Services
Option 1: You can purchase new custom-private devices from us like a private computer, phone, GPS, internet, key-locked hard drive, jammer-bag…
OR Option 2: you can hire us to help you secure your existing devices, like iPhone, Android, Windows, Mac, WiFi, etc.
For a long time we have acted as if we are all safe online without having to do anything. But truth is, just like in real life at some point in our civilization we realized we ought to put a door on our house, instead of having an open entry. Then we realized we should probably also put a lock on there so not everyone could just come in at will. Now, we have to do the same, digitally.
Put a lock on your digital doors.
At R6S, we want to be transparent and upfront about our approach to privacy and security. Here’s what you should know before partnering with us:
1. Collaboration with the Community
- We don’t create or develop everything we recommend – instead, we focus on open-source options that allow us (and other experts) to examine the underlying code and ensure safety/security.
- Working together with a global network of security/privacy professionals keeps things up-to-date and improving constantly.
- Although we carefully vet gear and chip in to open-source initiatives ourselves, there’s a broader history of folks doing similar work before us. Corporations sometimes mislead and aren’t as dependable as peer reviews/inspections. Open-source is more reliable since everyone has equal opportunity to verify integrity.
2. The Power of Collective Innovation
- Our journey towards enhanced privacy starts by creating solutions for ourselves.
- We share these solutions with the world and invite feedback from people globally.
- Through this collaborative effort, individuals from diverse backgrounds contribute to refining and improving the code.
- As others build upon this foundation, the result is a robust combination of hardware and software that evolves with collective knowledge and expertise.
3. Rigorous Inspection and Approval
- Rest assured, the solutions we present to you are the result of thorough inspections and testing.
- We carefully assess and verify the hardware and software components before incorporating them into our offerings.
- Our stamp of approval signifies that these solutions meet our high standards for privacy and security.
At R6S, our role is to curate and bring together the best privacy solutions available, backed by a global community of experts. We are committed to safeguarding your digital life with cutting-edge technologies and continuous advancements. Your privacy is our priority, and we are here to guide you toward a safer online experience.
Partner with us today and take control of your digital privacy with confidence!

#1
Private Phone
We have done thousands of hours of research as a team and have put together a recipe that we use ourselves for our own privacy. What we recommend to our own family members is what we recommend to you.
We call our private phones X. X is built with an open-source operating system installed on a cleanly wiped device. X is customized and optimized for improved security and privacy out of the box.
- Security focus: X emphasizes security at every level, implementing advanced encryption techniques and access controls to ensure users retain full control over their device and personal data.
- Privacy protection: By default, X blocks third-party trackers and ads, ensuring users enjoy an uncluttered online experience without compromising their privacy.
- App jails: Each app runs in its isolated environment, preventing unauthorized access to sensitive data stored elsewhere on the device. In your phone, if someone send you a bad link in your text messages, they could access your photos or emails for example. In X, every app has its own virtual jail to isolate even if there was to be a potential threat.
- A modern smart phone: From high quality camera to playing music, this is a modern smart phone; meaning virtually anything you would normally do on your regular phone you can do on here too, but a lot more privately. X just won't let you do the things that would compromise your privacy.
- Regular updates: X receives regular security patches and feature enhancements to keep pace with evolving threats and technological advancements.
- Offline backup are avaialble and recommended since "Cloud" basically means your data would be backed up on someone else's computer. We think you should hold on to your own data rather than turning it over to big tech giants for free for them to use it against you.

