- 35%

Zero Trace Phone®

Original price was: $1,495.05.Current price is: $979.00.

All-in-One Tor Network Anonymous Phone + Anti-Surveillance Toolkit

Zero Trace Phone is an all-in-one smartphone with everything you need to stay anonymous. Being completely portable, you can utilize the Tor network from anywhere, anonymously from the Zero Trace Phone.  (Clearnet | Dark Web | Darknet | Deep Web Compatible)

    • 5 Years Of Security Updates
    • Pre-installed Privacy Apps
    • Built-In MAC Address Spoofer
    • Deadman’s Switch (Emergency Factory Reset Protocol)
    • Penetration Testing Toolkit
    • ZT PRO Support
Tag:

Original price was: $1,495.05.Current price is: $979.00.

(-35%)
  • Privacy Features
  • Tech Specs

Disappear.

Zero Trace Phone

CURRENT STATUS: BETA

Here’s to the rebels.

ztPhone

6.1″

Zero Trace is an all-in-one smartphone with everything you need to stay anonymous. Being completely portable, you can utilize the Tor network from anywhere, anonymously from the Zero Trace Phone. 
ztPhone

The most secure build of any burner phone. Ever.

Corning® Gorilla® Glass
Serious protection inside and out

Everything you do from within the Zero Trace Phone is forced via 3 Tor relays (optionally a  VPN layer). This means if you accidentally click outside the Tor Browser and open another app – you will be completely safe and anonymized.

Why Do You Need the ztPhone?

Everything you do on your typical smartphone is being tracked by the big four – Amazon, Facebook, Google, and Apple – this is aside from all the data collected by your phone carrier. They do this via the apps you download everyday. Your devices identifiers such as it’s IMEI, MAC Address, Carrier, & GPS location are constantly being pinged by Instagram (owned by Facebook), Gmail, Amazon, iMessage and more.

Our Zero Trace Phone runs an OS (based on Android) completely independent from Google and Apple.  Additionally, encryption happens at the operating system level. This means you can run applications with omniscient control over what device permissions they can access and browse the internet with complete anonymity.

Your iPhone/Android data can easily be accessed with a simple Gmail or iCloud subpoena. 

How Do They Do It?

Every stock Android phone requires a Google Account to download apps from the Google Play Store. Even if the apps weren’t acquired through the Play Store, they almost always require the background processing of Google Play Services. The same goes for iPhones when downloading apps from the App Store and utilizing phone features that require iCloud services. Both these processes gather loads of personal data from you and can be accessed by 3rd parties.

Google Play Services

Every stock Android phone requires a Google Account to download apps from the Google Play Store. Even if the apps weren't acquired through the Play Store, they almost always require the background processing of Google Play Services. These processes cannot be disabled on your typical android phone.
Learn More

iCloud

The same goes for iPhones when downloading apps from the App Store and utilizing phone features that require iCloud services. While your iPhone's local data maybe secure while under your possesion, your iCloud data is not. iCloud services such as Cloud Backups, Find My Phone, Apple Pay and others will be obtained by Government agencies when requested.
Learn More

Introducing MAC Randomization
Connect to any network, completely anonymous.
The Zero Trace Phone randomly assigns your smartphone a new MAC address every time you use the internet. Android applications that request your device’s hardware info will not be able to identify you.
How Does MAC Address Spoofing Work?

The Zero Trace Phone supports per-connection MAC randomization and enables it by default. This is a more private approach than the standard persistent per-network random MAC used by modern Android.   When the per-connection MAC randomization added by Zero Trace is being used, DHCP client state is flushed before reconnecting to a network to avoid revealing that it’s likely the same device as before.

Wi-Fi on the Zero Trace Phone is very privacy-friendly and is essentially anonymous as long as apps do not leak uniquely identifying information to the network. The Zero Trace Phone avoids allowing itself to be fingerprinted as a privacy-modified smartphone.

Surveillance Jammer

The Sensors On Your Phone Are Betraying You

The Zero Trace Phone is equipped with three types of jammers; ultrasonic, internet and sensors. Not only can you selectively block individual apps from using your phone’s mic or connecting to the internet; but you can also proactively emit a noise-canceling sound that disarms nearby ultrasonic tracking beacons and feed dummy data to any person or app listening.
Ultrasound cross-device tracking (uXDT), is a new technology that started being deployed in modern-day advertising platforms around 2014. uXDT relies on adversaries hiding ultrasounds within media (ads, music, video, etc.)  When the media plays on a TV or radio, or some ad code runs on a mobile or computer, it emits ultrasounds that get picked up by the microphone of nearby laptops, desktops, tablets or smartphones.

