Only

20

Ghost Phones Remaining (Free US Shipping)

Select from our available color options

Military-Grade Operating System

GrapheneOS — the same system recommended by whistleblowers and security researchers worldwide. Hardened against exploits that work on every normal iPhone and Android.

Surgically Removed: Google

No Play Services. No location pings. No ad tracking. No behavioral prediction. The data pipeline is severed at the root.

Pre-Configured Privacy Apps

Signal, ProtonMail, ProtonVPN, Brave browser, encrypted notes, secure authenticator — installed and ready. You're protected from the first power-on.

Fully Unlocked

Works with most US phone carriers. Bring your own SIM or eSIM and activate immediately with your preferred provider.

Lifetime Security Updates

Receive ongoing GrapheneOS security patches and updates for the lifetime of your device. Your phone stays protected against emerging threats with regular security updates delivered directly to your device.

100% 30-Day Refund Guarantee

Try the Ghost Phone risk-free for 30 days. If you're not completely satisfied, return it for a full refund, no questions asked.

Dear Reader,

Before you read another word, I want you to look at your phone.

It’s nearby, isn’t it? Within arm’s reach. Maybe in your pocket. Maybe sitting on your desk.

But the highest likelihood is that you’re literally staring at it right now reading this letter.

That camera facing you? It’s not off. It’s watching. Reading your facial expressions. Analyzing your micro-movements. Tracking how long your eyes linger on certain words. Measuring your pupil dilation. Cataloging your reactions.

And that microphone? It’s listening. Always listening. Not just when you say “Hey Google” or “Hey Siri.” Always.

Every blink. Every scroll. Every hesitation. Every 2am search you thought was private. All of it is being harvested, packaged, and sold to governments and mega-corporations who don’t see you as a citizen or a customer.

They see you as cattle.

A commodity.

Ready for the digital slaughter.

I need to tell you something. Something I’ve never said publicly. Something that could destroy my career, my family, and possibly even end my life if the wrong people trace this back to me.

My name is Ed Warren. That’s not my real name. I can’t use my real name. You’ll understand why in a moment.

For the past 15 years, I’ve worked as a high level executive consultant for multi-billion dollar mega-corporations and half a dozen 3-letter covert government agencies.

And I don’t mean I worked for them. I mean I still work for them. Right now. Today. As you’re reading this.

I’m not some retired whistleblower writing from a beach somewhere. I’m still inside the machine. I still sit in the meetings. I still see the memos. I still watch what happens to your data after you click “I agree” without reading 47 pages of legal jargon designed specifically so you won’t read it.

I’m writing this from the shadows because I have to.

If my employers found out, I’d be terminated immediately, blacklisted, and even jailed because of the NDAs I’ve signed. If certain government contacts found out, I’d be investigated, surveilled, and likely prosecuted under laws you’ve never heard of. And if the wrong people decided I was a big enough problem, well. Let’s just say there are easier ways to silence someone than a courtroom.

I have a wife. I have kids. I have a mortgage and a life that looks completely normal from the outside.

And I’m risking all of it to write you this letter.

Why?

Because I can’t sleep anymore. Because I know too much. Because every single day, I watch ordinary Americans get stripped of their privacy, dignity, and autonomy, and they have no idea it’s even happening.

Let me tell you what I’ve seen.

I’ve sat in rooms where we discussed how to extract more data from people who had no idea they’d agreed to it. I’ve watched executives laugh about how “privacy policies” get longer every year specifically because they know you won’t read them. I’ve seen what happens to your data after it leaves your phone. Where it goes. Who buys it. What they do with it.

I’ve seen files on people. Exposed. People who thought they had nothing to hide until suddenly they did.

And I’ve seen what 3-letter agencies can request with a single signature. No warrant. No judge. No notification. No trace.

Your phone knows where you sleep. Where you worship. Who you’re sleeping with. How long you stay. What you search for at 2am when you can’t sleep. It knows when you’re at the doctor. It knows when you’re at a protest. It knows when you visit a divorce attorney, an AA meeting, or a place you’d never want your spouse to know about.

Every single data point is one subpoena, one hack, or one “policy update” away from being used against you.

And the people who control this system are counting on you never figuring that out.

Let me tell you about a woman named Rachel.

