FAQs
What is Cape?
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
What does privacy have to do with a cell phone network?
In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.How is Cape different?
Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Can I sign up for Cape?
How does Cape prevent illicit activity and approach safety if all user data is anonymized?
Cape is fully compliant with CALEA and e911 requirements, and we take public safety very seriously. We recognize the important role of law enforcement for a functioning society. CALEA, the Communications Assistance for Law Enforcement Act, and similar standards around the world, allow for lawful telecommunications intercept. We will answer lawful requests with the information that we have.
Cape is fully compliant with CALEA and e911 requirements, and we take public safety very seriously. We recognize the important role of law enforcement for a functioning society. CALEA, the Communications Assistance for Law Enforcement Act, and similar standards around the world, allow for lawful telecommunications intercept. We will answer lawful requests with the information that we have.
Who does Cape compete with?
Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Who do you partner with for physical infrastructure?
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
Read more about it hereRead more about it hereWhat does it mean for Cape to run its own mobile core?
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
Have cellular networks been targeted before?
Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.I use VPNs and secure messaging apps. Doesn’t that protect me?
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
How’s your network coverage and speeds?
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
Check your coverage hereCheck your coverage hereWill 911 and other emergency services work?
Yes. Your location will automatically be shared when dialing 911.
Yes. Your location will automatically be shared when dialing 911.
Can I join the team?
We’d love to talk to you about that!
We’d love to talk to you about that!
View Open RolesView Open RolesWhat do I need to sign up for Cape?
All you need is your existing cell phone. Your cell phone must be an iPhone or Android that is carrier unlocked and eSIM compatible. Read here to find out if your device is eligible.
All you need is your existing cell phone. Your cell phone must be an iPhone or Android that is carrier unlocked and eSIM compatible. Read here to find out if your device is eligible.
How does Cape’s coverage compare to my existing carrier’s coverage?
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
How does Cape’s spam protection work?
Cape uses real-time AI machine learning technology to proactively fingerprint and block as much as 90% of spam and malicious text messages. Our model learns from a centralized spam database, scores the credibility of both call-back numbers and hyperlinks, and taps into spam reporting services to recognize current and future threats, allowing us to stay one step ahead of would-be fraudsters. Learn more about preventing spam here.
Cape uses real-time AI machine learning technology to proactively fingerprint and block as much as 90% of spam and malicious text messages. Our model learns from a centralized spam database, scores the credibility of both call-back numbers and hyperlinks, and taps into spam reporting services to recognize current and future threats, allowing us to stay one step ahead of would-be fraudsters. Learn more about preventing spam here.
Can I port-in my existing number to Cape?
Yes, you can switch to Cape and keep your existing phone number.
Yes, you can switch to Cape and keep your existing phone number.
What’s next?
We’re just getting started. We have a robust research team covering leading-edge innovation around network security, new cellular technologies, and emerging cyber and privacy threats. As technologies and attackers evolve, we’re committed to staying one step ahead.
We’re just getting started. We have a robust research team covering leading-edge innovation around network security, new cellular technologies, and emerging cyber and privacy threats. As technologies and attackers evolve, we’re committed to staying one step ahead.
OUR RESEARCH ↗OUR RESEARCH ↗
What is Cape?
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
Cape is a mobile carrier (like AT&T, Verizon, or T-Mobile). We provide you with the same nationwide, premium 4G/5G cellular coverage and unlimited talk and text, but with far more privacy and security. Read more about Cape here.
How is Cape different?
Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.Traditional telcos use weak and antiquated security practices, resulting in breach after breach of their customer’s highly sensitive information. When they’re not losing your data, they’re actively selling it, pooling together extremely granular and personal information about you across your digital service into a unique profile, which they then sell to ad networks and third parties for profit.
At Cape, we believe your data belongs to you, and only you. Our mission is to provide our customers with a premium mobile experience, without having to compromise their privacy or security. That’s why we ask for the minimum amount of personal information possible to provide you with our service, and store your data for as little time as possible. We can’t leak or sell data that we don’t have. What’s more, we utilize modern cryptography and authentication protocols to secure your account, ensuring that any data that does pass through our systems is protected with security measures of the highest standards.How does Cape prevent illicit activity and approach safety if all user data is anonymized?
Cape is fully compliant with CALEA and e911 requirements, and we take public safety very seriously. We recognize the important role of law enforcement for a functioning society. CALEA, the Communications Assistance for Law Enforcement Act, and similar standards around the world, allow for lawful telecommunications intercept. We will answer lawful requests with the information that we have.
Cape is fully compliant with CALEA and e911 requirements, and we take public safety very seriously. We recognize the important role of law enforcement for a functioning society. CALEA, the Communications Assistance for Law Enforcement Act, and similar standards around the world, allow for lawful telecommunications intercept. We will answer lawful requests with the information that we have.
Who do you partner with for physical infrastructure?
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
We partner with UScellular. UScellular has built a highly differentiated network for their quickly growing industrial and commercial business. Cape is now the first to layer a voice service over the top of this enterprise-grade, ultra-dense high bandwidth network to provide superior coverage and reliability for consumers.