These second-stage devices, who silently listen in the background, will interpret these ultrasounds, which contain hidden instructions, telling them to ping back to the server with details such as the user’s IP address, geo-location coordinates, telephone number, IMEI code, and device MAC address.

Aside from the signal jammers, the Zero Trace Phone also enables you to disable an app’s permission from using the accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events.

Mask Your Identity

Prevent others from spying on you

The Zero Trace Phone prevents others from spying on your internet activities and learning what you are doing online. By using the Zero Trace Phone you prevent any website or app you use, from learning where and who you are.

Absolutely everything you do from within the Zero Trace Phone is FORCED via the Tor network. This includes all pre-installed applications as well.

You will be able to manage a social media account entirely through the Zero Trace Phone. If you only access them from the Phone, they cannot be traced to you. You will also be able to store documents and images related to your different identities all via the preinstalled applications. Keep your passwords in Bitwarden and have a dedicated email account in K-9 Mail, etc

Prevent Stingray Attacks
Identify Cell Tower Integrity

Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”

The Zero Trace Phone is equipped with a counter-surveillance feature that identifies what type of cell tower connection your phone is currently using. 

Many cell phone networks are currently upgrading to 5G networks. While a pure 5G connection is protected against interception (stingray attacks). Many carriers are also using a hybrid signal that utilizes 4G and 5G technology. 

This is known as 5G NSA (Non-Standalone) mode and does not provide protection against stingrays. 

While connected, your phone will appear to be using 5G while still using an insecure signal. The Zero Trace Phone will let you know when you’re using a pure 5G (Stingray-proof) connection, and when you’re not.

Mask Your Identity
Prevent others from spying on you

The Zero Trace Phone prevents others from spying on your internet activities and learning what you are doing online. By using the Zero Trace Phone you prevent any website or app you use, from learning where and who you are.

Absolutely everything you do from within the Zero Trace Phone is FORCED via the Tor network. This includes all pre-installed applications as well.

You will be able to manage a social media account entirely through the Zero Trace Phone. If you only access them from the Phone, they cannot be traced to you. You will also be able to store documents and images related to your different identities all via the preinstalled applications. Keep your passwords in Bitwarden and have a dedicated email account in K-9 Mail, etc

Prevent Stingray Attacks
Identify Cell Tower Integrity

Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”

The Zero Trace Phone is equipped with a counter-surveillance feature that identifies what type of cell tower connection your phone is currently using. 

Many cell phone networks are currently upgrading to 5G networks. While a pure 5G connection is protected against interception (stingray attacks). Many carriers are also using a hybrid signal that utilizes 4G and 5G technology.

This is known as 5G NSA (Non-Standalone) mode and does not provide protection against stingrays. 

While connected, your phone will appear to be using 5G while still using an insecure signal. The Zero Trace Phone will let you know when you’re using a pure 5G (Stingray-proof) connection, and when you’re not.

15+ Premium applications to open sensitive documents & communicate securely

Security Protocols​

  1. Applications are blocked automaticallyif they try to connect to the Internet without Tor or decentralized VPN.
  2. Everything saved on the Zero Trace Phone is encrypted automatically via Android File-Based Encryption (FBE).
  3. Equipped with 4 emergency factory reset protocols, the Zero Trace Phone’s can be deleted automatically at a moment’s notice.
Non-Custodial Wallet
Cryptocurrency Storage

We created an ecosystem that lets you simply manage, secure and control your crypto assets.When you own crypto, what you really own is a private key – this key gives you access to your coins. You should be the only one in control of this key & you also need to secure it. The Zero Trace Phone offers the best level of protection and control: our hardware wallet is the best way to secure your funds while giving you the freedom to manage everything on your own.

Your private key always remains protected in the hardware wallet – in a certified secure chip. Nobody can access it except you.

Combined with Unstoppable, everything about crypto is made simple and secure: buy, send, receive digital assets (including NFTs) with one-single app.

SOS Protocols
Emergency Factory Reset

We have also implemented emergency purging protocols that are triggered by either typing an alternate passcode (lockscreen) or by manually pressing a disguised shortcut. Need to remotely wipe your device? No problem. You can also configure a deadman’s switch or secret notification code to trigger an automatic factory reset remotely.

Disguised Shortcut. Have your Zero Trace Phone reset the second you press a designated shortcut. This shortcut can be disguised as a fake messaging app or the airplane mode toggle.

Alternate Passcode. Someone forcing you to unlock your phone? Type in an alternate passcode in your lock screen and automatically trigger a factory reset.

Secret Notification Code. Trigger a factory reset by texting your Zero Trace Phone a secret code. No service? Sending yourself ANY type of notification containing the secret code will work as well.

Deadman’s Switch. Touchless factory reset protocol that gets triggered when you haven’t unlocked your Zero Trace Phone after X amount of days.

Will Reseting Delete All Evidence?

