News
5 min read
Beta is over. OneConnect is live
When you're traveling abroad, your phone is your lifeline—and also your biggest liability
Cellular networks were built for interoperability, not privacy. As your phone hops between countries, it connects to local telecom providers so you can keep calling, texting, and using data. But not all networks are secure, and not all governments treat privacy the same. Many have been infiltrated by hackers. And almost all participate in a system that was never designed to protect you.
Cape was built to change that. Our secure global coverage gives you the power of international roaming without exposing your identity or communications. Here’s how we do it—and what we protect you from.
The Risks of Standard Global Roaming
Insider Access at Telecom Networks
It’s widely acknowledged that nation states and hackers have successfully gained access to telecom networks—both large and small—around the world. This isn’t just about remote hacks; it’s about insiders. From state-sponsored attacks like Volt Typhoon and Salt Typhoon to routine abuses of lawful intercept systems, telecom infrastructure has become a powerful surveillance tool. Many networks are owned or operated by foreign governments, giving them direct access to subscriber data. Others have been compromised through social engineering, bribery, or exploitation of third-parties with privileged access.
Once inside, attackers can access a wide range of sensitive information: personal details, message contents, websites visited, real-time and historical location, and records of who you communicate with. In legacy networks, this data exposure is the norm. And when you roam through these networks, your information is at risk.

Header 1 | Header 2 | Header 3 |
|---|---|---|
Cell 1-1 | Cell 1-2 | Cell 1-3 |
Cell 2-1 | Cell 2-2 | Cell 2-3 |
Close Technical Surveillance (CTS)
When you land at an airport, check in at an embassy, or walk past a foreign HQ, your phone is vulnerable to Close Technical Surveillance (CTS). These attacks use false base stations (a.k.a. cell site simulators or “IMSI catchers”) to capture your identifiers. From there, adversaries can track your movements or deanonymize your SIM.
For example: A malicious actor could use a cell site simulator to grab your subscriber ID, or IMSI, as soon as you land. If you're roaming through a major carrier, they can query your home operator using their insider access to identify who you are and where you’re from.
Add a Page with Content
If you wish to add a page instead that will automatically be populated with data from the CMS, navigate to the left panel. One you are in the Pages tab, click on the + button next to the CMS section. If you add the Index page, a page will be added with a list of all of the items in your collection. If you add the Detail page, you will be presented with a page with content from your individual items.
Note: If you chose to add the sample data, a new detail page called /blog will be added to your website, and you will find the stack of content added into the page for you.
The detail page will display content pulled from the first entry of the collection by default. In order to preview other items in the collection, change the content by selecting a different item from the dropdown menu.
