Ops Dashboard
lawless.ops · personal command center
Dashboard
S26 Ultra — Not Activated Ops: 2026-03-31
📊 Command Center
S26 Ultra setup · Privacy infrastructure · Mobile command center
0
Actions Completed
0 of 0 tasks
3
Urgent Purchases
Cape · Starlink · YubiKey
~$165
Est. Monthly Cost
Under $200 target ✓
$1,750
Revenue @ 50 clients
VPN + ZTNA add-ons
📋 Phase Progress
Track setup phases. Click any phase to jump there.
📱 Carrier Selection
0%
🛰 Starlink
🔒 Phone Hardening
0%
🛡 VPN + ZTNA
0%
💻 Mobile Dev
0%
🔐 Privacy Platform
0%
⚡ Immediate Actions (Do These First)
1. Contact Cape enterprise sales — confirm LLC registration under Legendary Pathway LLC (EIN 93-3911234) before activating
2. Order Starlink Mini at starlink.com — $249 hardware, activate Roam 100GB when traveling
3. Order 2× YubiKey 5C NFC from yubico.com — ~$110 total
4. Create Mullvad account — pay with Monero or prepaid Visa cash card, no email needed
💰 Monthly Cost Breakdown
ServiceProviderMonthlyNotes
Line 1 — VerificationCape$99All-in, includes 2 secondary SMS lines, IMSI rotation
Line 2 — CommunicationLP Secure / Twilio$15–30Usage-based VoIP; already built
StarlinkSpaceX$5–50$5 standby (home) / $50 Roam 100GB (travel)
VPNMullvad~$6EUR 5/mo, no account, cash/Monero accepted
ZTNATwingate$0Free tier (5 users, 10 networks) — sufficient for now
TOTAL~$125–185Well under $200/month target
📱 Carrier Selection — Line 1
The verification line. Banks, crypto, government. Never given to humans.
✅ Recommendation: Cape ($99/month)
The only US carrier that owns its own mobile core with daily IMSI rotation — your SIM identity changes every 24 hours, making persistent tracking statistically difficult. Includes 2 free secondary SMS/MMS lines (assign one to banks, one to crypto). Just raised $100M Series C (March 2026), 31 government contracts including US Navy trials.
ℹ️ Critical Context — VoIP vs. Real Carrier
70–80% of financial institutions reject VoIP numbers for SMS 2FA. Wells Fargo, Chase, Coinbase, Kraken, Binance all block VoIP for verification. You MUST have at least one real carrier number. Line 1 is that anchor — it only receives bank codes and is never given to any human.

Decision Matrix

OptionMonthlyPrivacyReliabilityCoverageBusiness Entity?Pay Anon?
Phreeli $25–85
7/10
4/10
T-Mobile
ZIP only Monero accepted
Visible (Verizon) $25–45
3/10
9/10
Verizon
LLC + EIN No
Cash Prepaid
TracFone/Walmart
$10–25
7/10
6/10
Varies No name needed Cash at Walmart
Mint Mobile
T-Mobile MVNO
$15–45
4/10
8/10
T-Mobile
LLC + EIN No

Why Not Phreeli?

Phreeli launched December 2025 — only ~4 months old. Privacy Guides documented that their "Double-Blind Armadillo" marketing overstates the actual implementation. No long-term reliability track record. Nicholas Merrill (founder of Calyx Institute) has credibility, but the product isn't there yet for a critical verification line. Revisit in 12 months.

