Model Comparison 100% sign agreement
Model Editorial Structural Class Conf SETL Theme
@cf/meta/llama-3.3-70b-instruct-fp8-fast lite +0.20 ND Mild positive 0.80 0.00 Privacy Protection
@cf/meta/llama-4-scout-17b-16e-instruct lite +0.50 ND Moderate positive 0.90 0.00 Privacy Protection
deepseek/deepseek-v3.2-20251201 +0.42 +0.26 Moderate positive 0.10 0.12 Privacy & Security
claude-haiku-4-5-20251001 +0.40 +0.49 Neutral 0.12 -0.20 Privacy & Personal Security
meta-llama/llama-3.3-70b-instruct:free ND ND
Section @cf/meta/llama-3.3-70b-instruct-fp8-fast lite @cf/meta/llama-4-scout-17b-16e-instruct lite deepseek/deepseek-v3.2-20251201 claude-haiku-4-5-20251001 meta-llama/llama-3.3-70b-instruct:free
Preamble ND ND 0.27 0.47 ND
Article 1 ND ND ND 0.35 ND
Article 2 ND ND ND ND ND
Article 3 ND ND 0.65 0.85 ND
Article 4 ND ND ND ND ND
Article 5 ND ND ND ND ND
Article 6 ND ND ND ND ND
Article 7 ND ND ND ND ND
Article 8 ND ND ND ND ND
Article 9 ND ND ND ND ND
Article 10 ND ND ND ND ND
Article 11 ND ND ND ND ND
Article 12 ND ND 0.83 0.96 ND
Article 13 ND ND ND ND ND
Article 14 ND ND ND ND ND
Article 15 ND ND ND ND ND
Article 16 ND ND ND ND ND
Article 17 ND ND ND ND ND
Article 18 ND ND ND ND ND
Article 19 ND ND 0.56 0.73 ND
Article 20 ND ND ND ND ND
Article 21 ND ND ND ND ND
Article 22 ND ND ND ND ND
Article 23 ND ND ND ND ND
Article 24 ND ND ND ND ND
Article 25 ND ND ND 0.12 ND
Article 26 ND ND ND ND ND
Article 27 ND ND ND ND ND
Article 28 ND ND ND ND ND
Article 29 ND ND ND ND ND
Article 30 ND ND ND ND ND
+0.40 Cell Service for the Fairly Paranoid (www.cape.co S:+0.49 )
176 points by 0xWTF 5 days ago | 190 comments on HN | Strong positive Contested Landing Page · v3.7 · 2026-02-26 02:54:14 0
Summary Privacy & Personal Security Advocates
Cape.co's landing page advocates for privacy-first digital service design, with explicit commitments to data minimization, non-tracking, and immediate deletion. The content strongly engages Articles 3, 12, and 19 through structural and editorial emphasis on protecting users from surveillance, profiling, and data exploitation. Subscription paywall ($30/month) creates economic barriers that limit practical access for disadvantaged populations, tempering otherwise robust privacy advocacy.
Article Heatmap
Preamble: +0.47 — Preamble P Article 1: +0.35 — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.85 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.96 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.73 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: +0.12 — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.40 Structural Mean +0.49
Weighted Mean +0.68 Unweighted Mean +0.58
Max +0.96 Article 12 Min +0.12 Article 25
Signal 6 No Data 25
Volatility 0.29 (High)
Negative 0 Channels E: 0.6 S: 0.4
SETL -0.20 Structural-dominant
FW Ratio 62% 16 facts · 10 inferences
Evidence 12% coverage
2H 2M 2L 25 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.41 (2 articles) Security: 0.85 (1 articles) Legal: 0.00 (0 articles) Privacy & Movement: 0.96 (1 articles) Personal: 0.00 (0 articles) Expression: 0.73 (1 articles) Economic & Social: 0.12 (1 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.00 (0 articles)
HN Discussion 20 top-level · 26 replies
jerlam 2026-02-24 23:15 UTC link
Secondary numbers sounds neat:

https://www.cape.co/blog/product-feature-secondary-numbers

I've been using my Google Voice number for something similar. But Cape doesn't specify if/when these numbers are rotated in any way - you have three numbers to track now, and you can't retain these numbers if you switch services.

