UP Phone Blocks Top-Tier Government Infiltration Tools in Independent Test

UP Phone Blocks Top-Tier Government Infiltration Tools in Independent Test

We make bold claims at Unplugged. 

At Unplugged, we are constantly pushing our technology to new levels. An important part of this is proactively identifying vulnerabilities through real-world simulated attacks on our hardware, our network, and the UnpluggedOS operating system. 

To prove our security claims, we don’t just test—we challenge. Alias Cybersecurity & Forensics recently stress-tested the UP Phone against the same high-level infiltration tools—like Cellebrite and the Magnet AXIOM Ecosystem—used by the military, global intelligence, and law enforcement. The goal was to ensure that customer data remains impenetrable, even against some of the world’s most sophisticated adversaries. 

The result: Without a user’s unique device credentials, the test revealed that UP Phone remains an impenetrable digital fortress. Alias forensic experts were unable to extract any user data, even after deploying a suite of advanced techniques.  

Technical Breakdown: Four Pillars of Assessment 

Alias tested for four different aspects of UP Phone’s security profile:  

1. Forensic Data Extraction 

Alias conducted extensive forensic testing using Cellebrite UFED4PC and Magnet AXIOM—the highest-tier commercial tools widely deployed by law enforcement and government agencies for penetrating and extracting data from physical smartphone devices.  

Multiple advanced techniques were attempted, including:  

  • File System and Physical Extractions   

  • ADB-based methods. ADB stands for Android Debug Bridge. It's a versatile command-line tool within the Android SDK (Software Development Kit), that allows a forensic examiner to communicate with the device, typically through a USB cable, and issue commands to extract data from the device.  

  • APK downgrade techniques. APK downgrade techniques are methods used to install an older version of an application (APK) onto a device that currently has a newer version installed. The primary goal is to revert an application to a previous state that contains known security vulnerabilities. An attacker can exploit vulnerable code to gain access to the device's data.  

  • MediaTek-specific generic profiles. UP Phone is powered by a MediaTek Dimensity chip. Forensics examiners use specific attack approaches to exploit potential vulnerabilities from specific manufacturers.  

  • Generic Android acquisition profiles. In digital forensics, these represent a standardized approach, developed by forensic tools vendors, to extract data from Android devices, particularly when a specific, manufacturer-supported extraction method is unavailable or has failed.  

All extraction attempts were unsuccessful. No user data was recovered. 

2. Network Integrity and Leakage 

Beyond physical extraction, the Alias’ assessment probed UP Phone's network security to identify potential data leakage points. They extensively analyzed network traffic and found no evidence of insecure communication.   

All traffic related to user data was protected by strong encryption, and even VPN connections showed no leakage of session content. UP Phone demonstrated robust transport layer security across the board, with no insecure communication channels identified.   

These results build on Unplugged’s testing with cybersecurity firm Raxis, which proved UP Phone’s effectiveness against third-party trackers. In a side-by-side test using apps like Spotify, TikTok, and LinkedIn, UP Phone blocked 100% of third-party trackers, while iPhone 16 Pro and Galaxy S25 allowed thousands of data harvesting attempts.  

3. Data Protection & Sanitization  

Alias performed a factory reset and completely wiped the device; no residual user data or artifacts could be recovered through logical or non-privileged file system inspection.  

This will have direct bearing on the “Like-New” UP Phones that will soon be available at a lower price point. Every “Like-New" phone is professionally cleaned and sanitized with no cosmetic blemishes. Any data is securely wiped and reset to factory settings, and no data from the previous owner remains on the device.  

4. Firmware and Update Architecture 

Alias found UP Phone’s firmware update mechanisms to be tightly integrated with the UnpluggedOS platform security controls. 

Key observations included:  

  • Firmware and application updates are mediated exclusively through privileged system services and executed by protected processes under strict signature validation  

  • The device uses Android’s A/B seamless Over-The-Air (OTA) update model, orchestrated by the update engine and privileged system services.  

  • High-trust permissions are restricted to privileged components such as the  Unplugged Store application, which is installed as a priv-app and signed with platform keys.  

No evidence was found of:  

  • Acceptance of unsigned firmware  

  • Unauthorized rollback / downgrade acceptance  

  • Trivial bypass of update protection  

Conclusion 

Unplugged’s mission is not just to defend your digital data, but to make a smartphone that actively fights for your privacy and digital rights. The Alias report confirms that UP Phone delivers its promise of provable, hardware-backed security.   

UP Phone isn’t just another smartphone; it’s a purpose-built digital fortress designed for real-world adversaries. It delivers verifiable confidence to customers that their data will stay in their hands only, no matter how sophisticated the attack.  

Why Alias? Industry-leading Cybersecurity Professionals  

Alias’s deep industry experience and reputation combined with their use of state-of-the-art equipment and processes made them a natural choice for Unplugged.   

Alias is backed by:   

  • 4,100+ forensic investigations completed  

  • 1,950+ data recovery cases  

  • 3,200+ court cases supported with expert witness testimony and research  

  • Trusted by: law firms, Fortune 500 corporations, state & local governments, federal agencies  

  • Routinely contracted by high-ranking government agencies  

  • Utilizes the latest methods and tools  

  • Court-qualified expert witnesses: Findings hold up under legal scrutiny and cross-examination  

  • Certified digital forensics experts with 30+ years combined experience