Cape offers a privacy-focused mobile virtual network operator (MVNO) service for consumers, enterprises, and governments.
Privacy-first mobile carrier Cape announced on Thursday that it has raised $100 million in Series C funding, bringing the company’s total investment to $191 million.
Cape, a privacy-focused mobile virtual network operator (MVNO), has secured Series C funding co-led by Bain Capital Ventures and IVP, with participation from 01 Advisors, 137 Ventures, Definition, and Fifth Down Capital. The investment highlights growing demand for secure mobile communication infrastructure as cyber threats targeting cellular networks continue to rise.
Cape’s platform is designed to address fundamental vulnerabilities in traditional telecom systems by embedding security directly into the network layer. Operating its own mobile core while leasing infrastructure from established carriers, the company delivers secure cellular connectivity across the United States using eSIM technology. This approach enables Cape to reduce exposure to common threats such as device tracking, signal interception, and unauthorized surveillance.
As mobile networks become critical components of enterprise operations and personal communication, they have increasingly become targets for sophisticated cyberattacks. Threat actors often exploit legacy protocols such as SS7 to monitor user locations or intercept communications. Cape’s solution mitigates these risks by implementing network-level protections that block such vulnerabilities, offering a more secure alternative to conventional mobile services.
A key feature of Cape’s platform is the daily rotation of SIM identifiers, which prevents persistent tracking of devices. This capability enhances privacy by ensuring that user activity cannot be easily linked over time. In addition, the platform includes end-to-end encryption for select messaging services, encrypted voicemail, and user-controlled safeguards against unauthorized SIM swaps – one of the most common attack vectors in mobile security breaches.
Cape also introduces flexible identity management through support for multiple secondary phone numbers on a single SIM. This allows users to compartmentalize communications for different purposes, reducing the risk of data exposure across personal and professional interactions. Combined with minimal data retention practices, these features position Cape as a strong solution for users prioritizing privacy and security.
The company’s services are designed for a wide range of users, including individual consumers, enterprises, and government organizations that require enhanced protection against surveillance and data compromise. By addressing vulnerabilities at the infrastructure level rather than relying on applications or add-ons, Cape is redefining how secure mobile networks are built and operated.
John Doyle, CEO of Cape, emphasized the urgency of rethinking telecom security. He noted that traditional cellular networks inherently track user activity, making them highly sensitive targets when compromised. According to Doyle, Cape’s approach focuses on redesigning the telecom architecture itself to close these security gaps and provide a more resilient communication environment.
With increasing awareness of privacy risks and regulatory pressure around data protection, Cape’s funding and technology strategy reflect a broader industry shift toward secure-by-design infrastructure. As mobile communication continues to underpin digital ecosystems, solutions that integrate security at the network level are expected to play a critical role in safeguarding both individual privacy and national security.
Recommended Cyber News :
- Guardsquare Strengthens Mobile Security Platform with Verimatrix XTD Acquisition
- Four Inc. Partners with Quokka to Deliver Actionable Mobile Security Intelligence to the Public Sector
- NowSecure Launches Agentic AI Data Partner Program to Close Mobile Security Visibility Gap
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