dlenski 2026-02-24 23:27 UTC link
From their "Features" drop-down:

> Minimal Data Collection

> Identifier Rotation

> Secondary Numbers

> Disappearing Call Logs

> SIM Swap Protection

> Network Lock

> Encrypted Voicemail

> Private Payment

> Last-Mile Encrypted Texting

> Secure Global Roaming

"Identifier (IMSI) Rotation", "Secure Global Roaming" and "Network Lock" do look interesting *IF* they can actually address some of the baseband vulnerabilities that plague all modern devices. That's a Big If.

SIM Swap Protection you already get by using a VoIP number rather than a cell number.

And the other features are irrelevant if you're using over-the-top end-to-end encrypted messaging, like Signal, rather than Plain Old Telephone Service and SMS.

buttocks 2026-02-24 23:48 UTC link
Will not pass muster with FCC. Know Your Customer regulations require the company to … know the customer. They will not last.
throwaway57572 2026-02-24 23:50 UTC link
You might check out who the CEO is here and how he runs the company and then consider whether you'd trust them. And look at the infra providers they use. Not what I would call the most upstanding bunch.
monster_truck 2026-02-24 23:58 UTC link
Do not fall for a word of this. If you've spent any time dealing with actual SIP providers (ie not the shit you'd hook an app up to, the ones debt collectors use), you'll know exactly how much you can trust them. Same difference
helterskelter 2026-02-25 00:01 UTC link
How does this compare to Phreeli [1]? Has anyone here used either of the services?

1: https://www.phreeli.com

LorenDB 2026-02-25 00:11 UTC link
> Enjoy unlimited high-speed data; after 50GB, speeds may slow to 256 kbps.

Last I checked 256 Kbps is not high speed. You can advertise this as unlimited data, or you can advertise it as 50 GB of high-speed data, but you can't call it unlimited high-speed data.

gruez 2026-02-25 00:21 UTC link
>Identifier Rotation

>Protect yourself from persistent tracking by rotating your IMSI every 24 hours, so you appear as a new subscriber each day.

But nothing for IMEI, which is fixed for a given device. Unless you got a new phone to use with this service, it can instantly be linked back to whatever previous service you're using. If we assume that whatever carrier they partner with keeps both IMEI and IMSI logs (why wouldn't they?) it basically makes any privacy benefits from this questionable. It's like clearing your cookies but not changing your IP (assuming no CGNAT).

The other benefits also seem questionable. "Disappearing Call Logs" don't really help when the person you're calling has a carrier that keeps logs, and if both of you care about privacy, why not just use signal?

They're asking $99/month for this, which is a bit steep. If you only care about the rotating IMSI, don't care about PSTN access (ie. no calls/texting), you can replicate it with some sort of data esim for much cheaper. The various e-shops that sell esims don't do KYC either.

iamnothere 2026-02-25 00:44 UTC link
Unfortunate that it doesn’t seem to support Linux phones. Phreely or Purism’s AweSIM would be a better fit for anyone running a non-Android/non-iOS setup. Hopefully they add this in the future.
efficax 2026-02-25 00:58 UTC link
No way this isn't funded by the CIA
mzmzmzm 2026-02-25 01:00 UTC link
So it's an MVNO mostly on the AT&T network with extra privacy features? I think it still all then comes down to how you use your phone and how much you can trust the whole pipeline. I use Credo Mobile which doesn't seem totally different. https://www.credomobile.com/our-story
Ms-J 2026-02-25 01:23 UTC link
I've looked into this company before and when I saw who was behind it and on the team it was an immediate red flag to never use or trust this company.

