VIP Forum Coming Soon!
- 35%

Zero Trace Phone®

Original price was: $1,495.05.Current price is: $979.00.

All-in-One Tor Network Anonymous Phone + Anti-Surveillance Toolkit

Zero Trace Phone is an all-in-one smartphone with everything you need to stay anonymous. Being completely portable, you can utilize the Tor network from anywhere, anonymously from the Zero Trace Phone.  (Clearnet | Dark Web | Darknet | Deep Web Compatible)

    • 5 Years Of Security Updates
    • Pre-installed Privacy Apps
    • Built-In MAC Address Spoofer
    • Deadman’s Switch (Emergency Factory Reset Protocol)
    • Penetration Testing Toolkit
    • ZT PRO Support
Tag:

Original price was: $1,495.05.Current price is: $979.00.

(-35%)

Out of stock

  • Privacy Features
  • Tech Specs

Disappear.

Zero Trace Phone

CURRENT STATUS: BETA

Here’s to the rebels.

ztPhone

6.1″

Zero Trace is an all-in-one smartphone with everything you need to stay anonymous. Being completely portable, you can utilize the Tor network from anywhere, anonymously from the Zero Trace Phone. 
ztPhone

The most secure build of any burner phone. Ever.

Corning® Gorilla® Glass
Serious protection inside and out

Everything you do from within the Zero Trace Phone is forced via 3 Tor relays (optionally a  VPN layer). This means if you accidentally click outside the Tor Browser and open another app – you will be completely safe and anonymized.

Why Do You Need the ztPhone?

Everything you do on your typical smartphone is being tracked by the big four – Amazon, Facebook, Google, and Apple – this is aside from all the data collected by your phone carrier. They do this via the apps you download everyday. Your devices identifiers such as it’s IMEI, MAC Address, Carrier, & GPS location are constantly being pinged by Instagram (owned by Facebook), Gmail, Amazon, iMessage and more.

Our Zero Trace Phone runs an OS (based on Android) completely independent from Google and Apple.  Additionally, encryption happens at the operating system level. This means you can run applications with omniscient control over what device permissions they can access and browse the internet with complete anonymity.

Your iPhone/Android data can easily be accessed with a simple Gmail or iCloud subpoena. 

How Do They Do It?

Every stock Android phone requires a Google Account to download apps from the Google Play Store. Even if the apps weren’t acquired through the Play Store, they almost always require the background processing of Google Play Services. The same goes for iPhones when downloading apps from the App Store and utilizing phone features that require iCloud services. Both these processes gather loads of personal data from you and can be accessed by 3rd parties.

Google Play Services

Every stock Android phone requires a Google Account to download apps from the Google Play Store. Even if the apps weren't acquired through the Play Store, they almost always require the background processing of Google Play Services. These processes cannot be disabled on your typical android phone.
Learn More

iCloud

The same goes for iPhones when downloading apps from the App Store and utilizing phone features that require iCloud services. While your iPhone's local data maybe secure while under your possesion, your iCloud data is not. iCloud services such as Cloud Backups, Find My Phone, Apple Pay and others will be obtained by Government agencies when requested.
Learn More

Introducing MAC Randomization
Connect to any network, completely anonymous.
The Zero Trace Phone randomly assigns your smartphone a new MAC address every time you use the internet. Android applications that request your device’s hardware info will not be able to identify you.
How Does MAC Address Spoofing Work?

The Zero Trace Phone supports per-connection MAC randomization and enables it by default. This is a more private approach than the standard persistent per-network random MAC used by modern Android.   When the per-connection MAC randomization added by Zero Trace is being used, DHCP client state is flushed before reconnecting to a network to avoid revealing that it’s likely the same device as before.

Wi-Fi on the Zero Trace Phone is very privacy-friendly and is essentially anonymous as long as apps do not leak uniquely identifying information to the network. The Zero Trace Phone avoids allowing itself to be fingerprinted as a privacy-modified smartphone.

Surveillance Jammer

The Sensors On Your Phone Are Betraying You

The Zero Trace Phone is equipped with three types of jammers; ultrasonic, internet and sensors. Not only can you selectively block individual apps from using your phone’s mic or connecting to the internet; but you can also proactively emit a noise-canceling sound that disarms nearby ultrasonic tracking beacons and feed dummy data to any person or app listening.
Ultrasound cross-device tracking (uXDT), is a new technology that started being deployed in modern-day advertising platforms around 2014. uXDT relies on adversaries hiding ultrasounds within media (ads, music, video, etc.)  When the media plays on a TV or radio, or some ad code runs on a mobile or computer, it emits ultrasounds that get picked up by the microphone of nearby laptops, desktops, tablets or smartphones.

