Welcome to Purism, a different type of technology company.

We believe you should have technology that does not spy on you.

We believe you should have complete control over your digital life.

We advocate for personal privacy, cyber security, and individual freedoms.

We sell hardware, develop software, and provide services according to these beliefs.

To do all that, we think differently across all areas of business and technology.

Purism Liberty Phone the Most Secure Phone available with Made in USA Electronics

Liberty Phone

A Security & Privacy Focused Phone with a Secure Supply Chain

The Liberty Phone retains the software security and privacy features of the Librem 5 while adding a transparent, secure supply chain with manufacturing in the USA. The Liberty Phone also has 4GB of memory and 128GB built-in storage.

Starting at $1,999

They talk about Purism

Librem 11

A Powerful Tablet with Freedom in Mind

Powerful 4 cores, tablet with AMOLED display, 4096 pressure levels pen and a detachable keyboard. It will let you express your creativity anywhere, anytime.

Shipping with PureBoot (Coreboot +Heads) and PureOS, you make sure that the Librem 11 is fully yours and is respecting your Privacy, Security and Freedom by default.

Starting at $999

Librem 5

A Security & Privacy Focused Phone

The Librem 5 is the original Linux kernel based phone produced by Purism with 3GB of memory and 32GB of storage.

Starting at $799.

Librem 14

Powerful 6 cores, ultra-portable laptop designed chip-by-chip, line-by-line, to respect your rights to privacy, security, and freedom.

Starting at $1370

Librem Mini

Smaller than a Mac Mini, slightly bigger than a Raspberry Pi. More freedom, more privacy, more security.

Starting at $799

Librem AweSIM

Privacy-focused cellular plan for the Librem 5 and other unlocked phones.

Starting at $39/month

Recent Articles

Quantum Safe Private Communications: Building the Future Before the Threat Arrives

Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.

Safety Without Surveillance: Designing Digital Sovereignty for All Ages

In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.

Secret Service Telecom Bust Exposes Cellular Weaknesses

The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.