She reached out to me last year, about six months after her divorce. She was terrified. Shaking. She told me her ex-husband was stalking her, but she couldn’t figure out how.

No one was following her car. No one was hiding in the bushes outside her apartment. But somehow, he knew everywhere she went. Every grocery store. Every friend’s house. Every single time she visited her attorney. He’d show up “randomly” at the same coffee shop. He’d text her asking about a restaurant she’d visited that morning. He knew things he couldn’t possibly know.

She thought she was going crazy. She thought maybe she was imagining it. She started questioning her own sanity.

It took me less than 10 minutes to find the source.

Her phone.

Not some spy app he’d installed. Not malware. Not anything sophisticated or illegal.

Just the default settings on her Android. Location history turned on. Google Timeline running in the background. A shared family account from when they were married that she forgot existed.

She’d been broadcasting her entire life to him. Every move. Every stop. Every minute of every day.

And she had no idea.

Here’s what keeps me up at night: Rachel isn’t unusual. Rachel isn’t some special case.

Rachel is everyone.

Rachel is you.

Right now, your phone is doing the exact same thing. Quietly logging everywhere you go, everyone you meet, everything you do. That data sits on corporate servers in Virginia and Silicon Valley. Servers that can be subpoenaed. Hacked. Sold to data brokers. Handed over to law enforcement without your knowledge.

You are being tracked 24 hours a day, 7 days a week, 365 days a year.

And you’re paying for the privilege. You bought the tracking device yourself. You charge it every night. You carry it into your bedroom, your bathroom, your church, your therapist’s office.

The most sophisticated surveillance apparatus in human history, and you carry it voluntarily.

They didn’t even have to force you.

This is what I’ve helped build. This is what I’ve been part of for 15 years. This is what I see every single day when I go to work and pretend everything is fine.

I can’t pretend anymore.

That’s why I built the Ghost Phone.

It started as a project for myself. A way to communicate with sources and contacts without leaving a trail. A phone that doesn’t ping Google servers every 4 minutes. A phone that doesn’t broadcast my location to anyone with the right access. A phone that actually works the way phones should have worked from the beginning.

A phone that works exactly like the phones real undercover operatives use in the field.

I’m not exaggerating. The same operating system running on the Ghost Phone is used by intelligence officers, federal agents working deep cover, investigative journalists in hostile countries, and whistleblowers whose lives depend on staying invisible. These are people who can’t afford to be tracked. People whose survival depends on going dark.

When an operative needs to move through a city without leaving a digital trail, this is what they carry. When a journalist is meeting a source in a country where that conversation could get them both killed, this is the phone in their pocket. When someone inside a corrupt government needs to get information to the outside world without being traced, this is the tool they trust.

Now imagine having that same level of protection in your hands.

Not because you’re a spy. Not because you’re doing anything wrong. But because you understand something most people don’t: the same technology that protects operatives in the field can protect you from a surveillance system that has completely lost its boundaries.

You don’t need a security clearance to own this phone. You don’t need to work for an agency. You just need to decide that your privacy matters enough to take it back.

Then I started making them for friends. Colleagues who understood what I understood. People inside the industry who wanted one device, just one, that wasn’t spying on them.

And then I realized: why should this just be for insiders? Why should ordinary Americans be denied the same protection that people like me take for granted?

So I decided to do something dangerous. Something that could cost me everything.

I decided to offer it to you.

Now let me make something very clear. Two things, actually.

First: this phone is 100% legal.

There is nothing illegal about owning it. Nothing illegal about using it. The operating system is open-source, publicly available, and recommended by security researchers, journalists, and privacy advocates worldwide. It’s the same system used by whistleblowers, human rights activists, and yes, even some people inside the intelligence community who want their personal devices off the grid.

You’re not breaking any laws. You’re exercising your constitutional right to privacy.

But here’s the thing. And this is important.

3-letter government agencies and data-harvesting mega-corporations don’t want you to know that.

Think about it. If every American discovered they could legally own a phone that doesn’t track them, doesn’t spy on them, doesn’t feed their location and conversations and search history to servers controlled by people who don’t answer to you, the entire surveillance economy collapses overnight. Billions of dollars. Trillions of data points. Entire agencies and departments and corporate divisions. All of it depends on one thing:

You believing you don’t have a choice.