These second-stage devices, who silently listen in the background, will interpret these ultrasounds, which contain hidden instructions, telling them to ping back to the server with details such as the user’s IP address, geo-location coordinates, telephone number, IMEI code, and device MAC address.

Aside from the signal jammers, the Zero Trace Phone also enables you to disable an app’s permission from using the accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events.

Mask Your Identity

Prevent others from spying on you

The Zero Trace Phone prevents others from spying on your internet activities and learning what you are doing online. By using the Zero Trace Phone you prevent any website or app you use, from learning where and who you are.

Absolutely everything you do from within the Zero Trace Phone is FORCED via the Tor network. This includes all pre-installed applications as well.

You will be able to manage a social media account entirely through the Zero Trace Phone. If you only access them from the Phone, they cannot be traced to you. You will also be able to store documents and images related to your different identities all via the preinstalled applications. Keep your passwords in Bitwarden and have a dedicated email account in K-9 Mail, etc

Prevent Stingray Attacks
Identify Cell Tower Integrity

Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”

The Zero Trace Phone is equipped with a counter-surveillance feature that identifies what type of cell tower connection your phone is currently using. 

Many cell phone networks are currently upgrading to 5G networks. While a pure 5G connection is protected against interception (stingray attacks). Many carriers are also using a hybrid signal that utilizes 4G and 5G technology. 

This is known as 5G NSA (Non-Standalone) mode and does not provide protection against stingrays. 

While connected, your phone will appear to be using 5G while still using an insecure signal. The Zero Trace Phone will let you know when you’re using a pure 5G (Stingray-proof) connection, and when you’re not.

Mask Your Identity
Prevent others from spying on you

The Zero Trace Phone prevents others from spying on your internet activities and learning what you are doing online. By using the Zero Trace Phone you prevent any website or app you use, from learning where and who you are.

Absolutely everything you do from within the Zero Trace Phone is FORCED via the Tor network. This includes all pre-installed applications as well.

You will be able to manage a social media account entirely through the Zero Trace Phone. If you only access them from the Phone, they cannot be traced to you. You will also be able to store documents and images related to your different identities all via the preinstalled applications. Keep your passwords in Bitwarden and have a dedicated email account in K-9 Mail, etc

Prevent Stingray Attacks
Identify Cell Tower Integrity

Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”

The Zero Trace Phone is equipped with a counter-surveillance feature that identifies what type of cell tower connection your phone is currently using. 

Many cell phone networks are currently upgrading to 5G networks. While a pure 5G connection is protected against interception (stingray attacks). Many carriers are also using a hybrid signal that utilizes 4G and 5G technology.

This is known as 5G NSA (Non-Standalone) mode and does not provide protection against stingrays. 

While connected, your phone will appear to be using 5G while still using an insecure signal. The Zero Trace Phone will let you know when you’re using a pure 5G (Stingray-proof) connection, and when you’re not.

15+ Premium applications to open sensitive documents & communicate securely

Security Protocols​

  1. Applications are blocked automaticallyif they try to connect to the Internet without Tor or decentralized VPN.
  2. Everything saved on the Zero Trace Phone is encrypted automatically via Android File-Based Encryption (FBE).
  3. Equipped with 4 emergency factory reset protocols, the Zero Trace Phone’s can be deleted automatically at a moment’s notice.
Non-Custodial Wallet
Cryptocurrency Storage

We created an ecosystem that lets you simply manage, secure and control your crypto assets.When you own crypto, what you really own is a private key – this key gives you access to your coins. You should be the only one in control of this key & you also need to secure it. The Zero Trace Phone offers the best level of protection and control: our hardware wallet is the best way to secure your funds while giving you the freedom to manage everything on your own.

Your private key always remains protected in the hardware wallet – in a certified secure chip. Nobody can access it except you.

Combined with Unstoppable, everything about crypto is made simple and secure: buy, send, receive digital assets (including NFTs) with one-single app.

SOS Protocols
Emergency Factory Reset

We have also implemented emergency purging protocols that are triggered by either typing an alternate passcode (lockscreen) or by manually pressing a disguised shortcut. Need to remotely wipe your device? No problem. You can also configure a deadman’s switch or secret notification code to trigger an automatic factory reset remotely.

Disguised Shortcut. Have your Zero Trace Phone reset the second you press a designated shortcut. This shortcut can be disguised as a fake messaging app or the airplane mode toggle.