Cape — Activation Checklist

  • Contact Cape enterprise sales Email enterprise@cape.co — confirm Legendary Pathway LLC registration (EIN 93-3911234). Ask about LLC business account, avoid SSN requirement.
    URGENT
  • Buy a prepaid Visa gift card with cash Target/Walmart — $120 or higher. Use this to pay for Cape (they process via Stripe). Avoids personal card linkage to Cape account.
    HIGH
  • Create Cape account at cape.co No name or address required at signup. Provide minimum information. Use Legendary Pathway LLC entity details if enterprise account is available.
    HIGH
  • Download Cape app from Google Play Install on S26 Ultra. Do this AFTER completing privacy hardening (Part 3).
    MED
  • Activate Cape eSIM via QR code Settings → Connections → SIM card manager → Add mobile plan. Label it "Verification". Set to calls + SMS only (not data).
    MED
  • Activate two secondary SMS/MMS lines in Cape app These are free. Assign: Secondary Line A → banking institutions. Secondary Line B → crypto/brokerage. Primary line stays clean.
    MED
  • Test bank SMS verification with Cape Line 1 Log in to each financial institution and verify a code arrives via Cape number. Document any rejections.
    MED
  • Fallback plan if Cape business registration fails Buy a TracFone SIM (Verizon-backed) with cash at Walmart. ~$15/month. Verification-only line, no identity linkage if purchased with cash + gift card.
    LOW
🔢 Number Assignment Strategy
Which number goes where. Never mix these up.
📐 The Rule
Cape Line 1 = financial codes only. Cape secondary lines = more financial codes. Twilio via LP Secure = every human you ever communicate with. These never cross.
Number Map
PurposeNumberTypeNotes
Banks, credit unionsCape Line 1 PrimaryReal carrierChase, Wells Fargo, local banks
Crypto, brokerageCape Secondary Line AReal carrierCoinbase, Kraken, Fidelity, etc.
Government / IRS / legalCape Line 1 PrimaryReal carrierSame as banking
All human communicationLP Secure Twilio #1VoIPPrimary number people call you on
LP admin / client portalLP Secure Twilio #2VoIPDedicated to LP business ops
Temporary / one-timeLP Secure burnerVoIP rotatingRotate after use
⚠️ The IMEI Reality
Cape can rotate your IMSI (SIM identity) daily — but your phone still broadcasts its IMEI (hardware identity) to every tower. No carrier, MVNO, or privacy service can hide your IMEI from the network without hardware modification. This is the hard ceiling of carrier-level privacy. Accepting it is part of the model.
🔒 Phone Hardening — One UI 8
GrapheneOS isn't compatible with the S26 Ultra (Pixel-only). Maximum hardening on Samsung Knox.
⚡ Do This Before Inserting Any SIM
Complete the OS hardening on a fresh device before activating any carrier line. If already set up, factory reset and start clean — worth the hour.

Phase A — Neutralize Perplexity & Galaxy AI

  • Disable Galaxy AI cloud processing Settings → Advanced Features → Advanced Intelligence → toggle OFF at top level. If no master toggle: disable Circle to Search, Live Translate, Chat Assist, Note Assist, Transcript Assist, Photo Assist, Interpreter individually.
    FIRST
  • Disable Bixby Settings → Apps → Bixby → Disable. Then: Settings → Advanced Features → Side Key → change long press to "Open app → Claude".
    FIRST
  • Restrict Perplexity (cannot fully uninstall) Settings → Apps → Perplexity → App Info → Disable (if available). If grayed out: deny ALL permissions + Settings → Apps → Perplexity → Mobile data and Wi-Fi → disable both.
    FIRST
  • Install Claude and set as default assistant Google Play → Claude → install. Then: Settings → Apps → Default Apps → Digital Assistant App → Claude. No third-party app needed — native Android path works.
    FIRST