You believing this is just how things are.

You believing that privacy is dead and there’s nothing you can do about it.

That’s a lie. A lie they’ve spent billions of dollars making you believe.

You do have a choice. It is legal. And exercising it is your right as an American citizen.

Second: this phone is not for criminals.

Let me be absolutely clear about this because I know how it might sound.

I didn’t build the Ghost Phone for people running from the law. I didn’t build it for bad actors. I didn’t build it for anyone trying to hide illegal activity.

I built it for people like you.

Privacy-loving patriots who believe, like I believe, like our Founding Fathers believed, that 3-letter government agencies and data-harvesting mega-corporations should not have omnipotent, round-the-clock access to your personal life.

People who understand that “I have nothing to hide” is exactly what they want you to say.

People who know that privacy isn’t about doing something wrong. Privacy is about maintaining your autonomy, your dignity, and your freedom in a world that’s trying to strip all three away from you.

The Fourth Amendment wasn’t written for criminals. It was written for citizens. For Americans who understood that unchecked surveillance is the first step toward tyranny.

That’s who this phone is for.

I don’t know how long I can keep doing this.

Every phone I build is a risk. Every email I send is a risk. Every time I check this anonymous inbox, I wonder if this is the day someone figures out who I am.

My wife doesn’t know. My kids don’t know. My coworkers definitely don’t know. If they did, everything would fall apart.

But I keep doing it because I know what I know. I’ve seen what I’ve seen. And I can’t just sit there and watch it happen to people who have no idea they’re being violated.

You deserve to know.

You deserve a choice.

You deserve at least one device in your life that works for you and only you.

That’s what the Ghost Phone is.

I don’t know how many more of these I can make. I don’t know how long I can stay hidden. I don’t know what happens if this letter reaches the wrong person.

But right now, at the time of writing this, I have 20 phones ready to ship.

And I’m guessing they will be sold out within the first 1-2 hours of me offering this to you.

Just so you understand what goes into this.

It takes me 1-2 hours just to properly set up each one of these phones. Every app. Every setting. Every security configuration. Tested and verified by hand.

But that’s not the hard part.

The hard part is sourcing them. I can’t just order 500 phones to my front door. Given my occupation, that would trigger alarms at every agency and corporation I work with. I’d have some serious explaining to do. So I order them 1-2 at a time. Different addresses. Different names. Cash only. Exposed as little as possible.

It’s tedious. It’s time-consuming. It’s nerve-wracking.

All in all, it took me an entire month to source, acquire, set up, repackage, and create the offering for these 20.

So yes, I add a little extra to offset the opportunity costs, time investment, and fiscal investment to bring this to you. But trust me, it’s not enough to make a dent compared to what it would cost me if I got caught.

If you’ve read this far, you’re probably the kind of person I built this for.

And if you’re ready to take back control, to step off the grid legally and quietly, to own one device that isn’t telling them everything about you, then you will get this phone and keep reading my emails.

I’ll show you exactly what you’re getting.

They’ve spent billions making sure you never find out about this.

I’m here to make sure you do.

— Ed Warren

P.S. You don’t need to up and get rid of your main phone. This phone can be a backup for when SHTF. Some will use it as a backup, others will replace their current phone entirely. The choice is yours.

Real reviews from verified customers

Frequently Asked Questions

Is this legal?

Yes, 100% legal. There is nothing illegal about owning or using this phone. The operating system is open-source, publicly available, and recommended by security researchers, journalists, and privacy advocates worldwide. You’re exercising your constitutional right to privacy.

You certainly can. GrapheneOS is open source code and free. My customers prefer a 15 year veteran in the data collection space to set it up so that nothing is missed. However, you’re free to make your own.

You’ll receive a Google Pixel 7a with GrapheneOS pre-installed and fully configured, a complete suite of privacy apps (Signal, ProtonMail, ProtonVPN, Brave browser, encrypted notes, secure authenticator), and lifetime security updates to keep your device protected against emerging threats.

Yes. The Ghost Phone is fully unlocked and works with most US carriers. Simply insert your existing SIM card or set up an eSIM with your current number and you’re good to go.

That’s exactly why I pre-configure everything. The phone arrives ready to use – just insert your SIM card and power it on. All privacy apps are already installed and configured with optimal security settings. No technical expertise required.

