This is a server that will be ran by yourself with 24 hours server / sim support you will be provided with own logins as show in photo so the main balance is like a bank balance the more clients you have the more your balance will be used eg I bought this package today I had 100 sims sold I activated them all for 6 months calling only all 100 sims would run off the main balance once your balance drops below 200 you will have to top up again if not the sims will not work monthly fee £750 for support this panel is possible to make 50-80% per sim activation so if you sold a calling 6 months sim 1k you would gain maybe 500 of that min I would say I have had clients that use only 100 credit of the panel in the full 6 months like I say imagine this you have 1k in the bank you give 10 kids bank cards UNLIMITED use they have then the power to spend 1p or 1k you can control the spending and watch it live and temp block the user for abuse :) of sim and once you run out or running low of sims you can order more min order 100 pc (£800) 1000+ sim order (£6000) rates are set and can be viewed any time in rate sheets on panel eg data in uk 0.003 per my ( 10 go would cost you maybe £30-40 and you sell this for £150 all panel credits (top ups ) crypto only no bank transfers or cash sorry
Full MVNO This scenario makes it possible to manage all processes, to create different business patterns and different group of subscribers with its own tariffs and services. Ability to develop your own applets for SIM-cards.
• Full MVNO controls its services and offers• Has its own SIM-cards, system of number assignment,interconnection rights and obligations• Efficiently works as HNO, but without its own radio network• Maintain its own core networks.
The dealer gets white SIM or branded product (optional)API for integration and full managementYour own customer supportPayment acceptance on the dealer's side
Ability to create your own tariff-plansAny name of GSM networkAbility to use USSD, SMS, DATAAbility to use your own number databaseAbility to use virtual numbers of the operator
Control and и set-up of tariffs and additional services
Your own SIM-cards
Your own system of number assignment
Independent virtual operatorFull management of tariffsMaximum profit of your own brand usageAbility to use your own trafficAbility to provide services in mobile finance sphereCloud services and mobile security
Cost of SIM-cards:
Production from400 - 1000 8£/SIM
Production fromот 1000 - 6£/SIM
Additional expenses on SIM servicing:
MSRN - CallBack 0,075€incoming calls 0,075€CallThru 0€USSD - FREEInternetCallThru и IOT SMSaccording to tariff
CallThru 0,02€/minCallBack 0,035€/sessionincoming calls 0,075€/session
Companies offering mobile payment services
Companies offering fixed-telephony services
How it works?
The service is based on the convergention of GSM network and VoIP teleghony. Exclusive roaming agreements and direct contracts with IP providers ensures the creation of various business models.
VoIP technology gives an opportunity to involve the existing infrastructure and measurably decrease the calls prime cost to all destinations.
Using the CallBack technology, you reduce the call cost even more. Our SIM applets allow you to automate various functions.
Offered MVNO / MVNE platform is an universal tool for creation of high-tech business with minimal investments. Starting your business you can use either your means or ours, this allows the enter the market with minor risks.
SIM-cards are compatible with all popular phone models and have a different form factor: standart, micro and nano-SIM.
For inbound calls, we provide English MSISDNs of +44 format, as well as DID numbers for different countries.
Our billing panel provides total control on all SIMs events and gets statistics on real time basis. You will have access to subscribers' location, SMS, USSD, internet. You can set your own groups and rates for different services.
Full MVNO is focused on corporate client. It gives lots of opportunities for infrastructure integration and allowes to use FMC numbers (short corporate numbers for calls around the world).