Phase B — OS Privacy Settings

  • Delete Advertising ID Settings → Privacy → Ads → Delete advertising ID. This removes the ID entirely (not just opt-out).
    HIGH
  • Disable Samsung analytics/diagnostics Settings → Privacy → Samsung Privacy → disable Customization Service. Settings → General Management → Diagnostic data → disable.
    HIGH
  • Restrict location to deny-all default Settings → Location → off. Settings → Location → Improve accuracy → Wi-Fi scanning: OFF, Bluetooth scanning: OFF. Grant location to navigation apps only when actively using.
    HIGH
  • Lockdown all app permissions Settings → Privacy → Permission manager. Camera: deny all except Camera app. Microphone: deny all except Phone + LP Secure. Contacts, Files, Sensors: deny all third-party.
    HIGH
  • Disable passive network tracking Bluetooth: off when not in use. NFC: off when not at payment terminal. Wi-Fi auto-connect: off. Settings → Connections → Wi-Fi → Intelligent Wi-Fi → disable all.
    HIGH
  • Set Private DNS to Quad9 Settings → Connections → More connection settings → Private DNS → "Private DNS provider hostname" → dns.quad9.net. (Overridden by Mullvad when VPN is active.)
    MED
  • Set up Android 16 Private Space Settings → Security and privacy → Private Space. Create with separate PIN. Install here: LP Secure PWA, Aegis, all banking apps, all crypto apps. Main profile = minimal.
    MED
  • Disable Find My Mobile Settings → Biometrics and security → Find My Mobile → Off. Samsung can remotely track + wipe when enabled. Remote wipe isn't worth the tracking risk.
    MED

Phase C — Authentication

  • Order 2× YubiKey 5C NFC from yubico.com ~$55 each = $110 total. One primary, one backup stored securely. USB-C for desktop + NFC tap for S26 Ultra (hold to center back of phone).
    BUY
  • Install Aegis Authenticator F-Droid or Google Play. Open source, offline, no cloud sync. Set vault PIN. Enable encrypted backup → export to 1Password. Use for all TOTP codes.
    HIGH
  • Register YubiKey on Google account + 1Password + LP portal Google: myaccount.google.com → Security → 2-Step Verification → Security key. Register the backup key too before relying on the primary.
    HIGH
  • Set device unlock to strong alphanumeric passphrase Settings → Biometrics and security → Screen lock → Password (not PIN). Use a passphrase (4+ words or random 12+ char). Enable fingerprint as convenience layer.
    MED
🛡 VPN + ZTNA
Two different tools. Both always-on. Neither replaces the other.
Architecture: What Each Layer Does
LayerToolPurposeScope
VPNMullvadEncrypts ALL internet traffic, hides real IPEverything outbound
ZTNATwingateSecure access to LP infrastructure (no exposed ports)LP resources only

These run simultaneously on the S26 Ultra. Mullvad handles the general internet pipe. Twingate adds a split tunnel for LP-specific resources (Django admin, code-server, database UI, MinIO) within that tunnel. No conflict.

Mullvad VPN Setup

💸 Pay Method — Maximum Anonymity
Option A: Mail cash to Mullvad (address on mullvad.net/en/account/payment) — zero digital trail.
Option B: Purchase Monero (XMR) via KYC-free exchange and pay at mullvad.net.
Option C: Prepaid Visa gift card (bought with cash) as fallback.
Never use a card linked to your identity. The account is just a random number — no email, no name.
  • Create Mullvad account at mullvad.net No email required. You get a random account number. Write it in 1Password immediately — this IS your account, there's no recovery.
    FIRST
  • Add 1–3 months credit via Monero/cash mullvad.net → Your account → Add time. Monero gets 10% discount. Mail cash option takes 1–2 weeks to credit.
    FIRST
  • Install Mullvad Android app from Google Play Sign in with account number. Set protocol to WireGuard. Select server: "Fastest" or closest US city.
    HIGH
  • Enable kill switch + block connections without VPN Mullvad app: Settings → Kill switch → On. Then: Android Settings → Connections → VPN → Mullvad gear → Always-on VPN + Block connections without VPN.
    HIGH
  • Verify at mullvad.net/check while connected Open Chrome (with VPN on) → navigate to mullvad.net/check. Should show: "You are connected to Mullvad" and your real IP should NOT appear.
    HIGH
  • Configure split tunnel exception for banking apps (if needed) Some banks block VPN IPs. If a banking app fails: Mullvad → Split tunneling → add that app as exception. Only add the minimum required.
    LOW

Twingate Setup (Business Access)