Each phone is configured by hand when you order. I build yours specifically and ship within 48 hours with tracking included.

100% 30-Day Money Back Guarantee. Try the Ghost Phone risk-free for 30 days. If you’re not completely satisfied, return it for a full refund, no questions asked.

The Ghost Phone (Google Pixel 7a) is fully unlocked and compatible with most US carriers including Verizon, AT&T, T-Mobile, and their MVNOs. It supports both physical SIM cards and eSIM.

Claim Mine (Free US Shipping us)

Enter Your Name and Email Below

So I can Rush Your Pixel 7a – Snow to Your Door

Privacy Policy: We hate SPAM and promise to keep your email address safe.

Enter Your Name and Email Below

So I can Rush Your Pixel 7a – Charcoal to Your Door

Privacy Policy: We hate SPAM and promise to keep your email address safe.

Enter Your Name and Email Below

So I can Rush Your Pixel 7a – Sea to Your Door

Privacy Policy: We hate SPAM and promise to keep your email address safe.

Military-Grade Operating System

GrapheneOS is a privacy and security-focused mobile operating system built on Android. It’s recommended by security researchers and whistleblowers worldwide because it’s hardened against exploits that compromise normal smartphones. Unlike standard Android or iOS devices that collect and transmit data constantly, GrapheneOS is designed from the ground up to protect your information. Every component has been audited and reinforced to prevent unauthorized access, making it nearly impossible for hackers, data brokers, or government agencies to breach your device.

Surgically Removed: Google

GrapheneOS is a privacy and security-focused mobile operating system built on Android. It’s recommended by security researchers and whistleblowers worldwide because it’s hardened against exploits that compromise normal smartphones. Unlike standard Android or iOS devices that collect and transmit data constantly, GrapheneOS is designed from the ground up to protect your information. Every component has been audited and reinforced to prevent unauthorized access, making it nearly impossible for hackers, data brokers, or government agencies to breach your device.

Pre-Configured Privacy Apps

Your Ghost Phone arrives with a complete suite of privacy-focused applications already installed and configured: Signal for encrypted messaging, ProtonMail for secure email, ProtonVPN for anonymous browsing, Brave browser for ad-free web access, encrypted note-taking apps, and a secure two-factor authentication app. Everything is set up and ready to use the moment you power on your device. No searching app stores. No configuration headaches. You’re protected from the first moment you use your phone.

Fully Unlocked

Unlike carrier-locked phones that restrict your choices and force you into specific plans, the Ghost Phone is completely unlocked and works with virtually all US carriers. Bring your existing SIM card from Verizon, AT&T, T-Mobile, or any MVNO, insert it, and activate immediately. You can also use eSIM for instant activation. Switch carriers anytime you want. Travel internationally and use local SIM cards. You own the device completely with no restrictions, no carrier bloatware, and no unnecessary pre-installed apps tracking your activity.

Lifetime Security Updates

Regular phones stop receiving security updates after just 2-3 years, leaving you vulnerable to newly discovered exploits and threats. The Ghost Phone receives ongoing GrapheneOS security patches for the lifetime of your device. As new vulnerabilities are discovered and patched, your phone gets updated automatically. You stay protected against emerging threats, zero-day exploits, and sophisticated attack vectors. Security updates are delivered directly to your device over-the-air, ensuring your phone remains as secure on day 1000 as it was on day 1.

100% 30-Day Refund Guarantee

We’re so confident you’ll love the Ghost Phone that we offer a complete 30-day money-back guarantee. Use the phone as your daily driver for an entire month. Test every feature. Experience true privacy. If you’re not completely satisfied for any reason, simply return it within 30 days for a full refund – no questions asked, no restocking fees, no hassle. We handle return shipping. You risk absolutely nothing. This isn’t just a phone purchase; it’s a risk-free trial of what digital privacy should feel like.

Finally, true privacy

I’ve been in tech for 20 years and this is the first phone I’ve owned that I actually trust. The Ghost Phone arrived perfectly configured – Signal, ProtonMail, everything ready to go. No Google. No tracking. No BS. I use it as my primary device now and sleep better at night knowing my conversations and location aren’t being harvested. Worth every penny.

Michael T.