Look at who Doyle has worked for previously and what connections he has. Palantir and the military, to start.

loteck 2026-02-25 02:23 UTC link
Hi Cape team,

I'd like a service like yours that allows private signups and that works continuously to prove ongoing private operations. I don't need huge data plans, I'm fine with WiFi mostly. It needs to cost way less per month than your current pricing. It would be cool if you could find a way to serve people like me.

bartvk 2026-02-25 07:50 UTC link
FYI, I had to walk through the first dozen or so steps of the signup form to figure out that it's available in the US only. I suspected as much, but I figured I'd post it here, since it's not in their FAQ.
AdamN 2026-02-25 11:15 UTC link
I know it'a a bit of a pivot but the following would make me move:

1/ eSIM activation outside the US 2/ The family plan is weird. My wife and I don't want to manage two separate bills. 3/ multiple eSIMs and numbers in different countries all within the one account (Germany in particular)

Aromatic_War 2026-02-25 11:25 UTC link
It’s rare to see an MVNO thread get into the weeds of the mobile core, but as a Full MVNO, Cape is essentially running its own sovereign telco infrastructure. From an outside perspective, they are definitely among the few who are treating the signaling plane with the proper level of scrutiny (they built their own signalling firewall) But even with a proprietary core and a signaling firewall, Cape is still an island in a sea of legacy protocols and peer MNOs with different intentions...

I'd be interested to see how they are hardening the IMS (IP Multimedia Subsystem) and VoLTE/VoWifi stack. SIP signaling and RTP streams for voice are often unencrypted internally.

If Cape is applying their 'Network Lock' logic to the IMS layer, they could potentially mitigate SIP-level spoofing and voice interception that occurs at the interconnect. Their 'Encrypted Voicemail' (using asymmetric keys on the device) is a strong signal that they understand the 'Last Mile' problem.

Also even if SEPPs are not really a thing, i'd be curious to know if they've started looking at this.

In the small world of telco security (disclaimer i work for P1Security), they are definitely working in the right direction. Any international ambition, particularly in EU, will be a tough sell though....

ddtaylor 2026-02-25 13:30 UTC link
I guess making honeypot phones and calling them secure fell out of fashion, so now we backdoor at the carrier level?
fortranfiend 2026-02-25 15:01 UTC link
Guess I'm more paranoid than fairly. Id class this in a wait and see category maybe try it out on a secondary device for a trial run. You'd have to have the need to their services to justify the cost or just not care about cost.
pibaker 2026-02-25 23:15 UTC link
The problem with every service targeting "safety conscious" people is that by virtue of using that service you mark yourself as someone with something to hide and draws attention. The lack of signal is a signal in itself.

It's like walking into a bank wearing a ski mask. Yeah we don't know who is under the mask but we know there is probably something fishy going on.

Your best bet at staying safe is always to not raise any attention at all, and that usually means doing what the average citizen with 2.4 kids does.

floam 2026-02-26 00:40 UTC link
Please add an arbitration opt out option or better yet ditch requiring people who care about their rights waive their right to a trial and jury.
0xWTF 2026-02-24 23:40 UTC link
They built their own mobile core, does that help with resolving your "Big If"? I'm not a cellular guy, I don't know which pieces of the stack cover which attack vectors: I'm genuinely asking.

Also, the 50 foreign countries seems interesting.

bryancoxwell 2026-02-24 23:45 UTC link
Not sure what IMSI rotation has to do with baseband vulnerabilities?
helterskelter 2026-02-24 23:59 UTC link
...care to elaborate?
gruez 2026-02-25 00:15 UTC link
>Know Your Customer regulations require the company to … know the customer

Which KYC regulations exist for carriers? AFAIK you can walk into any store and get a SIM card. The most they ask for is maybe E911 which they don't check.

dguido 2026-02-25 00:25 UTC link
I have a conflict of interest here (I am an advisor to Cape, also a security expert, and my company has done security audits for Cape), you should absolutely look more deeply into what Cape has created. Their service is fundamentally different than other "security-focused cell providers" (mostly snake oil IMHO) because Cape wrote their own mobile core, nearly from scratch. They control the whole software stack and have done really innovative things with it.

