Australian Owned • ABN 35 942 206 406 • Same-day dispatch
⬡ Proprietary Configuration Layer

The protection layer that runs
when everything else fails.

Phantom Protocol™ is not an app. It is the configuration architecture built into every Privacy Devices phone — engineered for the moment your device is accessed, seized, or compromised without consent.

Six layers. One objective: fail safely.

🔐

Duress PIN

A secondary PIN triggers silent, irreversible device wipe on entry. No confirmation dialog. No visible indication. The device clears itself without alerting anyone physically present.

📡

Remote Wipe

A designated trusted contact can trigger full wipe remotely. No login required from the target device. Works even if the device is powered on and connected to a hostile network.

🎭

Decoy Profile

A secondary operating profile presents a clean, plausible device with no sensitive data. Activated under duress, it passes casual inspection while primary data remains inaccessible.

Rapid Lockdown

One-gesture lockdown disables biometrics, requires passphrase, kills network adapters, and clears RAM. Activatable in under two seconds without unlocking the device.

🔒

Compartmentalised Profiles

Separate profiles for work, personal, and sensitive operations. Each profile is cryptographically isolated — apps in one profile cannot access data in another, even if compromised.

🛡

Sensor Control

Hardware-level toggles for microphone, camera, GPS, and network adapters. Not software mutes — actual signal interrupts that survive malicious app attempts to re-enable.

Stock GrapheneOS vs Phantom Protocol

Anyone can install GrapheneOS. Very few configure it correctly for real-world pressure scenarios.

Feature Stock GrapheneOS Phantom Protocol
Hardened OS
Duress PIN (silent wipe)
Remote wipe via trusted contact
Decoy profile configured
Rapid lockdown gesture
Compartmentalised profiles set up✗ (requires config)✓ (pre-configured)
VPN always-on configured✓ Mullvad
Banking app compatibility tested
Threat model consultation

Who Phantom Protocol is built for

Not everyone needs Phantom Protocol. Stock GrapheneOS with basic hardening is sufficient for most privacy-conscious users. Phantom Protocol is for individuals who face real adversarial threat scenarios — not hypothetical ones.

Our customers include journalists with source protection obligations, legal professionals under legal privilege requirements, corporate executives in M&A environments, individuals under restraining orders or domestic violence risk, and high-net-worth individuals who have experienced or anticipate targeted theft or coerced access.

If your threat model includes a sophisticated adversary — state, corporate, or personal — Phantom Protocol is the only Australian-built configuration that addresses the full scenario. Every competitor sells you an OS. We sell you a posture.

Frequently asked questions

What is Phantom Protocol? +

Phantom Protocol is a proprietary device configuration layer built into every Privacy Devices phone during provisioning. It is not an app. It is a set of OS-level configurations and procedures engineered for failure scenarios — device seizure, coerced access, or targeted surveillance.

Does it work if the phone is physically seized? +

Yes. Entering the duress PIN silently wipes the device. The decoy profile can be presented to pass casual inspection. A trusted contact can trigger remote wipe without physical access to the device.

Can I install Phantom Protocol on my existing phone? +

Not as a self-install. Phantom Protocol is provisioned during our build process and requires a clean Pixel with relocked bootloader. We do offer bespoke builds on customer-supplied hardware — contact us to discuss.

Is this legal in Australia? +

Yes. Every feature in Phantom Protocol operates within Australian law. Wiping your own device is legal. Encrypted communications are legal. GrapheneOS is legal open-source software. We do not provide legal advice, but no aspect of Phantom Protocol's feature set is prohibited under Australian law.

Don't stress. Duress.

Every Privacy Devices phone ships with Phantom Protocol pre-configured.

No setup on your end. No configuration required. Armed and tested before dispatch, tailored to your threat model during our onboarding call.

View Phantom Protocol Devices → Speak to Us First