Seattle, WA
November 28, 2024

Perfect for my needs

As a journalist, privacy isn’t optional. I needed a phone I could trust when communicating with sources, and the Ghost Phone delivers exactly that. GrapheneOS runs smooth, the battery life is solid, and I love that everything was pre-configured. No fumbling through settings or wondering if I missed something. It just works, and it works privately.

Sarah K.

Austin, TX
November 25, 2024

Best decision I made this year

I was skeptical at first – $647 seems steep for a phone. But after using it for two weeks, I get it. This isn’t just a phone, it’s peace of mind. My iPhone was tracking everything, sending data to Apple and God knows who else. Now I have a device that actually respects my privacy. The lifetime security updates ensure it stays protected. Highly recommended.

James R.

Denver, CO
November 22, 2024

Setup was seamless

I’m not super tech-savvy, so I was worried this would be complicated. It wasn’t. The phone arrived ready to use – I just inserted my SIM card and I was good to go. All the privacy apps were already installed and configured. The guide explained everything in plain English. If you’re on the fence about GrapheneOS because it seems technical, don’t be. This is the easiest way to get started.

Amanda L.

Portland, OR
November 20, 2024

The privacy I've been looking for

After reading about all the data breaches and surveillance scandals, I knew I needed something more secure. The Ghost Phone is exactly what I was looking for. No Google Services means no constant pinging to their servers. No location tracking. No ads following me around. It’s refreshing to use a phone that actually works for me instead of against me.

David M.

Phoenix, AZ
November 18, 2024

Exceeds expectations

I bought this as a backup phone but ended up making it my primary device. The performance is great – GrapheneOS is faster than stock Android ever was. Apps run smooth, battery lasts all day, and knowing that Google isn’t siphoning my data 24/7 is a huge relief. The 30-day guarantee sealed the deal, but I won’t be returning this. It’s a keeper.

Ryan C.

Tampa, FL
November 15, 2024

Privacy Policy

Last Updated: December 6, 2024

1. Information We Collect

We collect minimal information necessary to process your order and deliver your Ghost Phone:

  • Name and shipping address for product delivery
  • Email address for order confirmation and support
  • Payment information (processed securely through third-party payment processors)

We do NOT collect, track, or store any data from your Ghost Phone after delivery. The device is yours, and we have no ability to monitor or access it.

2. How We Use Your Information

  • To process and fulfill your order
  • To provide customer support
  • To send order confirmations and shipping notifications
  • To comply with legal obligations

We will NEVER sell, rent, or share your personal information with third parties for marketing purposes.

3. Data Security

We implement industry-standard security measures to protect your personal information. All payment processing is handled by PCI-compliant third-party processors. We do not store credit card information on our servers.

4. Data Retention

We retain your order information for the minimum period required by law for accounting and warranty purposes. You may request deletion of your data at any time by contacting our support team.

5. Your Privacy Rights

You have the right to:

  • Access your personal data
  • Request correction of inaccurate data
  • Request deletion of your data
  • Opt-out of marketing communications

6. Third-Party Services

We use trusted third-party services for payment processing and shipping. These services have their own privacy policies and security measures. We encourage you to review their policies.

7. Contact Us

If you have questions about this Privacy Policy or wish to exercise your privacy rights, please contact us at: ed@signalhidden.com

Terms of Service

Last Updated: December 6, 2024

IMPORTANT: READ CAREFULLY

By purchasing and using a Ghost Phone, you agree to these Terms of Service. If you do not agree, do not purchase or use this product.

1. Intended Use

The Ghost Phone is designed and sold exclusively for LAWFUL purposes, including but not limited to:

  • Personal privacy protection
  • Protection from corporate surveillance and data collection
  • Secure communications for legitimate business purposes
  • Protection from identity theft and cybercrime
  • Exercise of constitutional privacy rights

2. Prohibited Uses

YOU EXPRESSLY AGREE NOT TO USE THE GHOST PHONE FOR ANY ILLEGAL ACTIVITIES, INCLUDING BUT NOT LIMITED TO:

  • Any criminal activity whatsoever
  • Drug trafficking or distribution
  • Money laundering or financial crimes
  • Fraud, theft, or embezzlement
  • Terrorism or violent extremism
  • Child exploitation or abuse
  • Human trafficking
  • Hacking, unauthorized access, or cybercrime
  • Any activity that violates local, state, federal, or international law

3. Product Description & Warranty

The Ghost Phone is a Google Pixel 7a smartphone pre-configured with GrapheneOS and privacy-focused applications. It is sold “AS IS” with a standard 30-day manufacturer hardware warranty.