When you perform a factory reset using one of our emergency panic protocols, your Zero Trace Phone will erase all of our pre-installed apps and configurations. This is for your own safety in order to disassociate you from any Tor usage. Your device will revert to a stock android installation, providing you strong plausible deniability.  If after an emergency reset, you’d like us to restore your device back to original Zero Trace settings, purchase our Zero Trace Restore service.

International Carriers
Utilize From Anywhere
The Zero Trace Phone works internationally with any mobile carrier (Physical sim card & eSim compatible). It is recommended you use a prepaid mobile plan to add an extra layer of anonymity. We outline several ways you can easily purchase a phone plan anonymously, in-person (physical sim) & online (eSim) within the Zero Trace Phone portal.

(Gone Boating.)

Fast & Secure

SOS Protocols
Emergency Factory Reset​

We have also implemented emergency purging protocols that are triggered by either typing an alternate passcode (lockscreen) or by manually pressing a disguised shortcut. Need to remotely wipe your device? No problem. You can also configure a deadman’s switch or secret notification code to trigger an automatic factory reset remotely.

Disguised Shortcut. Have your Zero Trace Phone reset the second you press a designated shortcut. This shortcut can be disguised as a fake messaging app or the airplane mode toggle.

Alternate Passcode. Someone forcing you to unlock your phone? Type in an alternate passcode in your lock screen and automatically trigger a factory reset.

Secret Notification Code. Trigger a factory reset by texting your Zero Trace Phone a secret code. No service? Sending yourself ANY type of notification containing the secret code will work as well.

Deadman’s Switch. Touchless factory reset protocol that gets triggered when you haven’t unlocked your Zero Trace Phone after X amount of days.

Will Reseting Delete All Evidence?

When you perform a factory reset using one of our emergency panic protocols, your Zero Trace Phone will erase all of our pre-installed apps and configurations. This is for your own safety in order to disassociate you from any Tor usage. Your device will revert to a stock android installation, providing you strong plausible deniability.  If after an emergency reset, you’d like us to restore your device back to original Zero Trace settings, purchase our Zero Trace Restore service.

Data Integrity Add-Ons

Dynamic EM Shielding

The Zero Trace Phone undergoes a sophisticated electromagnetic interference shielding treatment that involves meticulously coating its essential components, such as the CPU, GPU, memory, and communication chips, with multiple layers of protective materials. 

The process begins with the Preparation stage, where the components are cleaned and prepared for coating, followed by the Multi-layer Deep Coat Spray, which includes a base conductive layer, an adaptive layer, and a reflective layer. Uniform Coverage is ensured through the use of precision robotic arms in a cleanroom environment, resulting in an invisible treatment that maintains the device’s appearance and usability. The benefits of this treatment include enhanced privacy, stealth protection, and durability, making the Zero Trace Phone a true masterpiece in EM shielding technology.

Advanced Biometric Security Module [ALPHA]

The Advanced Biometric Security Module is a cutting-edge feature designed to provide the highest level of security and privacy for Zero Trace Phones. This module relies solely on fingerprint recognition technology for authentication, as we have deliberately blocked facial recognition unlock due to potential deepfake vulnerabilities.

At the core of this module is a customized biometric processor that handles all fingerprint data exclusively on the device, ensuring that no biometric information is ever uploaded to any servers.

Furthermore, all biometric data is protected with hardware-level encryption, making unauthorized access nearly impossible.

Bonuses for today’s world

Multilingual Support

Arabic – Azerbaijani – Catalan – Czech – Welsh – Danish – German – Greek – English – Spanish – Persian – Italian – Japanese – Khmer – Korean -Latvian – Bokmal – Dutch – Polish – Portuguese – Russian – Slovak – Slovene – Albanian – Serbian – Swedish – Turkish – Ukrainian – Chinese

Additionally, each language setting comes with it’s own corresponding layout

Automatic Updates
Receive all future security updates for 5 years – directly on your phone. These updates are made possible:
Feeling Technical?
Unlock the full potential of your Zero Trace Phone by joining our exclusive VIP membership! As a VIP member, you’ll gain access to cutting-edge tutorials and courses, empowering you to customize your device with advanced configurations and programming. Stay ahead of the curve and make the most out of your privacy-focused phone experience.

“The Zero Trace Phone pays for itself from day 1. I will never have to pay for an app again.”

“If it wasn’t for the built-in dead man switch – I don’t know where I’d be today.”

“The Zero Trace Phone includes a stingray detector that will let you know if the line is secure – based on your current cell signal connection.”

“The Zero Trace Phone works amazingly in any country with on major carrier. No issues there.”

Zero Trace Phone: Under the hood.

