top of page
Frequently asked questions
General
We provide customized solutions designed for you. You are included in the process to ensure you and/or your clientele get what they truly need. We design systems to optimize home internet, and mobile device digital footprints. In the event of an immediate need, we can provide pre-designed kits that include anonymized, pre-configured devices which come standard with essential privacy tools.
Your solution will provide you with a multi-layered shield between you and the public ether. They make getting back some privacy easier. They help you maintain your privacy. The devices and guidebook provide you with the tools you need to start. It's up to you how you implement them and curate your new privacy minded lifestyle.
Products and services are sold to you as conveniences. But "they" found a way to monetize beyond the product sale and the maintenance - they collect your data. Why? well money for one, but it helps curate your experiences with the products and services so they can capture you as a returning customer. It also in many instances can be required by law to hold those providers accountable and in instances assist law enforcement. But that lack of privacy can come at a huge safety and security risk. This is where the privacy lifestyle is best served.
Your privacy lifestyle is looking at the totality of your life through a lens of privacy:
- mobile devices
- social media
- employer
- vehicles
- home internet
- smart devices
- publicly available records
- family and friends
- financial transactions
the list goes on....
For most, starting with a mobile device privacy solution will be a giant gain in your sense of privacy. Couple these kits with the recommendations in our guidebooks and you will be on your way to taking back your privacy.
The emergency device adds another layer of protection for your primary device. When you call 911, that call is recorded, along with any data they can gather from the call - phone number, location, etc. This will forever tie your hardened device to your identity and calls are public record. During an emergency the last thing you want is hesitation to use your primary device because of how much you have worked to keep it secure and not attributed.
Electronic devices "talk" to each other. The last thing you need is your primary device, which you are trying to keep private, co-locating with a "dirty" device. Although your primary device may appear private, a data broker or some other provider can now associate your primary phone to the device that was not optimized for privacy.
If you take your privacy a step more seriously, anytime your device is not in a faraday bag and you risk building out patterns for where your phone (you) go.
Best practices: Keep your primary phone in a faraday bag whenever you don't need to use it. If that's asking a bit too much then just keep your other phones in the bags until they are absolutely needed.
Your solution generally will provide everything you need. The only set-up that is normally required for a digital product is to create accounts for your Apple ID, the mobile service, VOIP Service, E2EE email service, and your encrypted messaging app's if those are apart of your custom solution. This takes the average user approximately 20 minutes after connecting to a public Wi-Fi or their own secure connection.
Our second option is for your solution to come 100% ready to go out of the box. We at ZBRN work with you to create your accounts and have it ready to go upon delivery. You choose your prefered account identifiers and temporary passwords, you agree to Terms & Conditions of the providers, we finish set-up of the devices. We have recognized that some individuals may live in remote areas without readily available public Wi-Fi or their is an exigent need for a product to show up in it's ready state.
bottom of page