Here are a few things you might want to look at more closely:

Encrypted voicemail uses public key crypto: https://www.cape.co/blog/product-feature-encrypted-voicemail

How they use full control of the mobile core to detect SS7 signaling attacks https://www.cape.co/blog/product-feature-network-lock

Swapping SIMs is done via digital signatures, not customer support https://www.cape.co/blog/cape-product-feature-secure-authent...

They're the only provider that can rotate your IMSI, and do it continuously for you https://www.cape.co/blog/product-feature-identifier-rotation

They're also one of very few organizations doing original research on cell network security:

Collaborating with the EFF to release software for detecting cell site simulators (e.g, imsi catchers et al) https://www.cape.co/blog/how-eff-and-cape-collaborated-to-im...

Identifying novel weaknesses for physically tracking people on cell networks https://dl.acm.org/doi/pdf/10.1145/3636534.3690709

gruez 2026-02-25 00:31 UTC link
>do look interesting IF they can actually address some of the baseband vulnerabilities that plague all modern devices. That's a Big If.

Baseband vulnerabilities are overhyped, imo. On proper phones (eg. pixels), their access to memory is restricted by IOMMU, which protects the rest of the phone from being compromised if there's some sort of an exploit. Once that's factored in, most exploits you can think of are "on the other side of the airtight hatchway[1]". For instance if you can hack the baseband to steal traffic, you should probably be more worried about your carrier being hacked or getting a lawful intercept order. Or if you're worried about the phone triangulating itself, you should probably be more worried about your carrier getting hacked and/or selling your location data.

[1] https://devblogs.microsoft.com/oldnewthing/20060508-22/?p=31...

qingcharles 2026-02-25 00:57 UTC link
Are there solid VoIP providers that aren't detected by 2FA SMS services? I can't use my Google Voice for a decent chunk of sign-ups because it is detected (and rejected) too easily. I hate getting spam, so I try to keep my primary phone number only for friends and family.
johndoylecape 2026-02-25 01:09 UTC link
Hey, John Doyle here (CEO of Cape). I'm happy to dig into how I run the company, or the infra providers we use. I actually think we're pretty upstanding! If there are questions I can answer that will put your fears to rest, let me know.
bsstoner 2026-02-25 01:14 UTC link
Hi -- Head of Product at Cape. This is a good question. I will say up front there is no silver bullet for privacy on cellular networks given the way they were designed to interoperate. Our strategy is to offer many different protections that collectively make it harder for your activity to be tracked.

The details of what our carrier partners can see is in the table at the bottom of our privacy summary: https://www.cape.co/privacy-summary. We add noise to their data by doing things like rotating your IMSI daily and spreading traffic among multiple carrier partners. If the data is messy enough and not associated with your personal information, there should be less monetary incentive for the carrier to try to piece it together when they have an abundance of clean data with stable identifiers and verified personal information.

Additionally, with disappearing call logs, it's about reducing surface area. Fewer logs in less places.

johndoylecape 2026-02-25 01:21 UTC link
That's a fair point, we should change that verbiage.
johndoylecape 2026-02-25 01:35 UTC link
Doyle here :) I'm very proud of my military service!

Prior to Cape, I led the national security business at Palantir. That experience was actually the catalyst for Cape. It’s where I first learned about the massive array of vulnerabilities that exist in our current cellular networks. I saw how those gaps impacted not just government organizations, but everyday people, and I realized that the mobile phones we carry every day are perhaps the single largest risk to our privacy.

I needed that experience to understand the depth of the problem, but once I left to start Cape, that connection ended. Cape has no ties to Palantir. We aren't a subsidiary, we aren't a "front," and we don't share data with them. The only thing we took from Palantir was the desire to fix a broken system. If you want to see me and some of the rest of our founding team talk more about this topic, you can watch this video on our Instagram page here.

