Appearance
Core Concept: Uplink & Identity Lock
HushCircuits outbound calls rely on a two-leg bridge model.
Why Uplink Exists
Your registered uplink phone number is called first. Only after you answer does the system call the destination.
This prevents direct caller-to-target exposure and keeps bridge control in the middle of the call path.
BRIDGE PROTOCOL
How your call connects securely
📱
YOU
Leg A
1
⟶ We call YOU first
🌐
HUSH
Bridge
2
⟶ Then TARGET
📞
TARGET
Leg B
1
Your phone rings
Answer to connect
2
Bridge established
Secure tunnel active
3
Target called
With your spoofed CID
BRIDGE PROTOCOL: ACTIVE
Identity Lock Behavior
In Settings -> Phone & PIN:
- You register the uplink number.
- You authorize identity lock.
- Phone number is set to locked state until explicit unlock flow.
Unlocking requires PIN challenge and security confirmation.
Caller ID vs Uplink
- Uplink number: where the system reaches you (private anchor).
- Caller ID: what destination sees (manual CID or persona).
These are separate controls by design.