#2
Private Laptop
We wanted to build a laptop that we could do everything we would normally do, but just privately. We spent years testing and building on top of what we could find as the best solutions available. We are proud to have something we all use internally daily as our main laptops and it virtually has no shortcomings even for power users like us.
We call our private laptops Y. Y is built with an open-source operating system installed on a cleanly wiped device. Y is simple to use, customized and optimized for improved security and privacy out of the box.
- It has Word, Excel, Power Point, and all the other document suite that you would expect from Microsoft Office or Google Docs, except all the spying and snooping stuff. We use all open source software and inspect it to make sure there is no funny business going on. After all if you are writing your lawyer a letter, the whole world doesn't need to be looking over your shoulder.
- By default, all your internet traffic would be going through the encrypted and open source TOR Network for maximum privacy.
- Your browser is by default as tight at it can be, without breaking the functionality of your website. We try our best to take all the steps to mask your digital finger print and disable all the ways we can think that anyone but you could track your activities on your laptop.
- Open source nature: Like X, Y is based on the open-source operating systems. Being open source ensures that the code is publicly available for review and modification by the community, leading to increased transparency and accountability. Additionally, this transparent development process helps prevent backdoors or other hidden vulnerabilities that might exist in proprietary solutions like Mac and Windows.
- Security focused features: Y includes numerous tools designed to fight against hacking, survailance, digital forensics, and reverse engineering tasks. These utilities often overlap with areas relevant to privacy and security, such as password cracking, memory analysis, and network monitoring. Having these capabilities integrated within the machine itself can help users stay ahead of potential threats and safeguard sensitive information.
- Fine-grained program/software management: Unlike Mac and Windows, which typically bundle software components together in monolithic packages, Y uses the package manager that transparently show you what part of the code is being updates with what new code. This permits users to selectively install only the necessary stuff required for specific purposes, rather than installing entire suites or bundles containing unnecessary programs. This level of control can help reduce attack surface and limit opportunities for malware or spyware injection. With Mac and Windows updates or install, you only see a progress bar from 0 to 100% but you never know what they are doing to your machine and what they are changing or collecting. With Y, you can clearly see everything and can inspect it if you understand code, or hire an independent programmer off of Fiverr or other places to independently verify.
- Strong cryptographic support: ParrotOS provides various tools for generating, managing, and using strong encryption keys and certificates. For example, the OpenPGP suite of command line utilities can be employed to create and exchange encrypted messages and authenticate digital signatures between correspondents.
- Extensive documentation: Given its target audience of cybersecurity and privacy enthusiasts, Y maintains comprehensive documentation covering topics ranging from basic functionality and to advanced techniques.
- Regular updates: X receives regular security patches and feature enhancements to keep pace with evolving threats and technological advancements.

#3
Private Internet and WiFi
At non dui maecenas nulla imperdiet mi libero, arcu aenean enim tempor pharetra tellus fames amet.
Your Current Internet Isn’t Safe Enough…
- Your browsing history, location data, and personal details are being collected and sold to third parties by ISPs, phone companies, and search engines.
- Government agencies can legally monitor your online activities without a warrant.
- Hackers may be watching your online activity through public Wi-Fi connections, like a hotel or Starbucks.
Fear not, R6S has the Solution!
#1) Mobile Internet Solution:
- Stay private while traveling or commuting.
- Military-grade encryption protocols and advanced algorithms keep your data secure.
- Sensitive data remains encrypted and hidden from potential threats.
#2) Option 2: Secure Your Home and Office Networks:
- State-of-the-art firewall and encryption technologies for residential and commercial environments.
- Powerful network firewall blocks unauthorized access attempts.
- Endpoint protection secures each device on your network.
- Data encryption ensures sensitive information remains safe.
- Regular updates and monitoring keep your system secure.
- User-friendly interface for easy management and support.
- Compatibility assessment ensures minimal disruptions.data remains encrypted and hidden from potential threats.
- Remote access controls prevent unauthorized connections.
- Guest network isolation keeps your network secure from guests' activities.
- Patch management and router firmware updates to minimize risks.
- Device hardening optimizes each unit's security.
- VPN implementation for secure communication channels.
Upgrade now and safeguard your digital life with R6S!
The Latest from The Classified
I cover topics that you would care about around privacy, security, crypto, politics, freedom, finance, asset protection, anonymity, etc. Take a look and know the latest and greatest things happening in the space by signing up for my news alerts, The Classified.

Mac or Windows? Neither!
Did you know you could throw your Mac and Windows away and instead use a custom private Linux and you would never know the difference? Upgrade today!

iPhone or Android? Neither!
It is obvious that iPhones and Androids both listen to you and spy on you. Did you know you have a third option? A private custom made modern AOSP phone.

Your Phone Company Spies!
Verizon, AT&T, T-Mobile, Spectrum, Charter, Comcast, Dish, Cox, and all the others spy on us, collect our data, and sell it or use it against us. We can outsmart them.