We make no guarantees regarding:

  • Absolute security or privacy (no system is 100% secure)
  • Protection from all forms of surveillance or hacking
  • Compatibility with all carriers or services
  • Third-party applications or services

4. User Responsibility

YOU ARE SOLELY RESPONSIBLE FOR:

  • How you choose to use the device
  • All activities conducted on or with the device
  • Compliance with all applicable laws and regulations
  • Securing your device with strong passwords and security practices
  • Updating software and maintaining device security
  • Any consequences resulting from your use of the device

5. Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, GHOST PHONE AND ITS OPERATORS, EMPLOYEES, AND AFFILIATES SHALL NOT BE LIABLE FOR:

  • Any illegal activities conducted by users
  • Any damages resulting from use or inability to use the product
  • Data breaches, hacks, or security compromises
  • Loss of data, privacy, or confidential information
  • Third-party actions, including government surveillance or legal action
  • Indirect, incidental, consequential, or punitive damages


IN NO EVENT SHALL OUR TOTAL LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT.

6. No Warranty of Privacy or Security

While the Ghost Phone is configured with privacy and security in mind, WE MAKE NO GUARANTEE that the device will protect you from all forms of surveillance, tracking, hacking, or legal action. Privacy and security depend on many factors beyond our control, including your behavior, network security, and third-party actions.

7. Cooperation with Law Enforcement

We will fully cooperate with law enforcement agencies and provide any information requested pursuant to valid legal process, including subpoenas, court orders, and search warrants. We may report suspected illegal activity to authorities.

8. Indemnification

You agree to indemnify, defend, and hold harmless Ghost Phone and its operators, employees, and affiliates from any claims, damages, liabilities, costs, or expenses (including legal fees) arising from your use of the device, violation of these terms, or violation of any law.

9. Refund Policy

Due to the customized nature of the product, all sales are final. Refunds are only available for defective hardware within 30 days of receipt, subject to inspection and verification.

10. Governing Law & Dispute Resolution

These Terms are governed by the laws of the United States. Any disputes shall be resolved through binding arbitration in accordance with commercial arbitration rules. You waive any right to a jury trial or class action.

11. Modifications

We reserve the right to modify these Terms at any time. Continued use of the device after changes constitutes acceptance of modified terms.

LEGAL DISCLAIMER

⚠️ CRITICAL NOTICE - READ CAREFULLY ⚠️

THIS DEVICE IS INTENDED FOR LEGAL USE ONLY

By purchasing this device, you acknowledge and accept all terms, limitations, and disclaimers herein.

1. LAWFUL USE ONLY

The Ghost Phone is sold exclusively for LAWFUL purposes. It is designed to protect the privacy of law-abiding citizens from corporate surveillance, data collection, and cybercrime

THIS DEVICE IS ABSOLUTELY NOT INTENDED FOR, AND MUST NOT BE USED FOR, ANY CRIMINAL OR ILLEGAL ACTIVITIES.

2. NO LIABILITY FOR MISUSE

Ghost Phone, its operators, employees, contractors, and affiliates:

  • ARE NOT RESPONSIBLE for how you choose to use this device
  • ARE NOT LIABLE for any illegal activities conducted with this device
  • CANNOT AND DO NOT monitor, control, or prevent user activities
  • BEAR NO RESPONSIBILITY for any consequences of your actions
  • WILL NOT provide legal defense or assistance for illegal activities

3. NO GUARANTEES OF ABSOLUTE SECURITY

While the Ghost Phone is configured with strong privacy and security features:

  • NO SYSTEM IS 100% SECURE OR PRIVATE
  • We DO NOT guarantee protection from all surveillance or hacking attempts
  • Government agencies with sufficient resources may be able to compromise any device
  • Your security depends heavily on your own operational security practices
  • Network-level surveillance may still capture metadata
  • Physical access to the device can compromise security