  • Create Twingate account at twingate.com (free tier) Free: 5 users, 10 remote networks, 20 resources. Sufficient for all current LP infrastructure.
    HIGH
  • Install Twingate connector on Hetzner VPS SSH into VPS (see 1Password: "Hetzner WatchBack Server") → install via Docker. Creates a secure relay — no inbound ports needed on the VPS.
    HIGH
  • docker run -d \
      --name twingate \
      --restart=always \
      --network=host \
      -e TWINGATE_ACCESS_TOKEN="[from Twingate dashboard]" \
      -e TWINGATE_REFRESH_TOKEN="[from Twingate dashboard]" \
      -e TWINGATE_NETWORK="[your-tenant].twingate.com" \
      -e TWINGATE_LOG_ANALYTICS=v2 \
      twingate/connector:1
  • Add resources in Twingate dashboard Add: code-server (localhost:8080), Django admin (localhost:8000), MinIO console (localhost:9001), pgAdmin (if running). Each gets a private DNS alias.
    HIGH
  • Install Twingate Android app + authenticate Google Play → Twingate. If Samsung browser launch issue: in Twingate settings → "Open links with" → Chrome. Disable Mullvad briefly for first auth if needed, then re-enable.
    MED
  • Apply for Twingate MSP program at 3+ active clients twingate.com/msp or email partnerships@twingate.com. Expected MSP pricing: ~$3–4/user/month vs $5 retail. Apply when LP has 3+ paying clients using portal access.
    LATER

Deploy LP Secure VPN (Client Service)

ℹ️ Why Self-Hosted vs PureVPN White-Label
PureVPN disclosed user logs to the FBI in 2017. LP's privacy clients are specifically the people who care about this history. Self-hosted wg-easy on Hetzner gives LP a genuine "zero logs because we configured it that way" claim. ~€6/month VPS supports 50+ clients. 90% margin.
  • Deploy wg-easy (WireGuard) on Hetzner VPS Docker Compose on existing VPS (or new CX22 at ~€6/mo). Serves LP Secure VPN to clients. See VPN_ZTNA_Service_Model.md for full docker-compose.yml.
    MED
  • Add vpn.legendarypathway.com DNS record Namecheap API → A record → VPS IP. Used by WireGuard clients to reach the VPN server endpoint.
    MED
  • Add VPN add-on to Stripe product catalog $20/month add-on. Create in Stripe dashboard. Add price ID to LP portal Django settings.
    LATER
💻 VS Code Remote Access
Two access paths. One for the VPS (always on). One for the workstation file tree (when workstation is on).
⚠️ Critical Correction
The VS Code integrated terminal does NOT work in mobile browsers (Chrome blocks it). vscode.dev Remote Tunnels on mobile = code review only, no terminal, no Claude Code.
For Claude Code on mobile: use code-server on the VPS (terminal works in Chrome) or SSH + Termux.
Access Method Comparison
MethodTerminal?Claude Code?Always Available?Best For
code-server on VPS✓ Yes✓ CLI✓ AlwaysDevelopment, Claude Code, deployments
SSH + Termux + mosh✓ Yes✓ CLI✓ AlwaysQuick tasks, low bandwidth
vscode.dev Remote Tunnel✗ No (mobile)✗ NoWhen workstation onCode review, file browsing
DeX + code-server✓ Yes✓ YesConditionalDesktop-grade full sessions

Setup 1 — code-server on Hetzner VPS (Primary)

  • SSH into Hetzner VPS Credentials in 1Password: "Hetzner WatchBack Server". Command: ssh -i ~/.ssh/hetzner_legendaryos root@[VPS-IP]
    FIRST
  • Install code-server on VPS Run the official installer. Takes ~2 minutes. Sets up at /usr/bin/code-server.
    FIRST
  • curl -fsSL https://code-server.dev/install.sh | sh
  • Create code-server config and systemd service Creates config at ~/.config/code-server/config.yaml and systemd service for auto-start.
    FIRST
  • mkdir -p ~/.config/code-server
    cat > ~/.config/code-server/config.yaml << 'EOF'
    bind-addr: 127.0.0.1:8080
    auth: password
    password: CHANGE-THIS-USE-1PASSWORD
    cert: false
    EOF
    
    systemctl enable --now code-server@root
    systemctl status code-server@root
  • Add code-server as Twingate resource (localhost:8080) In Twingate dashboard → Add Resource → "code-server" → address: 127.0.0.1:8080. No public URL needed — Twingate proxies it securely.
    HIGH
  • Test: S26 Ultra → Twingate → Chrome → code-server → terminal → claude Connect Twingate → open Chrome → navigate to Twingate-proxied address → open terminal (Ctrl+`) → type: cd /opt/legendaryos && claude
    HIGH