Success factors
Know your clientsStrong brandUpsell (the way to increase your sales revenue, saling the advanced and expensive version of product), complex sales (additional goods), sales of package servicesExternal key factors
HNO opened for MVNOCompetitive marketLow market penetration rate and open segmentsConvenient control modeNumber transfer
100 START UP WHITE SIM CARDS
£500 START UP BALANCE
INSTANT SUPPLY ONCE PAID FOR PANEL SERVER
How to Protect:
1. to Use dynamic identifiers (IMSI+Ki, IMEI)
2. to Keep the algorithm A5/1.2.3.0 under control
3. to Secure SIM Policy
4. To Change Voice
5. To substitute calling number
6. No Location Data
7. No Billing Statistics
8. No Call proves between the subscribers
9. to block hacker attacks on HLR level
10. To intercept and block any SMS, including Silent SMS (Stealth SMS) on SMSC level
Working Principles:
To gain control over a handset or a SIM card, one needs to know its identifiers. Network are kept under government control and all of them are connected to the proper facilities that are used to perform surveillance activities.
The principal identifier for any mobile device is IMEI, i.e. International Mobile Equipment Identity. IMEI is transmitted to the network.
There is also a subscriber identifier – IMSI, International Mobile Subscriber Identity, in other words, it is used to identify the user in a cellular network. The parameter is transmitted to the network.
MSISDN, Mobile Subscriber Integrated Services Digital Number, is a subscriber public number used for service integration within GSM, UMTS and other standards. MSISDN is not transmitted to a network, but is interconnected with IMSI.
Having these identifiers at hand makes it possible to collect the following information:
— Using IMEI – it is possible to get access to all the IMSIs that are loaded on the SIM, thus it is an easy access to the billing data as well as location updates, SMS, MMS, calls, URLs, log ins, passwords etc.,
— Having IMSI one can get access to a handset’s IMEI and a SIM cards’s IMSI, that were used in these handsets, therefore the billing data also becomes available.
Secure SIM does not belong to any network operator, there is no public access to MSISDN as well as to the billing System.
Difference between a Regular and a Secure SIM
How a SIM registers in a network and chooses a cell
1. When you turn on a mobile device with a Reular SIM, the handset scans the frequencies and chooses a cell with the strongest signal. When a Secure SIM connects to a cellular network that has the second strongest signal. This algorithm provides a set of security measures that prevent the information from interceptions.
2. Once the device is synchronized and identified, a regular SIM registers in an network according to Algorithm A3. This protocol calculates the SRES key, that allows to complete the authentication procedure. To calculate the SRES key in Algorithm A3, the Protocol uses IMSI and Ki identifiers. A regular SIM card has a fixed ‘IMSI’ is fixed that cannot be changed, when a Secure SIM has several profiles at a time with their own IMSI + Ki set.
GSM ciphering It is the operator that determines the ciphering level. Unlike a regular SIM, the Secure SIM has a special applet that tracks the ciphering level and notifies the user in case it is going down.
CallsTo make a call using a regular SIM, a subscriber dials a number. The phone sends an ALERT signal to the BSS (Base Station Subsystem) via the high-speed FACCH control channel, and then to MSC (Mobile Switch Centre). MSC sends a message ‘AddressComplete’ to the caller. And the two subscribers are getting connected.
If MSISDN of either of the subscribers is known, it is possible to get all the calling session data or to intercept the call with an intercept complex.
ДОБАВИТЬ СТРОЧКУ:Secure SIM call scheme is different. First, there are two ways of calling, these are a Call Through (Camel) call and Call Back call. Call Through (Camel) call - Secure SIM user dials a number, a SIM card applet catches the call, and redirects it to the service number. The calling number is transmitted onto our automatic telephone system (PBX) via the ciphered signal channel. Therefore, all Outbound calls from a Secure GSM SIM card are performed onto our service number of our network. PBX forwards the call to the end user.
Call Back call - User dials a number and at this point the call seems to drop. But in fact, at this very time the SIM sends the encrypted command to the server PBX via the signal channel. HBX via SS7 requests a VLR a permission to allocate a temporary number, Mobile Station Roaming Number (MSRN). Once an operator have allocated the MSRN to the Secure SIM, the SIM cards calls the MSRN. The Secure SIM user picks up, the AB leg starts. After that PBS Secure GSM starts calling the second subscriber. When the second subscriber picks up, the AG legs opens.