Another related theory I’ve seen online is that Cape is a honeypot for law enforcement. Cape is not a honeypot. It’s so hard to prove a negative, but at least I can say it clearly and out loud: Cape is not a honeypot.

We are a group of individuals who deeply value privacy. That mission carries across everything we do, from our work with the US government and allies, to everyday people, and everything in between.

We are incredibly proud to work with people who protect our country by ensuring they have secure, trusted communications wherever they are. https://www.bloomberg.com/news/articles/2024-04-18/us-navy-t...

We also work with the EFF to provide investigative journalists and activists with free Cape service so they can do their work safely. https://www.cape.co/journalists-and-activists

We partner with non-profits to support victims of domestic abuse who are facing cyber-stalking and digital harassment. https://www.cape.co/break-free

We are a young company growing exponentially, and we don't plan on slowing down. We know we have to earn your trust every day. The truth is, no one else is building a high-quality, first-class solution to these specific cellular problems. We are committed to being the ones who do it right.

jrexilius 2026-02-25 02:18 UTC link
I think the regulations have some loopholes for domestic use, but one I don't know how they can really get around is for international roaming, as other countries have far stricter KYC laws.

Domestically you can buy a Tmobile or Cricket with a pre-paid visa cash card and a gmail address (no ID required), but they won't work outside the US.

burnt-resistor 2026-02-25 02:40 UTC link
In-Q-Tel probably.
alek-cape 2026-02-25 02:55 UTC link
It's probably worth calling out that this is an experimental feature, and we are happy to get any and all feedback on things we can build out around them.

They are real numbers, not VOIP. That can matter depending on what they are used for and if the entity you are expecting a message from blocks sending to VOIP numbers.

The numbers don't rotate like our identifier rotation. They are yours. You can choose to delete a secondary number in the app, and if you have less than two, create a new one after 30 days.

bsstoner 2026-02-25 02:58 UTC link
Appreciate the feedback, we’ll likely experiment with different plans down the road, but for now we’re focused on rolling out as much additional privacy/security value as we can to justify the premium price point.
jauntywundrkind 2026-02-25 03:13 UTC link
Google Fi has been 256k after the soft cap since they launched. Majorly embarrassing, took me tears to sign up because of this.

Comcast I think is the best? Haven't checked in a while but their mobile plan I think soft caps to 1Mbps.

rsync 2026-02-25 04:06 UTC link
I’m open minded.

Seeing a warrant canary would be encouraging…

rsync 2026-02-25 04:11 UTC link
False.

You can sign up for US mobile service, which is a Verizon MVNO, right this moment with no personally identifiable information at all.

Remember: neither the visa nor MasterCard payment networks have any support for customer name. Everyone pretends that they do, but they do not. In the absence of an additional security layer like “verified by visa “there is no way to verify cardholder name.

chasil 2026-02-25 10:20 UTC link
This is also $99/month, and likely rides on another major network as an MVNO.
abc123abc123 2026-02-25 11:04 UTC link
Ahh... ex-palantir and military (government drone), no thank you. Wouldn't trust them as long as I can throw them.
numpad0 2026-02-25 11:05 UTC link
I saw somewhere - it's not like "I know a friend" but literally read somewhere - IMEI is just configurable with standard cracked virus-loaded copies of QXDM :p

But realistically, none of that matters. You'll be the only one in 10 miles with this SIM that always uses an never-before-seen IMEI that connects to the exact same set of domains. That's some mall ninja stuff.

Carriers don't just log IMEI/IMSI, as well as last hop cell towers and your precise location, they need those information to route packets back to the phone. You can't establish TLS with bogus IP addresses. That's why people like Stallman or unnamed friend of a friend ex-CIA guys on Internet says cell technologies are evil mass surveillance tools.

kotaKat 2026-02-25 12:45 UTC link
Also even if the IMSI rotates… the authentication Ki to the network doesn’t!