Setup 2 — VS Code Remote Tunnel (Workstation File Tree)

  • Start VS Code Remote Tunnel on Windows workstation In VS Code: Ctrl+Shift+P → "Remote Tunnels: Create Tunnel" OR via terminal: code tunnel --accept-server-license-terms. Authenticate with GitHub. Name it: legendary-os-workstation.
    HIGH
  • Configure tunnel to auto-start on Windows login Task Scheduler → Create Basic Task → "VS Code Tunnel" → Trigger: At log on → Action: code.cmd tunnel --accept-server-license-terms
    MED
  • Test: S26 Ultra → Chrome → vscode.dev → Connect to Tunnel → workstation Open Chrome → vscode.dev → hamburger menu → Open Remote → Connect to Tunnel → select "legendary-os-workstation". Can now browse F:\LegendaryPathwayOS\ from phone.
    MED

Persistent tmux Sessions on VPS

cat > /usr/local/bin/start-sessions.sh << 'EOF'
#!/bin/bash
if ! tmux has-session -t main 2>/dev/null; then
  tmux new-session -d -s main -n "claude"
  tmux new-window -t main -n "docker"
  tmux new-window -t main -n "logs"
  tmux send-keys -t main:claude "cd /opt/legendaryos && echo 'Ready. Run: claude'" Enter
fi
EOF
chmod +x /usr/local/bin/start-sessions.sh
(crontab -l 2>/dev/null; echo "@reboot /usr/local/bin/start-sessions.sh") | crontab -
/usr/local/bin/start-sessions.sh
🌿 Obsidian Sync
One vault, all devices. Workstation is source of truth. VPS is the always-on relay hub.
Sync Topology
Windows Workstation (SOURCE OF TRUTH)
F:\LegendaryPathwayOS\05_Obsidian_Vault\
│
├── SyncTrayzor (Syncthing for Windows — auto-starts on login)
│   └── Syncs TO → Hetzner VPS (always-on hub)
│                   /opt/obsidian-vault/
│                   └── Syncs TO → S26 Ultra
│                                   /sdcard/obsidian-vault/
│                                   (Syncthing-Fork app)

