Up phone

Competitors

Privacy Focused OS

Custom OS built for privacy

Privacy-first OS built on AOSP, rigorously stripped of Big Tech dependencies

iOS offers strong security and privacy controls but remains tied to Apple’s ecosystem, monetization and data collection practices.

Android Operating System integrated with Google Mobile Services throughout. Prioritizes profiling, data collection and monetization over privacy.

No User Exploitation

No user data exploitation or monetization by design.

Avoids data collection, exploitation, or monetization by design

Limits data collection to improve services but does not monetize user data through ads.

Monetizes user data for advertising and services.

Cybersecurity Built-In

Integrated protection against malware, hacking, and breaches.

Focuses on privacy, user education, secured communication and minimizing data leakage to third parties via browsing and apps

Strong security features like sandboxing (isolating apps) and regular updates, but limited user control and risks with third-party apps.

Offers security tools like Play Protect, but no control over apps data leakage.

Encrypted Data

Encrypts data completely, ensuring it remains inaccessible to third parties.

Provides full encryption for all user data, both in transit and at rest, ensuring maximum security. Fully encrypted hardware and software.

Some metadata, like iCloud backups, might be accessible to Apple or third parties depending on user settings. Uses strong encryption, relying on cloud storage can introduce risks.

Encryption varies by device; reliance on cloud services introduces inconsistencies and potential risks.

Emergency Passcode

Remote Data Wipe. Allows instant phone wipe for emergency protection.

Offers an Emergency Passcode to instantly wipe all data, ensuring total protection in critical situations.

Provides "Erase Data" after 10 failed passcode attempts for local wiping and remote wipe via iCloud.

Remote data wipe via Find My Device. Depends on prior configuration, active connection, and is inconsistent across devices.

Physical Kill Switch

Off means off. Hardware-based kill switch disconnects electronics for security.

Physical Kill Switch that fully disconnects battery from all components like the microphone, camera, and wireless modules.

No hardware kill switch; relies solely on software settings, which lack hardware-level assurance. Some of the device features are still available when the device is turned off.

No hardware kill switch; relies solely on software settings, which lack hardware-level assurance. Some of the device features are still available when the device is turned off.

UP Messenger

Encrypted communication for text, voice, video, and screen sharing.

End-to-End encrypted communication. Available both for iOS and Android users

End-to-end encrypted messages within Apple’s ecosystem.

Google Meetings is preloaded and has end-to-end encrpytion but Google promotes RCS messages that are not end-to-end encrypted.

UP VPN

Built-in VPN with multiple secure protocols.

Offers a built-in VPN with secure protocols and a strict no-logs policy, ensuring maximum privacy. At their own risk, users may download third-party VPN apps.

Supports third-party VPN apps with secure protocols but no native integration; privacy standards vary significantly.

Depends on third-party VPN apps, many of which undermine privacy through data collection or ads.

UP Antivirus

Integrated malware and virus scanner for proactive protection.

Built-in antivirus providing real-time protection, frequent updates, and no reliance on third-party apps or data collection.

Relies on sandboxing and app store guidelines; new requirements now allow easier sideloading of apps, leaving iOS more vulnerable.

Depends on Google Play Protect and third-party apps, both of which have inconsistent privacy standards.

Liberty Firewall

Protects online activity with built-in firewall safeguards.

Includes a built-in firewall that blocks trackers and ads, offering granular control over hardware access (such as camera, location, etc.)

Relies on sandboxing and app permissions; lacks a dedicated firewall and limits third-party app functionality.

Depends on third-party firewall apps, which may introduce privacy risks and vary in effectiveness.

System Updates

Provides timely updates to fix vulnerabilities and improve security.

Delivers timely updates focused on security

Regular updates improve security

Inconsistent updates and support longevity across manufacturers and models

Ad ID

Allows user monitoring and profiling

No Ad ID

Identifier for Advertisers (IDFA) is a unique, random identifier Apple assigns to every iOS device. IDFA is enabled by default and needs to be disabled per app

Ad ID enabled by deafult

Secure Boot

Verifies OS integrity during startup to prevent unauthorized software.

Secure boot establishes a full chain of trust starting from a hardware-protected root of trust to all operating system parts.

Secure Boot ensures that no malicious or otherwise unauthorized software can be run on an iOS device.

Secure boot establishes a full chain of trust starting from a hardware-protected root of trust to all operating system parts, however some models are not imlmeneting it properly

Device Locator

Helps locate lost devices

No built-in locator feature to protect privacy, relying on user-driven security practices.

Best in class lost device locator.

Includes permissions management tools but relies heavily on Ad ID tracking and data collection.

Government Requests for Data

Outlines company policies on data sharing with governments.

Minimal data collection ensures limited information is available for government requests. Notifications are provided when legally permitted.

Complies with legal requests; relies on encryption but may share metadata or unencrypted iCloud data. Notifications depend on jurisdiction.

Regularly complies with government requests; shares significant amounts of user data. Notifications are rare unless required by law.

Privacy Branding

Reflects emphasis on privacy in product design and marketing.

Designed and marketed explicitly for privacy, featuring clear messaging and tools to empower user control.

Highlights privacy features in marketing but integrates deeply with its ecosystem, raising transparency concerns.

Minimal emphasis on privacy in marketing; core business model prioritizes data collection over user privacy.

Open Source

Built on AOSP with privacy-focused modifications; Unplugged is actively working toward greater transparency and plans to release all non prorietary code as an open source

Closed-source system; transparency is limited to Apple's discretion, providing no external audits.

AOSP is open sourced, however only Pixel devices are using it as is officially and some of their code is propreitary and not available. Almost all other devices (for example Samsung, Motorola, etc.) are closed sourced.

Company Longevity

Established in 2021; New company that focuses on addressing modern privacy concerns with innovative solutions.

Founded in 1976; stable and established but only recently emphasizing privacy.

Founded in 1998; extensive experience but heavily reliant on data collection for its business model.

Marketing data collection

Data Collection in Marketing Outreach and Platforms

No user data is collected or used for marketing purposes, ensuring privacy-first outreach.