Alternate Passcode. Someone forcing you to unlock your phone? Type in an alternate passcode in your lock screen and automatically trigger a factory reset.

Secret Notification Code. Trigger a factory reset by texting your Zero Trace Phone a secret code. No service? Sending yourself ANY type of notification containing the secret code will work as well.

Deadman’s Switch. Touchless factory reset protocol that gets triggered when you haven’t unlocked your Zero Trace Phone after X amount of days.

Will Reseting Delete All Evidence?

When you perform a factory reset using one of our emergency panic protocols, your Zero Trace Phone will erase all of our pre-installed apps and configurations. This is for your own safety in order to disassociate you from any Tor usage. Your device will revert to a stock android installation, providing you strong plausible deniability.  If after an emergency reset, you’d like us to restore your device back to original Zero Trace settings, purchase our Zero Trace Restore service.

International Carriers
Utilize From Anywhere
The Zero Trace Phone works internationally with any mobile carrier (Physical sim card & eSim compatible). It is recommended you use a prepaid mobile plan to add an extra layer of anonymity. We outline several ways you can easily purchase a phone plan anonymously, in-person (physical sim) & online (eSim) within the Zero Trace Phone portal.

(Gone Boating.)

Fast & Secure

SOS Protocols
Emergency Factory Reset​

We have also implemented emergency purging protocols that are triggered by either typing an alternate passcode (lockscreen) or by manually pressing a disguised shortcut. Need to remotely wipe your device? No problem. You can also configure a deadman’s switch or secret notification code to trigger an automatic factory reset remotely.

Disguised Shortcut. Have your Zero Trace Phone reset the second you press a designated shortcut. This shortcut can be disguised as a fake messaging app or the airplane mode toggle.

Alternate Passcode. Someone forcing you to unlock your phone? Type in an alternate passcode in your lock screen and automatically trigger a factory reset.

Secret Notification Code. Trigger a factory reset by texting your Zero Trace Phone a secret code. No service? Sending yourself ANY type of notification containing the secret code will work as well.

Deadman’s Switch. Touchless factory reset protocol that gets triggered when you haven’t unlocked your Zero Trace Phone after X amount of days.

Will Reseting Delete All Evidence?

When you perform a factory reset using one of our emergency panic protocols, your Zero Trace Phone will erase all of our pre-installed apps and configurations. This is for your own safety in order to disassociate you from any Tor usage. Your device will revert to a stock android installation, providing you strong plausible deniability.  If after an emergency reset, you’d like us to restore your device back to original Zero Trace settings, purchase our Zero Trace Restore service.

Bonuses for today’s world

Multilingual Support

Arabic – Azerbaijani – Catalan – Czech – Welsh – Danish – German – Greek – English – Spanish – Persian – Italian – Japanese – Khmer – Korean -Latvian – Bokmal – Dutch – Polish – Portuguese – Russian – Slovak – Slovene – Albanian – Serbian – Swedish – Turkish – Ukrainian – Chinese

Additionally, each language setting comes with it’s own corresponding layout

Automatic Updates
Receive all future security updates for 5 years – directly on your phone. These updates are made possible:
Feeling Technical?
Unlock the full potential of your Zero Trace Phone by joining our exclusive VIP membership! As a VIP member, you’ll gain access to cutting-edge tutorials and courses, empowering you to customize your device with advanced configurations and programming. Stay ahead of the curve and make the most out of your privacy-focused phone experience.
Play Video

“The Zero Trace Phone pays for itself from day 1. I will never have to pay for an app again.”

Play Video

“If it wasn’t for the built-in dead man switch – I don’t know where I’d be today.”

Play Video

“The Zero Trace Phone includes a stingray detector that will let you know if the line is secure – based on your current cell signal connection.”

Zero Trace Phone: Under the hood.

Tech Specs

Display

Full-screen 6.1-inch (156 mm)1 display, up to 60 Hz
20:9 aspect ratio
FHD+ (1080 x 2400) OLED at 429 ppi

Corning® Gorilla® Glass 3™ cover glass
Always-on display with At a Glance and Now Playing

High brightness mode
>1,000,000:1 contrast ratio
HDR support
Full 24-bit depth for 16 million colors

Dimensions & Weight

6.0 height x 2.8 width x 0.35 depth (in)
152.2 height x 71.8 width x 8.9 depth (mm)
6.3 oz
178 g

Battery & Charging

Over 24-hour battery life3 Up to 72-hour battery life with Extreme Battery Saver

Minimum 4306 mAh
Typical 4410 mAh

Fast Charging

Processors

ZT M9 security coprocessor

Security

End-to-end security designed by Zero Trace

Multi-layer hardware security: security core, security coprocessor, and Validator (Trusted Execution Environment)