Changes on phone → sync to VPS → sync to workstation when it wakes.
VPS holds a copy + git hourly auto-commit for version history.
  • Deploy Syncthing on Hetzner VPS (Docker) Creates an always-on relay hub. Vault syncs to/from here whenever either workstation or phone is online.
    HIGH
  • mkdir -p /opt/syncthing /opt/obsidian-vault
    cat > /opt/syncthing/docker-compose.yml << 'EOF'
    services:
      syncthing:
        image: syncthing/syncthing:latest
        container_name: syncthing
        hostname: legendaryos-vps
        network_mode: host
        volumes:
          - /opt/syncthing/config:/var/syncthing/config
          - /opt/obsidian-vault:/var/syncthing/obsidian-vault
        environment:
          - PUID=0
          - PGID=0
        restart: unless-stopped
    EOF
    cd /opt/syncthing && docker compose up -d
    # Access UI via Twingate at http://localhost:8384
  • Add Syncthing UI (localhost:8384) as Twingate resource Never expose port 8384 publicly. Access only via Twingate. Set auth credentials in Syncthing: Actions → Settings → GUI → username + password.
    HIGH
  • Install SyncTrayzor on Windows workstation github.com/canton7/SyncTrayzor → download Windows installer. Configure to auto-start. Add folder: F:\LegendaryPathwayOS\05_Obsidian_Vault → Folder ID: obsidian-vault. Share with VPS device.
    HIGH
  • Install Syncthing-Fork on S26 Ultra (Google Play) Search "Syncthing-Fork" by Catfriend1. NOT the official Syncthing app (deprecated May 2024). Pair with VPS device. Share obsidian-vault folder. Set path: /sdcard/obsidian-vault/
    HIGH
  • Install Obsidian Android app → open vault at synced path Google Play → Obsidian → Open folder as vault → navigate to /sdcard/obsidian-vault/ → open. All 20+ org notes + plugins load.
    MED
  • Set Syncthing-Fork to WiFi-only sync (cellular conservation) Syncthing-Fork → Settings → Sync only on WiFi. Prevents vault sync from consuming Cape's 50GB data cap.
    MED
  • Set up hourly git auto-commit on VPS for vault backup Provides complete version history of all Obsidian notes. Runs only on VPS — no git client needed on phone.
    LOW
  • cd /opt/obsidian-vault && git init && git add -A
    git commit -m "Initial vault snapshot"
    # Add crontab: hourly auto-commit
    (crontab -l 2>/dev/null; echo '0 * * * * cd /opt/obsidian-vault && git add -A && git commit -m "Auto: $(date +\%Y-\%m-\%d\ \%H:\%M)" 2>/dev/null || true') | crontab -
⌨️ Terminal Setup — Termux + mosh
Lightweight direct access to the VPS from anywhere. The backbone when code-server is overkill.
⚠️ Termux — F-Droid ONLY
The Google Play version of Termux is abandoned (stuck on old packages since ~2020 due to Play Store policy restrictions on code execution). The F-Droid version is current and actively maintained. Do NOT install from Google Play.
  • Install F-Droid on S26 Ultra Download APK from f-droid.org. Enable "Install from unknown sources" for this one download (re-disable after). F-Droid is the package manager for open-source Android apps.
    FIRST
  • Install Termux from F-Droid Open F-Droid → search Termux → install. Then open Termux and run the package setup below.
    FIRST
  • pkg update && pkg upgrade -y
    pkg install openssh mosh tmux git curl wget nano -y
    # Generate SSH key for this phone
    ssh-keygen -t ed25519 -C "s26ultra-$(date +%Y%m%d)" -f ~/.ssh/id_ed25519_s26
    # Display the public key to add to VPS
    cat ~/.ssh/id_ed25519_s26.pub
  • Add S26 public key to VPS authorized_keys SSH into VPS from desktop → echo "[paste public key]" >> ~/.ssh/authorized_keys. Now the phone can SSH into the VPS without a password.
    FIRST
  • Install mosh on Hetzner VPS + open firewall ports mosh uses UDP for connection persistence (survives network switching). Open ports 60000-61000 UDP in Hetzner firewall + ufw if active.
    HIGH
  • apt install mosh -y
    ufw allow 60000:61000/udp
    # In Hetzner Cloud Console → Firewall → add UDP 60000-61000
  • Create .bashrc aliases in Termux One-word commands to connect. Replace [VPS-IP] with IP from 1Password.
    HIGH
  • cat >> ~/.bashrc << 'EOF'
    VPS_IP="[VPS-IP-FROM-1PASSWORD]"
    VPS_KEY="$HOME/.ssh/id_ed25519_s26"
    alias vps='mosh --ssh="ssh -i $VPS_KEY" root@$VPS_IP -- tmux attach -t main'
    alias vpsnew='ssh -i $VPS_KEY root@$VPS_IP'
    EOF
    source ~/.bashrc
    # Now just type: vps
    # Connects to VPS, attaches to the persistent claude tmux session
  • Store S26 private key backup in 1Password cat ~/.ssh/id_ed25519_s26 | base64 in Termux → copy output → 1Password → new secure note "S26 Ultra SSH Key (private)". If you get a new phone, this restores access.
    MED
  • Test full stack: Termux → vps → tmux → claude Type: vps → connects → navigate to claude window (Ctrl+B then 1) → type: claude → Claude Code CLI running on VPS from your phone.
    HIGH
🖥 Samsung DeX — Portable Workstation
Plug the S26 Ultra into a monitor and get a full desktop. code-server in Chrome = complete development environment.
Recommended Hardware Kit
ItemPurposeCost
USB-C to HDMI cable (2m)Connect to any HDMI monitor/TV$12–20
Logitech K380 keyboard (BT)Compact, multi-device$40
Logitech Pebble M350 mouse (BT)Compact wireless$30
15.6" portable USB-C monitor (opt)For travel with no screen available$120–200
Total (without portable monitor)~$85–90
Total (with portable monitor)~$200–290

