Appearance
Core Concept: Uplink & Identity Lock
To understand how HushCircuits protects you, it's essential to grasp the "Uplink Protocol" and the concept of a locked identity. This is the first and most important step to using the platform.
The Uplink Protocol: Your Secure Anchor
Before you can make your first outbound call, you must establish a secure "uplink" with our system. This involves registering your real phone number with us.
Why is this necessary?
Our system protects you by never connecting you directly to your target. Instead, as the Call Flow Diagram shows, we follow a two-step process:
- Our server calls YOU first. This is the "uplink."
- Once you answer, our server then calls your TARGET.
This "bridge" ensures your device never makes direct contact with the target's device, making it impossible for them to trace your real number or location. Your registered number is your secure anchor point for us to connect to, and it is never revealed to your call recipients.
The Identity Lock
For security reasons, once you set your uplink phone number and a 6-digit PIN for the first time, your identity is considered "locked."
- What it means: Your uplink phone number cannot be easily changed. This is a security feature to prevent unauthorized takeovers of your account.
- How to change it: To change a locked number, you must go through a secure override process that involves using your PIN. This is documented in the Phone & PIN Settings page.
This one-time setup is a critical part of ensuring the integrity and security of your account and all future communications.