Welcome to Purism, a different type of technology company.

We believe you should have technology that does not spy on you.

We believe you should have complete control over your digital life.

We advocate for personal privacy, cyber security, and individual freedoms.

We sell hardware, develop software, and provide services according to these beliefs.

To do all that, we think differently across all areas of business and technology.

Purism Liberty Phone the Most Secure Phone available with Made in USA Electronics

Liberty Phone

A Security & Privacy Focused Phone with a Secure Supply Chain

The Liberty Phone retains the software security and privacy features of the Librem 5 while adding a transparent, secure supply chain with manufacturing in the USA. The Liberty Phone also has 4GB of memory and 128GB built-in storage.

Starting at $1,999

They talk about Purism

Librem 11

A Powerful Tablet with Freedom in Mind

Powerful 4 cores, tablet with AMOLED display, 4096 pressure levels pen and a detachable keyboard. It will let you express your creativity anywhere, anytime.

Shipping with PureBoot (Coreboot +Heads) and PureOS, you make sure that the Librem 11 is fully yours and is respecting your Privacy, Security and Freedom by default.

Starting at $999

Librem 5

A Security & Privacy Focused Phone

The Librem 5 is the original Linux kernel based phone produced by Purism with 3GB of memory and 32GB of storage.

Starting at $799.

Librem 14

Powerful 6 cores, ultra-portable laptop designed chip-by-chip, line-by-line, to respect your rights to privacy, security, and freedom.

Starting at $1370

Librem Mini

Smaller than a Mac Mini, slightly bigger than a Raspberry Pi. More freedom, more privacy, more security.

Starting at $799

Librem AweSIM

Privacy-focused cellular plan for the Librem 5 and other unlocked phones.

Starting at $39/month

Recent Articles

Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene

On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.

From Typhoon to Action: A Purism Playbook for Hardening Your Defenses

When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence.

Apple’s Latest iPhone: Sleeker Walls, Same Garden

Yesterday, Apple unveiled the latest iPhone lineup adding an iPhone Air — described by them as their thinnest, lightest yet. The headlines were predictable fanfare while missing the larger points.