FAQs
What is Cape?
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
What does privacy have to do with a cell phone network?
In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.How is Cape different?
Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Can I sign up for Cape?
Right now, Cape is available to individuals at heightened risk of being targeted by malicious actors. This includes national security professionals, corporate leaders, journalists, domestic violence survivors, celebrities, and more.
Previously, this product was only offered to government users.Right now, Cape is available to individuals at heightened risk of being targeted by malicious actors. This includes national security professionals, corporate leaders, journalists, domestic violence survivors, celebrities, and more.
Previously, this product was only offered to government users.Contact UsContact UsWhen will Cape be available to general consumers?
Our goal is to make our service available to everyone early 2025. Sign up for our mailing list to stay up to date.
Our goal is to make our service available to everyone early 2025. Sign up for our mailing list to stay up to date.
How does Cape prevent illicit activity and respond to requests from law enforcement?
As a Mobile Virtual Network Operator, Cape is required to comply with lawful requests for subscriber and other information from law enforcement and other government requestors, for example under the federal Stored Communications Act. We seek to minimize the amount of personal information we retain, and therefore we can only provide what we have.
In addition, before making any disclosure, Cape will notify its subscribers of receipt of any legal process seeking disclosure related to their accounts, thereby giving you the opportunity to challenge that request. In cases where we are explicitly prohibited by law or court order from notifying a subscriber about a government request, we will challenge any such request that is not narrowly tailored or otherwise lawful. To date, Cape has not received any requests for subscriber data that contained a nondisclosure obligation.
In other words, while Cape respects the role of law enforcement in an organized society, we will take all reasonable measures to keep our subscribers informed and to protect them against overreach. Read our full privacy policy here.
As a Mobile Virtual Network Operator, Cape is required to comply with lawful requests for subscriber and other information from law enforcement and other government requestors, for example under the federal Stored Communications Act. We seek to minimize the amount of personal information we retain, and therefore we can only provide what we have.
In addition, before making any disclosure, Cape will notify its subscribers of receipt of any legal process seeking disclosure related to their accounts, thereby giving you the opportunity to challenge that request. In cases where we are explicitly prohibited by law or court order from notifying a subscriber about a government request, we will challenge any such request that is not narrowly tailored or otherwise lawful. To date, Cape has not received any requests for subscriber data that contained a nondisclosure obligation.
In other words, while Cape respects the role of law enforcement in an organized society, we will take all reasonable measures to keep our subscribers informed and to protect them against overreach. Read our full privacy policy here.
Does a Cape phone plan come with a phone?
Yes, Cape’s current offering includes a pre-configured Android phone. In early 2025, we will extend our service to the most common, up-to-date devices, so that you can bring your own phone.
Yes, Cape’s current offering includes a pre-configured Android phone. In early 2025, we will extend our service to the most common, up-to-date devices, so that you can bring your own phone.
Who does Cape compete with?
Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Is this a honeypot for law enforcement?
No. We get this question a lot because we do have federal government customers, and are proud to help keep US national security professionals safe.
As a mobile carrier, we're required to be responsive to requests from law enforcement, and therefore should not be especially enticing to criminals. In other words, if we're a honeypot, we're not a very well designed one.
That said, we push back on any law enforcement requests that are not backed by legal process, and we do challenge requests that are not narrowly tailored. In addition, some of our features and our practices of minimizing data collection and retention are effective mitigations against dragnet surveillance tactics, and we're proud of that.
No. We get this question a lot because we do have federal government customers, and are proud to help keep US national security professionals safe.
As a mobile carrier, we're required to be responsive to requests from law enforcement, and therefore should not be especially enticing to criminals. In other words, if we're a honeypot, we're not a very well designed one.
That said, we push back on any law enforcement requests that are not backed by legal process, and we do challenge requests that are not narrowly tailored. In addition, some of our features and our practices of minimizing data collection and retention are effective mitigations against dragnet surveillance tactics, and we're proud of that.
Who do you partner with for physical infrastructure?
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
Read more about it hereRead more about it hereWhat does it mean for Cape to run its own mobile core?
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
Have cellular networks been targeted before?
Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.I use VPNs and secure messaging apps. Doesn’t that protect me?
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
How’s your network coverage and speeds?
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
Check your coverage hereCheck your coverage hereWill 911 and other emergency services work?
Yes. Your location will automatically be shared when dialing 911.
Yes. Your location will automatically be shared when dialing 911.
Can I join the team?
We’d love to talk to you about that!
We’d love to talk to you about that!
View Open RolesView Open RolesHow does Cape’s coverage compare to my existing carrier’s coverage?