Read more about it hereRead more about it hereHave cellular networks been targeted before?
Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.Mobile networks are gold mines of identifying data for potential bad actors. Telecom breaches compromised the private information of more than 74 million customers in the United States just last year.
Even when data is not hacked, it is routinely sold in what has become a multibillion-dollar industry. In 2020, the FCC levied $200 million in fines against America’s four largest carriers for selling user location data without adequate controls. Recently, investigations revealed that authorities purchased trillions of domestic phone records from a major US carrier as part of a warrantless surveillance program.
See a timeline of the most recent data breaches, nationwide here.How’s your network coverage and speeds?
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
We have nationwide coverage and fast 5G and 4G speeds. We also have the highest network density in America, which means more reliable coverage for you.
It’s everything you expect from a premium carrier, but with more privacy and security.
Check your coverage hereCheck your coverage hereCan I join the team?
We’d love to talk to you about that!
We’d love to talk to you about that!
View Open RolesView Open RolesHow does Cape’s coverage compare to my existing carrier’s coverage?
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
Cape’s network combines a dozen national and regional carrier networks, forming dense overlapping redundancy in the most hard-to-reach places. To check Cape’s coverage, check out our Coverage Map.
Can I port-in my existing number to Cape?
Yes, you can switch to Cape and keep your existing phone number.
Yes, you can switch to Cape and keep your existing phone number.
What does privacy have to do with a cell phone network?
In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.In today’s world, cell phones are virtually a requirement for everyday life. We use them to chat with our loved ones, navigate us through our daily commute, photograph our best outfits, and so much more.
All the while, our phones are constantly and silently broadcasting our most intimate data, from our exact location, contents of text messages, and browsing history, to the nearest cell phone tower.
That tower, in turn, is connected to a global network, sharing our personal information with telcos around the world—and landing in the hands of advertisers, governments, authorities, and hackers.
It doesn’t have to be this way. We believe that people should be allowed to stay connected without giving up control of their privacy. Read more here.Can I sign up for Cape?
Who does Cape compete with?
Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.Your existing phone carrier. Your phone carrier collects more data about you and keeps it longer than is necessary to provide good service. They’ve spent a lot of money investing in physical infrastructure, but their legacy software stack hasn’t kept up-to-date with the latest best practices in cryptography and security.
We believe we can offer premium cellular service—you get the same coverage and speeds, but more privacy, more security.What does it mean for Cape to run its own mobile core?
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
A mobile core is the “central nervous system” of a network. It controls policy, logic, and major systems that have evolved over decades to manage the complexity of connecting people moving (often at speed) across network nodes, operators, and countries. Running our own core allows us to control and implement protections over what data enters and leaves your phone. It also allows us to implement modern, expert-vetted cryptography and security protocols to secure your account.
I use VPNs and secure messaging apps. Doesn’t that protect me?
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
We go one layer deeper than a VPN. VPNs and apps encrypt some of your traffic, but they can’t protect you from a broader range of vulnerabilities. Malware can still worm its way onto your phone. The metadata associated with your messages, calls, and texts can remain visible to hackers. Your phone number can be stolen through SIM-jackings or phishing attempts by imposters. And at the mobile operator level, your personal information is still collected, linked to all of your activity, and exposed to compromise. Existing solutions tend to be app-based or device-based, instead of network-based. Many threats and vulnerabilities start at the network level, and that’s where Cape specializes.
Will 911 and other emergency services work?
Yes. Your location will automatically be shared when dialing 911.
Yes. Your location will automatically be shared when dialing 911.
What do I need to sign up for Cape?
All you need is your existing cell phone. Your cell phone must be an iPhone or Android that is carrier unlocked and eSIM compatible. Read here to find out if your device is eligible.
All you need is your existing cell phone. Your cell phone must be an iPhone or Android that is carrier unlocked and eSIM compatible. Read here to find out if your device is eligible.
How does Cape’s spam protection work?
Cape uses real-time AI machine learning technology to proactively fingerprint and block as much as 90% of spam and malicious text messages. Our model learns from a centralized spam database, scores the credibility of both call-back numbers and hyperlinks, and taps into spam reporting services to recognize current and future threats, allowing us to stay one step ahead of would-be fraudsters. Learn more about preventing spam here.
Cape uses real-time AI machine learning technology to proactively fingerprint and block as much as 90% of spam and malicious text messages. Our model learns from a centralized spam database, scores the credibility of both call-back numbers and hyperlinks, and taps into spam reporting services to recognize current and future threats, allowing us to stay one step ahead of would-be fraudsters. Learn more about preventing spam here.
What’s next?
We’re just getting started. We have a robust research team covering leading-edge innovation around network security, new cellular technologies, and emerging cyber and privacy threats. As technologies and attackers evolve, we’re committed to staying one step ahead.
We’re just getting started. We have a robust research team covering leading-edge innovation around network security, new cellular technologies, and emerging cyber and privacy threats. As technologies and attackers evolve, we’re committed to staying one step ahead.
OUR RESEARCH ↗OUR RESEARCH ↗