Whoops.

horoscope_slump 2026-02-25 14:33 UTC link
First, I think we can learn some stuff from looking at how the US government actually operated its known honeypots to evaluate the likelihood of Cape being a honeypot.

First, when it ran Anom, it went out of its way not to collect data on persons inside the United States. U.S. Anom users never had any of their data captured by the FBI because it raised profound 4th Amendment concerns. Cape is operating in the U.S. and is seeking U.S. users. Typical U.S. honeypots are generally targeted abroad.

Second, the U.S. government has historically not used former military officers with ties to defense contractors as the people that built and operated the honeypots. With Anom, they co-opted trusted members of the secure phone community. The very fact that the company is very open about its founders is a pretty good sign that they are probably not a honeypot because they would not make a very good honeypot for the truly criminal element.

Third, Cape is incorporated in the United States and seeking U.S. users. In the process, it's making some fairly aggressive claims in its privacy policy and terms of service about its products that would subject them to breach of contract and fraud claims if in fact they were secretly not doing those things.

Fourth, the legacy telecoms have a long history of selling your data, secretly cooperating in national security programs of questionable legality, etc. It seems like Cape can't possible a worse option than the status quo.

Noaidi 2026-02-25 14:57 UTC link
Yeah, this is my take as well. I was all excited about it until I looked at who ran it. Pretty much people from Plantier and navy seals.

Looks like a pretty sweet honey pot.

Noaidi 2026-02-25 15:05 UTC link
Peel really only protect your privacy at the level of purchase. Not associating your name address or any other data with your phone number. Cape seems to be doing something far more technical so that no one can locate you by your phone number using ordinary triangulation.
simfree 2026-02-25 19:40 UTC link
Mitigating SIP and TDM spoofing requires broad cooperation among every other Telecom provider. That doesn't exist today, you can't prevent people from spoofing your number.
Editorial Channel
What the content says
+0.62
Article 12 Privacy
High Advocacy Framing Practice
Editorial
+0.62
SETL
-0.20

Page directly addresses right to privacy through explicit commitment to data minimization ('We ask less'), limited tracking ('We track less'), and immediate deletion. Frames privacy as protection against arbitrary interference.

+0.58
Article 3 Life, Liberty, Security
High Advocacy Framing
Editorial
+0.58
SETL
-0.21

Page explicitly addresses right to life, liberty, and security of person through privacy and security framing. Messaging positions data protection as essential to personal security and freedom from intrusion.

+0.45
Article 19 Freedom of Expression
Medium Advocacy Framing
Editorial
+0.45
SETL
-0.19

Page frames privacy protection as enabling freedom of expression and opinion by reducing surveillance and data-driven profiling that could chill speech. Does not explicitly address freedom of expression but implicit in privacy-security framing.

+0.35
Preamble Preamble
Medium Advocacy Framing
Editorial
+0.35
SETL
-0.30

Landing page articulates principles of data minimization and deletion, framing privacy as foundational to human dignity and freedom from intrusion. Messaging emphasizes protection of personal autonomy through 'ask less, track less' philosophy.

+0.25
Article 1 Freedom, Equality, Brotherhood
Low Framing
Editorial
+0.25
SETL
-0.24

Page does not explicitly engage with human equality or dignity language, though privacy-first design philosophy implies respect for individual autonomy and equal protection from data exploitation.

+0.15
Article 25 Standard of Living
Low Framing
Editorial
+0.15
SETL
-0.07

Page does not explicitly address right to adequate standard of living or healthcare. Privacy and security features may indirectly support health by protecting medical data, but no explicit health engagement.

ND
Article 2 Non-Discrimination

No observable content addressing non-discrimination, protected characteristics, or equal treatment principles.

ND
Article 4 No Slavery

No observable content addressing slavery or servitude.

ND
Article 5 No Torture

No observable content addressing torture or cruel, inhuman, or degrading treatment.

ND
Article 6 Legal Personhood

No observable content addressing right to recognition as a person before the law.

