Anonymous and Encrypted Phones: Is it Possible?