Minimum 5 years of security updates
Anti-phishing and anti-malware protection
Automatic security checks and privacy controls
Camera and mic toggles
Private Computer Core
ZT System Intelligence
Messages end-to-end encryption

Rear Camera

12.2 MP dual pixel wide camera
1.4 μm pixel width
ƒ/1.7 aperture
77° field of view

1/2.55" image sensor size
Super Res Zoom up to 7x8

12 MP ultrawide camera
1.25 μm pixel width
ƒ/2.2 aperture
114° field of view
Lens correction

Optical + electronic image stabilization
Fast camera launcher

Front Camera

8 MP
1.12 μm pixel width
ƒ/2.0 aperture
Fixed focus
84° wide field of view

Authentication

Fingerprint Unlock with under-display fingerprint sensor
Pattern, PIN, password

Buttons & Ports

USB Type-C® 3.1 Gen 1
Power button
Volume controls

Sim Card

Dual SIM (Single Nano SIM and eSIM11)

Media & Audio

Stereo speakers 2 microphones Noise suppression

Connectivity & Location

Wi-Fi 6 (802.11ax) and 6E (6GHz) with MIMO

Bluetooth® v5.2 with dual antennas for enhanced quality and connection

NFC

Network

[5G Sub 6GHz]14 Model GX7AS
GSM/EDGE: Quad-band (850, 900, 1800, 1900 MHz)
UMTS/HSPA+/HSDPA: Bands 1,2,4,5,6,8,19

LTE: Bands B1/2/3/4/5/7/8/12/13/14/17/18/19/20/25/26/28/29/30/38/39/40/41/42/48/66/71

5G Sub-614: Bands n1/2/3/5/7/8/12/20/25/28/30/38/40/41/48/66/71/77/78

eSIM


[5G mmWave + Sub 6GHz]14 Model GB62Z15
GSM/EDGE: Quad-band (850, 900, 1800, 1900 MHz)
UMTS/HSPA+/HSDPA: Bands 1,2,4,5,6,8,19

LTE: Bands B1/2/3/4/5/7/8/12/13/14/17/18/19/20/25/26/28/29/30/38/39/40/41/42/48/66/71

5G Sub-614: Bands n1/2/3/5/7/8/12/20/25/28/30/40/48/66/71/77/78

5G mmWave14: Bands n260/n261 eSIM

Materials

Corning® Gorilla® Glass 3™ cover glass
3D thermoformed composite back with tactile alloy frame
IP67 dust and water resistance
Fingerprint-resistant coating

