The FIRST Truly
with Network Level
Protection


Choose your plan and
order a KOSHER SIM card.

Receive your pre-filtered SIM
and place it in your phone.
All plans are strictly kosher. Blocking at the network level is updated daily.
Applies to approved mobile phones only. Certain plans restrict internet access entirely. Data access is available only on approved plans and subject to kosher policy enforcement.
Most kosher phones focus on the device. We focus on the network. Our plans are designed to be kosher by design, not by limitation. Every plan is certified by the global kosher authority TAG and enforced directly at the carrier level.
Mobile and home phone service enforced at the network level. No apps. No workarounds. Cannot be bypassed.
We are the only cellular provider offering plans that are themselves kosher certified by TAG Technology Awareness Group. Not just a phone. Not just a filter. The actual cellular plan.
This means protection that a phone alone cannot provide.

Blocking happens at the server level, not on the device.

No apps to install or configure. It works right away.

Kosher restrictions cannot be bypassed, even by factory reset.

Certified and audited by TAG, not self-enforced.

We are the only cellular provider offering
plans that are themselves kosher certified by (TAG) Technology Awareness Group.
Check Your Coverage
Kosher Phone is independently certified.
Restrictions are not controlled by the customer or the carrier.
Kosher Phone operates under the supervision of the Technology Awareness Group (TAG).
TAG is a nationally recognized organization focused on technology awareness and responsible usage.



Certification is not a feature. It is the foundation of our service!
Controls are enforced at the network level. There is nothing for a child to disable.
Kosher Phone operates under the supervision of the Technology Awareness Group, known as TAG. TAG is a nationally recognized organization focused on technology awareness and responsible usage.



Kosher Phone does not self-certify. Certification is independent and external.
No Loopholes | No Hidden Access | No Reset Tricks
ONE SET OF RULES, ENFORCED EVERYWHERE.