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
What is Cape?
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
How is Cape different?
Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.When will Cape be available to general consumers?
Our goal is to make our service available to everyone early 2025. Sign up for our mailing list to stay up to date.
Our goal is to make our service available to everyone early 2025. Sign up for our mailing list to stay up to date.
Does a Cape phone plan come with a phone?
Yes, Cape’s current offering includes a pre-configured Android phone. In early 2025, we will extend our service to the most common, up-to-date devices, so that you can bring your own phone.
Yes, Cape’s current offering includes a pre-configured Android phone. In early 2025, we will extend our service to the most common, up-to-date devices, so that you can bring your own phone.
Is this a honeypot for law enforcement?
No. We get this question a lot because we do have federal government customers, and are proud to help keep US national security professionals safe.
As a mobile carrier, we're required to be responsive to requests from law enforcement, and therefore should not be especially enticing to criminals. In other words, if we're a honeypot, we're not a very well designed one.
That said, we push back on any law enforcement requests that are not backed by legal process, and we do challenge requests that are not narrowly tailored. In addition, some of our features and our practices of minimizing data collection and retention are effective mitigations against dragnet surveillance tactics, and we're proud of that.
No. We get this question a lot because we do have federal government customers, and are proud to help keep US national security professionals safe.
As a mobile carrier, we're required to be responsive to requests from law enforcement, and therefore should not be especially enticing to criminals. In other words, if we're a honeypot, we're not a very well designed one.
That said, we push back on any law enforcement requests that are not backed by legal process, and we do challenge requests that are not narrowly tailored. In addition, some of our features and our practices of minimizing data collection and retention are effective mitigations against dragnet surveillance tactics, and we're proud of that.
What does it mean for Cape to run its own mobile core?
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
I use VPNs and secure messaging apps. Doesn’t that protect me?
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
Will 911 and other emergency services work?
Yes. Your location will automatically be shared when dialing 911.
Yes. Your location will automatically be shared when dialing 911.
How does Cape’s coverage compare to my existing carrier’s coverage?
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
What does privacy have to do with a cell phone network?
In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.Can I sign up for Cape?
Right now, Cape is available to individuals at heightened risk of being targeted by malicious actors. This includes national security professionals, corporate leaders, journalists, domestic violence survivors, celebrities, and more.
Previously, this product was only offered to government users.Right now, Cape is available to individuals at heightened risk of being targeted by malicious actors. This includes national security professionals, corporate leaders, journalists, domestic violence survivors, celebrities, and more.
Previously, this product was only offered to government users.Contact UsContact UsHow does Cape prevent illicit activity and respond to requests from law enforcement?
As a Mobile Virtual Network Operator, Cape is required to comply with lawful requests for subscriber and other information from law enforcement and other government requestors, for example under the federal Stored Communications Act. We seek to minimize the amount of personal information we retain, and therefore we can only provide what we have.
In addition, before making any disclosure, Cape will notify its subscribers of receipt of any legal process seeking disclosure related to their accounts, thereby giving you the opportunity to challenge that request. In cases where we are explicitly prohibited by law or court order from notifying a subscriber about a government request, we will challenge any such request that is not narrowly tailored or otherwise lawful. To date, Cape has not received any requests for subscriber data that contained a nondisclosure obligation.
In other words, while Cape respects the role of law enforcement in an organized society, we will take all reasonable measures to keep our subscribers informed and to protect them against overreach. Read our full privacy policy here.
As a Mobile Virtual Network Operator, Cape is required to comply with lawful requests for subscriber and other information from law enforcement and other government requestors, for example under the federal Stored Communications Act. We seek to minimize the amount of personal information we retain, and therefore we can only provide what we have.
In addition, before making any disclosure, Cape will notify its subscribers of receipt of any legal process seeking disclosure related to their accounts, thereby giving you the opportunity to challenge that request. In cases where we are explicitly prohibited by law or court order from notifying a subscriber about a government request, we will challenge any such request that is not narrowly tailored or otherwise lawful. To date, Cape has not received any requests for subscriber data that contained a nondisclosure obligation.
In other words, while Cape respects the role of law enforcement in an organized society, we will take all reasonable measures to keep our subscribers informed and to protect them against overreach. Read our full privacy policy here.
Who does Cape compete with?
Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Who do you partner with for physical infrastructure?
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
Read more about it hereRead more about it hereHave cellular networks been targeted before?
Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.How’s your network coverage and speeds?
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
Check your coverage hereCheck your coverage hereCan I join the team?
We’d love to talk to you about that!
We’d love to talk to you about that!
View Open RolesView Open Roles