DeX Workflow

1
Plug S26 Ultra into external display via USB-C → HDMI
DeX mode activates automatically. Desktop interface appears with taskbar, start menu, resizable windows, 4 virtual desktops.
2
Connect Bluetooth keyboard and mouse
K380 pairs to DeX independently from the touch screen. All keyboard shortcuts work correctly in DeX mode.
3
Open Chrome → connect to code-server via Twingate
Full VS Code in Chrome desktop tab. Terminal works. Claude Code extension runs. This is indistinguishable from a laptop development session.
4
Open additional windows as needed
Obsidian on Desktop 2. LP Secure PWA on Desktop 3. Claude app on Desktop 4. Up to 20 apps simultaneously.
🔐 Privacy Communications Platform
LP is the product owner. Lee Thomas IT is the infrastructure contractor. You are Client #1.
Platform Status
ComponentStatusOwner
Django 5.1 stack + WatchBack codebaseLIVELee Thomas IT
Twilio integration (voice + SMS)LIVELP
Lex Liberorum Pax portal (lexliberorum.org)LIVELex / Lee Thomas
LP Secure PWA (VoIP browser client)LIVEWatchBack codebase
MinIO encrypted storageLIVELee Thomas IT
Stripe billing + webhooksPARTIALLP
Stripe products + price IDs for Privacy tiersPENDINGLP
Lawless as Client #1 (is_owner=True)PENDINGLP
Twilio Number Registry populatedPENDINGLP
LP Secure VPN (wg-easy)NOT BUILTLee Thomas IT

Pricing (Confirmed 2026-03-30)

TierSetupMonthlyIncludes
Privacy Core$500$1971 private number, VoIP, SMS, voicemail, document storage
Privacy Plus$500$297Core + Twingate access, expanded storage, priority support
Privacy Elite$750$497Plus + additional numbers, VPN, white-glove onboarding
Entity Shield$1,000$297LLC formation + Privacy Core bundled

Pending Platform Actions

  • Create Stripe products for all 4 tiers Stripe dashboard → Products. Create: Privacy Core ($197/mo + $500 setup), Privacy Plus ($297/mo + $500 setup), Privacy Elite ($497/mo + $750 setup), Entity Shield ($297/mo + $1k setup). Record price IDs in Org_06/14_Tech_Data/Stripe/Products_Prices.md.
    HIGH
  • Create ServiceCatalogItem records in WatchBack admin LP admin portal → ServiceCatalog → add each tier with Stripe price IDs. These items appear in the client onboarding flow.
    HIGH
  • Create Lawless as Client #1 in the portal Admin → create ClientPrivacyProfile for oliver@legendarypathway.com with is_owner=True. Provision his personal Twilio communication number. This makes him the first client on his own platform.
    HIGH
  • Populate Twilio Number Registry Record all active Twilio numbers in Org_06/14_Tech_Data/Twilio/Number_Registry.md — what number belongs to which purpose/client. Required for tracking as client count grows.
    MED
  • Decision: Single Twilio account vs. subaccounts per org Current: single account under LP. As M2M2 and others go live, evaluate whether each org needs a subaccount. Document the decision in Privacy_Comms_Master_Reference.md.
    MED
  • Deploy LP Secure VPN (wg-easy) on VPS See VPN + ZTNA section. This is the client-facing VPN add-on. Must be live before first Privacy Plus or Elite client activates.
    MED
  • Set up ProtonVPN affiliate account proton.me/affiliate — earn 100% of monthly plan commissions + 40%+30% recurring on annual. Recommend to clients who prefer a commercial VPN over LP's managed offering.
    LOW