ND
Article 7 Equality Before Law

No observable content addressing equality before the law or equal protection.

ND
Article 8 Right to Remedy

No observable content addressing right to effective remedy for rights violations.

ND
Article 9 No Arbitrary Detention

No observable content addressing freedom from arbitrary arrest or detention.

ND
Article 10 Fair Hearing

No observable content addressing fair trial or due process.

ND
Article 11 Presumption of Innocence

No observable content addressing freedom from criminal liability for acts not criminal when committed.

ND
Article 13 Freedom of Movement

No observable content addressing freedom of movement.

ND
Article 14 Asylum

No observable content addressing asylum or refuge.

ND
Article 15 Nationality

No observable content addressing right to nationality.

ND
Article 16 Marriage & Family

No observable content addressing family, marriage, or personal relationships.

ND
Article 17 Property

No observable content addressing property rights.

ND
Article 18 Freedom of Thought

No observable content addressing freedom of thought, conscience, or religion.

ND
Article 20 Assembly & Association

No observable content addressing freedom of assembly or association.

ND
Article 21 Political Participation

No observable content addressing political participation or governance.

ND
Article 22 Social Security

No observable content addressing social security or welfare rights.

ND
Article 23 Work & Equal Pay

No observable content addressing labor rights or fair compensation.

ND
Article 24 Rest & Leisure

No observable content addressing rest, leisure, or reasonable working hours.

ND
Article 26 Education

No observable content addressing education or human development.

ND
Article 27 Cultural Participation

No observable content addressing participation in cultural or scientific life.

ND
Article 28 Social & International Order

No observable content addressing social and international order for rights realization.

ND
Article 29 Duties to Community

No observable content addressing duties or community responsibilities.

ND
Article 30 No Destruction of Rights

No observable content addressing interpretation or limitation of rights.

Structural Channel
What the site does
+0.68
Article 12 Privacy
High Advocacy Framing Practice
Structural
+0.68
Context Modifier
+0.30
SETL
-0.20

Service is built on privacy-first architecture. Data collection is minimized by design, tracking is restricted, and data deletion is automatic. No observable data sales or third-party exploitation mechanisms.

+0.65
Article 3 Life, Liberty, Security
High Advocacy Framing
Structural
+0.65
Context Modifier
+0.22
SETL
-0.21

Service architecture is designed around minimizing data exposure and ensuring user security. Premium security features and data deletion practices are structural commitments to this right.

+0.52
Preamble Preamble
Medium Advocacy Framing
Structural
+0.52
Context Modifier
0.00
SETL
-0.30

Homepage design prioritizes privacy features in value proposition. Call-to-action centers on security and protection. No observable hostile tracking or data exploitation mechanisms visible on-page.

+0.52
Article 19 Freedom of Expression
Medium Advocacy Framing
Structural
+0.52
Context Modifier
+0.23
SETL
-0.19

Service architecture eliminates commercial tracking and data profiling mechanisms that could enable censorship or expression suppression. Structural commitment to data deletion reduces surveillance infrastructure.

+0.40
Article 1 Freedom, Equality, Brotherhood
Low Framing
Structural
+0.40
Context Modifier
0.00
SETL
-0.24

Service model appears universalist in scope (subscription available to all), but paywall creates practical inequality of access.

+0.18
Article 25 Standard of Living
Low Framing
Structural
+0.18
Context Modifier
-0.05
SETL
-0.07

Subscription paywall limits access to service for economically disadvantaged populations, creating practical inequality in access to digital privacy protection tools.

ND
Article 2 Non-Discrimination

No structural signals regarding discrimination or protected classes visible on landing page.

ND
Article 4 No Slavery

No structural signals regarding labor exploitation or forced service visible.

ND
Article 5 No Torture

No relevant structural signals.

ND
Article 6 Legal Personhood

No structural signals regarding legal personhood or recognition.

ND
Article 7 Equality Before Law

Service structure does not explicitly address legal equality.