AR/VR

AR Ready

What's In The Box

12 reviews for Zero Trace Phone®

4.9 out of 5
11
1
0
0
0
Write a review
Show all Most Helpful Highest Rating Lowest Rating
  1. Skyler T
    July 3, 2024
    I recently got the Zero Trace Phone and im pretty impressed! It's super easy to set up and has unique features like the built-in MAC Address Spoofer a...More
    I recently got the Zero Trace Phone and im pretty impressed! It's super easy to set up and has unique features like the built-in MAC Address Spoofer and Deadman's Switch, which makes me feel like a secret agent lol. The pre-installed privacy apps like Tor work great, and 5 years of security updates is a real plus. The phone is abit pricey and the battery life could be better, but for the privacy it offers, I'd say its worth it. Overall, it's a solid choice for anyone serious about digital privacy.
    0 0
    Alex M
    July 2, 2024
    Does what it says!
    0 0
    Masoni K
    May 7, 2024
    I've been using the Zero Trace Phone for its standout privacy and security features, which are perfect for someone like me who prioritizes data protec...More
    I've been using the Zero Trace Phone for its standout privacy and security features, which are perfect for someone like me who prioritizes data protection. It's equipped with strong encryption and guarantees zero data retention, offering a truly private experience. While it handles everyday tasks quite well, I've noticed it can prevent apps like Google Maps and TikTok from working as they usually would on a regular phone. This just shows how much these apps depend on tracking our data and how they react when you don't let them get it. Overall, I think it's a great investment and a head start for anyone who is getting into privacy.
    1 0
    K O
    April 1, 2024
    finally!!! glad it’s back in stock. Worth every penny
    1 1
    Johnny D
    March 24, 2024
    perfect for the use case. this device is really for those who are serious about their privacy and aren’t pinching pennies. Penny pinchers get caught w...More
    perfect for the use case. this device is really for those who are serious about their privacy and aren’t pinching pennies. Penny pinchers get caught with bootleg set ups!!!
    0 3
    S J
    March 16, 2024
    I work in cybersecurity and this phone has opened my eyes to many things I have overlooked in mobile operational security. This is basically a powerfu...More
    I work in cybersecurity and this phone has opened my eyes to many things I have overlooked in mobile operational security. This is basically a powerful device + cybersecurity course all in one. The best way to learn is by doing!! and this does it all :)
    1 2
    NO N
    February 28, 2024
    One of the few things I thank tiktok for helping me find. I understand the speculation behind this device and the implications it may bring. But for m...More
    One of the few things I thank tiktok for helping me find. I understand the speculation behind this device and the implications it may bring. But for me it's perfect for what I need. I don't care about making my own setup or wasting hours to figure out how to what are the best apps for privacy. I leave it to these guys, they figured it out. I wanted speed and I got it. I even gave the device to my IT department to look it over and see if there where any vulnerabilities I should know about, but they too were surprised on how secure and streamlined the phone is. Please redact my name if you are going to post this review publically. Thanks.
    3 2
    Santi S
    February 20, 2024
    Just got my phone. I got to say this is the best investment I've made in years. Replaces so much of my DIY tools that don't work half as good. Just go...More
    Just got my phone. I got to say this is the best investment I've made in years. Replaces so much of my DIY tools that don't work half as good. Just go ahaed and pull the trigger it's worth every penny.
    7 3
    Paolo M
    January 21, 2024
    Got my phone a few months ago...I'm impressed. However, I really hope the team keeps the phone out from the mainstream. We don't need this to end up b...More
    Got my phone a few months ago...I'm impressed. However, I really hope the team keeps the phone out from the mainstream. We don't need this to end up being sold on random 3rd party sites with no support. I'm looking to purchase another in the near future, once the 4th update comes out.
    10 6
    Jeremy L
    November 13, 2023
    Finally got the phone and all I have to admit this thing is next level. Preloaded with really powerful apps, you are not going to have any issues stay...More
    Finally got the phone and all I have to admit this thing is next level. Preloaded with really powerful apps, you are not going to have any issues staying off the radar with this. Besides that the native tor vpn config was really easy to set up and the team did a great job with the documentation and manual.
    14 8
    Esteban A
    September 23, 2023
    I knew the phone looked good, but wow I wasn't expecting this when I got it. It's simply has everything I need. PGP for email, emergency factory reset...More
    I knew the phone looked good, but wow I wasn't expecting this when I got it. It's simply has everything I need. PGP for email, emergency factory reset, guest mode, and till compatible with Android apps, even though the OS isn't Android! Super lowkey too. People just think I'm using a regular phone. Perfect.
    10 5
    Miguel
    April 29, 2023
    finally got my hands on one I had to wait quite a bit but it was worth it. I am still learning how to use every feature but so far it has everything I...More
    finally got my hands on one I had to wait quite a bit but it was worth it. I am still learning how to use every feature but so far it has everything I was looking for. The team was really helpful setting up my sim card and VOIP. Honestly the phone might be overkill for those who just need a little privacy but for the others who really depend on it, it's a no brainer.
    9 4

    Only logged in customers who have purchased this product may leave a review.

    Specification: Zero Trace Phone®

    Compatibility

    APK Extension Application Compatible

    Update Interval

    Monthly

    Utility Applications & Features

    KeePassDX, PGP Key, Sandbox, Storage Scopes, Secure Fingerprint, User Profile, Auditor, Element, K-9 Mail, iMessage, Tor Browser, MAC Address Spoofer, Zurf, Mic Jammer, Anti-Stingray, Scrambled Pin, Toggles, LTE-Only Mode, Collabora Office, Exif Scrubber, Private Screenshot, Anonymous Camera, AnonCamera, ZeroPlayer, Nitter, Stealth, Unstoppable Wallet, Location Alert, ZeroMaps

    Hardware Add-Ons

    Built-In MAC Address Spoofer, Deadman's Switch

    Asset Storage

    Non-Custodial Cryptocurrency Wallet

    Support Priority

    ZT PRO Support

    Dimensions
    Dimensions 5 cm
    Zero Trace Phone®

    Original price was: $1,495.05.Current price is: $979.00.

    Zero Trace
    1

    Ready To Join VIP?

    Spots Left 72%
    [affiliate_registration]

    Need A Phone?

    Join the waitlist.  

    Need New Research?

    For a limited time get one of our best selling books for $1.

    Shopping cart