4. USER ACKNOWLEDGMENTS

BY PURCHASING THIS DEVICE, YOU ACKNOWLEDGE THAT:

  • You will use the device only for lawful purposes
  • You are solely responsible for all activities conducted on the device
  • You understand that illegal activity is prohibited and may result in prosecution
  • You will not hold Ghost Phone liable for any consequences of your actions
  • Privacy and security require proper operational security practices
  • No device can guarantee absolute privacy or protection from legal action
  • Law enforcement may obtain valid warrants for device seizure or data access

5. LEGAL COMPLIANCE

The sale and use of privacy-focused devices is COMPLETELY LEGAL in the United States and most jurisdictions. However:

  • You must comply with all applicable laws in your jurisdiction
  • Some countries restrict or prohibit encryption technologies
  • You are responsible for understanding and following local regulations
  • Import/export restrictions may apply in certain jurisdictions

6. DISCLAIMER OF WARRANTIES

THIS DEVICE IS PROVIDED “AS IS” WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.

  • We disclaim all warranties regarding device performance, security, privacy, or suitability for any particular purpose.

7. LIMITATION OF LIABILITY

TO THE MAXIMUM EXTENT PERMITTED BY LAW, GHOST PHONE SHALL NOT BE LIABLE FOR ANY DAMAGES WHATSOEVER, INCLUDING BUT NOT LIMITED TO:

  • Criminal prosecution or legal consequences
  • Loss of data, privacy, or confidentiality
  • Security breaches or hacking
  • Government surveillance or investigation
  • Financial losses
  • Personal injury or property damage
  • Indirect, incidental, consequential, or punitive damages


OUR MAXIMUM LIABILITY IS LIMITED TO THE PURCHASE PRICE OF THE DEVICE.

8. THIRD-PARTY SOFTWARE & SERVICES

The Ghost Phone includes open-source software (GrapheneOS) and third-party applications. We are not responsible for these third-party components, their security, privacy practices, or functionality. All third-party software is subject to its own license terms and conditions.

9. RIGHT TO REFUSE SERVICE

We reserve the right to refuse service, cancel orders, or terminate accounts at our sole discretion, including if we suspect potential illegal use or violation of these terms.

10. SEVERABILITY

If any provision of this disclaimer is found to be unenforceable, the remaining provisions shall remain in full force and effect.

FINAL WARNING

This device is a TOOL FOR PRIVACY, not a license to break the law. Use it responsibly and legally. We will cooperate fully with law enforcement regarding illegal activities. Your privacy rights come with personal responsibility.

30-DAY REFUND POLICY

100% Money-Back Guarantee

We stand behind the quality of our Ghost Phones. If you’re not completely satisfied, we’ll make it right.

Our Promise

We will refund your purchase within 30 days, no questions asked, if the device is returned in the same condition as you received it.

That’s our commitment to you.

Refund Requirements

To be eligible for a refund, the following conditions must be met:

  • The device must be returned within 30 days of the original purchase date
  • The device must be in the same condition as when you received it (no physical damage, scratches, or signs of wear)
  • All original packaging, accessories, and documentation must be included
  • The device must be factory reset to its original state
  • You must provide proof of purchase (order confirmation or receipt)

How to Request a Refund

  • Contact us at ed@signalhidden.com with your order number and reason for return
  • We’ll provide you with a return shipping address and instructions
  • Securely package the device with all original contents and ship it back to us
  • Once we receive and inspect the device, we’ll process your refund within 5-7 business days
  • The refund will be issued to your original payment method

Important Notes

  • You are responsible for return shipping costs unless the device is defective or we made an error
  • We recommend using a trackable shipping method with insurance for returns
  • Refunds do not include original shipping costs (if applicable)
  • Devices damaged during return shipping are not eligible for refund
  • This policy applies to devices in resalable condition only

Defective Devices

If your device is defective or malfunctioning, please contact us immediately. We’ll work with you to resolve the issue through repair, replacement, or refund at no additional cost to you. For defective devices, we cover return shipping costs.

Questions about our refund policy? Contact us at ed@signalhidden.com

We’re committed to your satisfaction and privacy. Every interaction is confidential.

Did I run out?

Sign up for our waitlist here! I’ll email you as soon as I’m back in stock.

Privacy Policy: We hate SPAM and promise to keep your email address safe.