These ways it is impossible to get any operator billing information, as there is no data and facts what operator Secure SIM is connected to. The SIM has no public MSISDN, therefore no access to IMSI, Ki and IMEI. Even if the subscriber is being eavesdropped, it is not possible to find out who the subscriber was calling to and talking to. A call session consists of 2 legs (AB leg and AG leg), between the two legs there is a Secure GSM PBX.
Incoming Call (Regular SIM)Once an Outbound Call has been made (Subscriber A calls Subscriber B), the calling session gets a TMSI (Temporary Mobile Subscriber Identity) within a VLR coverage, a traffic provider terminates the call, the calling session has been established, the Subscriber B gets a call. If either of the Subscribers is using a regular SIM, the Network Operator receives and records locations of the Subscribers, call duration, handset model (Subscriber A) etc.
Incoming Call (Secure SIM)
Once an Outbound Call has been made (Subscriber A), a Secure SIM gets a virtual DID number. It receives a call from a network, transforms it into a SIP protocol and routes it to Secure GSM PBX. Secure GSM defines the subscriber with the allocated DID and starts the call. There is no evident connection between the two Subscribers, as the connection is not direct and goes via Secure GSM PBX, that gives no possibilities to detect the Subscribers locations.
Phonetic (Voice) PrintNetwork Operators are actively using phonetic control systems to detect subscribers using their Voice Prints. Unlike a regular SIM Secure SIM provides an opportunity to change acoustic characteristics for Inbound and Outbound calls. The feature is extremely helpful especially if it is an Outbound call to a regular SIM.
HLR requestsNetwork Operators have a set of standard requests, that guarantee Roaming Services for guest Subscribers. Unfortunately it’s a titbit not only for the Subscribers but also hackers attacking SS7 networks. The attacks look like regular requests to HLR operator via SS7. The requests are aimed at getting an up-to-date data about the subscriber (IMSI, Ki, IMEI etc.). HLR is being an integral part of our infrastructure; we intercept any attacks and notify our subscribers about them. The feature is included to PING.
Stels SMSSilent SMS
To manage a handset or its preinstalled applications, hackers use Type 0 Messages or so-called ‘Silent SMS’ or ‘Stealth SMS’. The key points of these type of SMS are not shown or kept on a handset. The Silent SMS request goes as well via HLR. Having HLR on our we intercept any attacks and notify our subscribers about them. The feature is included to PING.Secure SIM has no billing at Network Operator’s side that makes it impossible to get, record and analyze any information about subscribers (CDRs, Location, Voice print etc).Our System manages and controls all the process occurring on the three levels: Subsbcriber’s Handset (a handset with a changed system), our own identification module (Secure SIM with the imbedded applets) as well as the network level (we fully control HLR, MSC and SMSC).
PSIt is important to remember that a regular handset is highly insecure. Operators are constantly improving their tools to collect and analyze information about Subscribers using billing patterns. Having access to all national Network Operators Billing Systems, it is possible to find out a lot about a Subscriber.
We provide a complex Silent Sim card anonymity solution also known as Russian stealth sim card for your worldwide communication. As our subscriber you can make calls anonymously from any phone. You don’t need to worry if the Internet access is available or not, our solution is the SIM card. By owning one you can make discrete calls and pretend to be anywhere in the world.
We are private network.
No one can call, you unless he is on our network
(All VIP customers will get VIP numbers).
Information about the subscriber’s location is not available. The virtual number does not allow compromise the real location or IMEI to anybody for simple reason: We not keeping it.
The subscriber can specify the outgoing number range himself (legal spoofing). Number replacement is implemented via the USSD command.
Stealth PBX (private branch exchange) location is changed after each call, making russian stealth sim card not possible to determine the subscriber’s location. Temporaty number life time cycle is last for one call.
SIM-card forced encryption to prevents form the encryption level reduction. All conversations are encrypted according to the A5.1 algorithm. No cell site logs or IMEI trace left.
Real time inbuild Voice changer transformation function of your voice. It is impossible to identify a subscriber by the phonetic characteristics. (Digital signature breaker function) Digital signature Jammer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Get access now