Tech Specs

Display

Full-screen 6.1-inch (156 mm)1 display, up to 60 Hz
20:9 aspect ratio
FHD+ (1080 x 2400) OLED at 429 ppi

Corning® Gorilla® Glass 3™ cover glass
Always-on display with At a Glance and Now Playing

High brightness mode
>1,000,000:1 contrast ratio
HDR support
Full 24-bit depth for 16 million colors

Dimensions & Weight

6.0 height x 2.8 width x 0.35 depth (in)
152.2 height x 71.8 width x 8.9 depth (mm)
6.3 oz
178 g

Battery & Charging

Over 24-hour battery life3 Up to 72-hour battery life with Extreme Battery Saver

Minimum 4306 mAh
Typical 4410 mAh

Fast Charging

Processors

ZT M9 security coprocessor

Security

End-to-end security designed by Zero Trace

Multi-layer hardware security: security core, security coprocessor, and Validator (Trusted Execution Environment)

Minimum 5 years of security updates
Anti-phishing and anti-malware protection
Automatic security checks and privacy controls
Camera and mic toggles
Private Computer Core
ZT System Intelligence
Messages end-to-end encryption

Rear Camera

12.2 MP dual pixel wide camera
1.4 μm pixel width
ƒ/1.7 aperture
77° field of view

1/2.55" image sensor size
Super Res Zoom up to 7x8

12 MP ultrawide camera
1.25 μm pixel width
ƒ/2.2 aperture
114° field of view
Lens correction

Optical + electronic image stabilization
Fast camera launcher

Front Camera

8 MP
1.12 μm pixel width
ƒ/2.0 aperture
Fixed focus
84° wide field of view

Authentication

Fingerprint Unlock with under-display fingerprint sensor
Pattern, PIN, password

Buttons & Ports

USB Type-C® 3.1 Gen 1
Power button
Volume controls

Sim Card

Dual SIM (Single Nano SIM and eSIM11)

Media & Audio

Stereo speakers 2 microphones Noise suppression

Connectivity & Location

Wi-Fi 6 (802.11ax) and 6E (6GHz) with MIMO

Bluetooth® v5.2 with dual antennas for enhanced quality and connection

NFC

Network

[5G Sub 6GHz]14 Model GX7AS
GSM/EDGE: Quad-band (850, 900, 1800, 1900 MHz)
UMTS/HSPA+/HSDPA: Bands 1,2,4,5,6,8,19

LTE: Bands B1/2/3/4/5/7/8/12/13/14/17/18/19/20/25/26/28/29/30/38/39/40/41/42/48/66/71

5G Sub-614: Bands n1/2/3/5/7/8/12/20/25/28/30/38/40/41/48/66/71/77/78

eSIM


[5G mmWave + Sub 6GHz]14 Model GB62Z15
GSM/EDGE: Quad-band (850, 900, 1800, 1900 MHz)
UMTS/HSPA+/HSDPA: Bands 1,2,4,5,6,8,19

LTE: Bands B1/2/3/4/5/7/8/12/13/14/17/18/19/20/25/26/28/29/30/38/39/40/41/42/48/66/71

5G Sub-614: Bands n1/2/3/5/7/8/12/20/25/28/30/40/48/66/71/77/78

5G mmWave14: Bands n260/n261 eSIM

Materials

Corning® Gorilla® Glass 3™ cover glass
3D thermoformed composite back with tactile alloy frame
IP67 dust and water resistance
Fingerprint-resistant coating

AR/VR

AR Ready

What's In The Box

31 reviews for Zero Trace Phone®

4.9 out of 5
28
3
0
0
0
Write a review

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Specification: Zero Trace Phone®

Compatibility

APK Extension Application Compatible

Update Interval

Monthly

Utility Applications & Features

KeePassDX, PGP Key, Sandbox, Storage Scopes, Secure Fingerprint, User Profile, Auditor, Element, K-9 Mail, iMessage, Tor Browser, MAC Address Spoofer, Zurf, Mic Jammer, Anti-Stingray, Scrambled Pin, Toggles, LTE-Only Mode, Collabora Office, Exif Scrubber, Private Screenshot, Anonymous Camera, AnonCamera, ZeroPlayer, Nitter, Stealth, Unstoppable Wallet, Location Alert, ZeroMaps

Hardware Add-Ons

Built-In MAC Address Spoofer, Deadman's Switch

Asset Storage

Non-Custodial Cryptocurrency Wallet

Support Priority

ZT PRO Support

Dimensions
Dimensions 5 cm
Zero Trace Phone®

Original price was: $1,495.05.Current price is: $979.00.

Zero Trace
0

Ready To Join VIP?

Spots Left 72%
[affiliate_registration]

Need A Phone?

Join the waitlist.  

Need New Research?

For a limited time get one of our best selling books for $1.

Shopping cart