Unplugged’s UP Phone

Even Experts Can't Break Into UP Phone

Building on open-source Android foundations wasn't enough.

We put our UP Phone to the ultimate test with third-party experts.

The results?

Proven protection against the same extraction tools used by government agencies, private firms, and criminal attackers to break into phones and access personal data.

In a world where your smartphone holds your most sensitive information—messages, photos, contacts, and identity—we partnered with Alias Cybersecurity to simulate real device-seizure scenarios. Their evaluation confirms UP Phone resists industry-standard forensic attacks, delivers military-grade network encryption, and provides independently verified security you can trust.

Verified by Experts

Meet Alias Cybersecurity

Trusted by high-ranking government agencies, law firms, and corporations.

Founded in 2010

Alias Cybersecurity has more than 15 years of experience in cyber-attack prevention, detection, and response. Their professionals have handled thousands of engagements for high-ranking government agencies and leading Fortune 500 and private companies. Serving as court-qualified expert witnesses, Alias delivers findings and testimony proven to hold up under intense legal scrutiny and cross-examination.

4,100+

forensic investigations

1,950+

Data Recovery Cases

3,200+

court cases

Alias used the same industry-leading tools (Cellebrite and Magnet AXIOM) deployed by law enforcement to test the UP Phone - ensuring third-party verified security you can rely on.

The Results

Unmatched Protection in Every Scenario

Trusted by high-ranking government agencies, law firms, and corporations.

Forensic Resistance

The UP Phone blocked every attempt to pull data from a locked device using Cellebrite and Magnet AXIOM - no file system, physical, or advanced bypass succeeded without your password.

  • All major methods (File System, Physical, ADB, APK downgrade, MediaTek profiles) failed.
  • This goes beyond standard Android hardening - your data remains truly inaccessible.
Secure network

Packet captures during normal use, browsing, VPN sessions, and updates showed zero plaintext or leaky traffic. Everything is protected with strong TLS and WireGuard.

  • No insecure protocols (HTTP, FTP, etc.) detected.
  • Full encryption means your communications stay private, even on public networks.
Effective sanitization

After a standard factory reset, Alias could recover nothing - no messages, photos, metadata, or app remnants.

  • Logical and file system checks confirmed a clean wipe.
  • In a lost or seized device, your data is gone for good.
Update resilience

Firmware updates are locked down tight; no unsigned packages, no unauthorized downgrades, strict signature checks via Android's A/B OTA model.

  • Privileged system services handle everything securely.
  • No bypasses or weaknesses found under realistic conditions.

Additional testing and forensic evaluations are underway, with more findings coming soon.

What this means for you

Real-World Protection

Against Real-World Threats

These aren't just test results; they're proof that the UP Phone delivers on its security promises. Here's what these findings mean in practical terms:

Device Seizure

If your UP Phone is confiscated at a border crossing, during an investigation, or in any seizure scenario, your data remains inaccessible. Professional forensic tools cannot break in.

Network Surveillance

Whether you're on public WiFi, using cellular data, or accessing sensitive information, your communications cannot be intercepted or read. All traffic is encrypted end-to-end

Device Resale or Loss

When you factory reset your UP Phone before selling it or after losing it—your data is truly gone. No forensic recovery tools can bring it back.

How Forensic Tools

Crack Locked Smartphones

Cellebrite and Magnet AXIOM are the go-to tools for law enforcement, governments, and hackers to access your private data - even on locked devices.

Newer Android and iOS models can take days or weeks to crack, but older or vulnerable smartphones fall in hours, or even minutes. These tools are used thousands of times daily worldwide to extract everything from your device.

  • Encrypted messages from apps like Signal, WhatsApp, and Telegram - made fully readable.
  • Deleted photos, videos, calls, and texts - recovered as if they never left.
  • Browsing history, passwords, bank details, and financial data - exposed.
  • GPS location history, contact lists, email accounts, and app data (social media, health records, etc.) - all accessible.
  • Even 'permanently deleted' files - pulled back from the void.

If your phone is unlocked or compromised, encryption means nothing. That's why we designed the UP Phone's security architecture to resist these exact forensic tools.