Privacy-first OS built on AOSP, rigorously stripped of Big Tech dependencies
❌
iOS offers strong security and privacy controls but remains tied to Apple’s ecosystem, monetization and data collection practices.
❌
Android Operating System integrated with Google Mobile Services throughout. Prioritizes profiling, data collection and monetization over privacy.
No User Exploitation
No user data exploitation or monetization by design.
✅
Avoids data collection, exploitation, or monetization by design
❌
Limits data collection to improve services but does not monetize user data through ads.
❌
Monetizes user data for advertising and services.
Cybersecurity Built-In
Integrated protection against malware, hacking, and breaches.
✅
Focuses on privacy, user education, secured communication and minimizing data leakage to third parties via browsing and apps
❌
Strong security features like sandboxing (isolating apps) and regular updates, but limited user control and risks with third-party apps.
❌
Offers security tools like Play Protect, but no control over apps data leakage.
Encrypted Data
Encrypts data completely, ensuring it remains inaccessible to third parties.
✅
Provides full encryption for all user data, both in transit and at rest, ensuring maximum security. Fully encrypted hardware and software.
❌
Some metadata, like iCloud backups, might be accessible to Apple or third parties depending on user settings. Uses strong encryption, relying on cloud storage can introduce risks.
❌
Encryption varies by device; reliance on cloud services introduces inconsistencies and potential risks.
Emergency Passcode
Remote Data Wipe. Allows instant phone wipe for emergency protection.
✅
Offers an Emergency Passcode to instantly wipe all data, ensuring total protection in critical situations.
✅
Provides "Erase Data" after 10 failed passcode attempts for local wiping and remote wipe via iCloud.
❌
Remote data wipe via Find My Device. Depends on prior configuration, active connection, and is inconsistent across devices.
Physical Kill Switch
Off means off. Hardware-based kill switch disconnects electronics for security.
✅
Physical Kill Switch that fully disconnects battery from all components like the microphone, camera, and wireless modules.
❌
No hardware kill switch; relies solely on software settings, which lack hardware-level assurance. Some of the device features are still available when the device is turned off.
❌
No hardware kill switch; relies solely on software settings, which lack hardware-level assurance. Some of the device features are still available when the device is turned off.
UP Messenger
Encrypted communication for text, voice, video, and screen sharing.
✅
End-to-End encrypted communication. Available both for iOS and Android users
✅
End-to-end encrypted messages within Apple’s ecosystem.
❌
Google Meetings is preloaded and has end-to-end encrpytion but Google promotes RCS messages that are not end-to-end encrypted.
UP VPN
Built-in VPN with multiple secure protocols.
✅
Offers a built-in VPN with secure protocols and a strict no-logs policy, ensuring maximum privacy. At their own risk, users may download third-party VPN apps.
❌
Supports third-party VPN apps with secure protocols but no native integration; privacy standards vary significantly.
❌
Depends on third-party VPN apps, many of which undermine privacy through data collection or ads.
UP Antivirus
Integrated malware and virus scanner for proactive protection.
✅
Built-in antivirus providing real-time protection, frequent updates, and no reliance on third-party apps or data collection.
❌
Relies on sandboxing and app store guidelines; new requirements now allow easier sideloading of apps, leaving iOS more vulnerable.
❌
Depends on Google Play Protect and third-party apps, both of which have inconsistent privacy standards.
Liberty Firewall
Protects online activity with built-in firewall safeguards.
✅
Includes a built-in firewall that blocks trackers and ads, offering granular control over hardware access (such as camera, location, etc.)
❌
Relies on sandboxing and app permissions; lacks a dedicated firewall and limits third-party app functionality.
❌
Depends on third-party firewall apps, which may introduce privacy risks and vary in effectiveness.
Ad ID
Allows user monitoring and profiling
✅
No Ad ID
❌
Identifier for Advertisers (IDFA) is a unique, random identifier Apple assigns to every iOS device. IDFA is enabled by default and needs to be disabled per app
❌
Ad ID enabled by deafult
Device Locator
Helps locate lost devices
❌
No built-in locator feature to protect privacy, relying on user-driven security practices.
✅
Best in class lost device locator.
❌
Includes permissions management tools but relies heavily on Ad ID tracking and data collection.
Open Source
❌
Built on AOSP with privacy-focused modifications; Unplugged is actively working toward greater transparency and plans to release all non prorietary code as an open source
❌
Closed-source system; transparency is limited to Apple's discretion, providing no external audits.
❌
AOSP is open sourced, however only Pixel devices are using it as is officially and some of their code is propreitary and not available. Almost all other devices (for example Samsung, Motorola, etc.) are closed sourced.
Marketing data collection
Data Collection in Marketing Outreach and Platforms
✅
No user data is collected or used for marketing purposes, ensuring privacy-first outreach.
Choosing a selection results in a full page refresh.