.21.24 - 4 min read
Traditional carriers rely on insecure and hackable usernames and passwords. Cape replaces them with digital signatures, providing advanced cryptographic authentication to protect you from SIM swaps.Which Secure Messaging App is Right For You?
11.21.24 - 12 min read
We've analyzed and ranked popular messaging apps on five key security dimensions to help you find the ones that truly protect your privacy.VPN Dos and Don’ts
11.21.24 - 3 min read
VPNs are powerful tools for safeguarding aspects of your digital privacy—but common misconceptions can leave you exposed. Learn what VPNs can and can’t do, and how to create a more comprehensive privacy strategy.Your Telco Profits From Spam Calls and SMS
11.21.24 - 4 min read
Each spam call you accept actually provides your carrier with revenue. At Cape, your privacy is our priority, and we won't profit off your spam. Switch to Cape and see the difference for yourself.The Salt Typhoon Attack and Network Vulnerabilities
11.21.24 - 7 min read
Nearly everyone relies on secure, continuous wireless communication in their professional and personal lives—but recent events have exposed serious gaps in telecommunications security that could threaten that foundation.Where Were You 2 Years Ago? Your Telco Knows.
10.08.24 - 5 min read
109M people suffered a massive data breach in Apr 2024 that exposed their AT&T communication logs from two years before the breach. This incident begs the question—how long are telcos retaining your sensitive data, and why?Passwords Hacked? Steps to Take to Secure Your Accounts
09.06.24 - 9 min read
If your passwords have been hacked, it's critical to act quickly to secure your accounts. Here's how passwords get stolen, the signs to watch for, and essential steps to protect your credentials.Hacked? Steps to Take to Secure Your Phone
09.06.24 - 7 min read
If you suspect your phone has been hacked, it's important to act quickly. Learn the key signs of a compromised device, steps to secure it, and tips for preventing future attacks.The Connectivity Cartel: Your Carrier is Profiting From Your Data
07.31.24 - 8 min read
Major carriers have built their business around knowing nearly everything about you—from your viewing and browsing habits to your race, sexuality, religious beliefs, political affiliation, and income level.Why Am I Getting So Many Spam Messages?
07.31.24 - 4 min read
More than just an inconvenience, spam is one of the most common vehicles scammers use to compromise your privacy and security. Learn why spam is dangerous, who is at risk, and how you can protect yourself.How to Opt Out of Data Sharing with Your Carrier
07.15.24 - 6 min read
Your carrier makes it hard for you to opt out of data sharing, putting your privacy at risk when your data is sold. We walk you through it in this step-by-step guide.Is your device eSIM compatible?
07.12.24 - 3 min read
Is your iPhone or Android eSIM compatible? Check out our blog to learn if your device supports eSIM technology in this easy-to-follow guide.Best Dumb Phones of 2024
07.10.24 - 12 min read
Whether you’re looking to cut screen time, find a safe option for kids, or protect your privacy, there's a dumb phone for you. Explore our 2024 list to find the right minimalist device.Telco Data Breach Timeline
06.28.24 - 0 min read
We keep the most comprehensive and up-to-date timeline of telco data breaches among the major carriers in the United States.The Hidden Costs of Your Monthly Cell Phone Bill
06.06.24 - 5 min read
When you sign up for a phone plan with a traditional carrier, the price is rarely as advertised. Learn about the hidden costs—in your dollars and in your data—of your monthly phone bill, and how you can take back control with Cape.Telcos: The Original Social Network
05.03.24 - 5 min read
AT&T, T-Mobile, Verizon, and Sprint were fined over $200M for illegally sharing access to customer location data—a reminder that Big Telco has been monetizing data as long as Big Tech.T-Mobile and Verizon Employees Bribed for SIM Swap Scams
04.29.24 - 5 min read
Hackers are offering $300 per SIM swap. Learn how SIM swaps happen, and how to protect yourself.AT&T Data Breach: How to Protect Yourself
04.10.24 - 6 min read
73 million AT&T customers were put at risk of identity theft, financial fraud, and other breaches. Learn why this matters and what to do if you were affected.
SIGN UP TODAY
Cape your calls.
Cape your location.
Cape your life.
Get Cape