ND
Article 8 Right to Remedy

No remedy mechanisms or dispute resolution processes visible on landing page.

ND
Article 9 No Arbitrary Detention

Not applicable to commercial service.

ND
Article 10 Fair Hearing

Not applicable to service landing page.

ND
Article 11 Presumption of Innocence

Not applicable.

ND
Article 13 Freedom of Movement

Not applicable to digital service.

ND
Article 14 Asylum

Not applicable.

ND
Article 15 Nationality

Not applicable to commercial service.

ND
Article 16 Marriage & Family

No structural signals regarding family or marital rights.

ND
Article 17 Property

Service structure does not engage with property ownership principles.

ND
Article 18 Freedom of Thought

No structural interference with conscience or belief.

ND
Article 20 Assembly & Association

No structural signals regarding assembly or association rights.

ND
Article 21 Political Participation

Not applicable to commercial service.

ND
Article 22 Social Security

Subscription-based access model creates barriers for economically disadvantaged.

ND
Article 23 Work & Equal Pay

No observable labor or employment signals on landing page.

ND
Article 24 Rest & Leisure

Not applicable to commercial service.

ND
Article 26 Education

No educational resources or community benefit visible on landing page.

ND
Article 27 Cultural Participation

Not applicable to commercial service.

ND
Article 28 Social & International Order

No structural signals regarding systemic rights protection.

ND
Article 29 Duties to Community

No structural engagement with community duties.

ND
Article 30 No Destruction of Rights

No structural signals regarding rights limitation or restriction.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.56 medium claims
Sources
0.5
Evidence
0.5
Uncertainty
0.4
Purpose
0.8
Propaganda Flags
2 manipulative rhetoric techniques found
2 techniques detected
appeal to fear
Language emphasizing 'peace of mind that you're protected' and framing privacy as security need creates subtle fear-based motivation for subscription.
bandwagon
Repeated emphasis on principles as industry standard ('built from the ground up') implies normalization and widespread adoption.
Emotional Tone
Emotional character: positive/negative, intensity, authority
hopeful
Valence
+0.6
Arousal
0.5
Dominance
0.5
Transparency
Does the content identify its author and disclose interests?
0.40
✗ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.68 solution oriented
Reader Agency
0.7
Stakeholder Voice
Whose perspectives are represented in this content?
0.25 1 perspective
Speaks: corporation
About: individuals
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
global
Complexity
How accessible is this content to a general audience?
accessible low jargon none
Longitudinal · 5 evals
+1 0 −1 HN
Audit Trail 25 entries
2026-02-28 14:26 model_divergence Cross-model spread 0.48 exceeds threshold (4 models) - -
2026-02-28 14:26 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 14:26 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
LP with slight positive lean
2026-02-28 14:20 model_divergence Cross-model spread 0.48 exceeds threshold (4 models) - -
2026-02-28 14:20 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 14:20 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive)
reasoning
LP with slight positive lean
2026-02-26 23:13 eval_success Light evaluated: Moderate positive (0.50) - -
2026-02-26 23:13 eval Evaluated by llama-4-scout-wai: +0.50 (Moderate positive)
2026-02-26 20:22 dlq Dead-lettered after 1 attempts: Cell Service for the Fairly Paranoid - -
2026-02-26 20:19 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:18 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:17 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:42 dlq Dead-lettered after 1 attempts: Cell Service for the Fairly Paranoid - -
2026-02-26 17:40 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:39 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:37 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 09:15 dlq Dead-lettered after 1 attempts: Cell Service for the Fairly Paranoid - -
2026-02-26 09:14 dlq Dead-lettered after 1 attempts: Cell Service for the Fairly Paranoid - -
2026-02-26 09:13 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:13 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:12 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:11 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:10 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 08:29 eval Evaluated by deepseek-v3.2: +0.51 (Moderate positive) 8,864 tokens
2026-02-26 02:54 eval Evaluated by claude-haiku-4-5-20251001: +0.68 (Neutral) 10,495 tokens