Project

General

Profile

Download (21.4 KB) Statistics
| Branch: | Revision:
1
= Specification for IMSI Pseudonymization on the Radio Interface for 2G/3G/4G
2

    
3
== Introduction
4

    
5
=== Protecting the IMSI on the Radio Interface is Desirable
6

    
7
A long-standing issue in the 3GPP specifications for cellular mobile
8
communications starting from 2G (GSM) is, that mobile phones and
9
other mobile equipment (ME) have to send the International Mobile Subscriber
10
Identity (IMSI) unencrypted over the air.  Each IMSI is a unique identifier for
11
the subscriber. Therefore, most people can be uniquely identified by recording
12
the IMSI that their ME is sending.
13

    
14
The 3GPP specifications provide means for implementations to send the
15
IMSI less often by using the Temporary Mobile Subscriber Identity (TMSI)
16
where possible.  However, the decision on when to use IMSI or TMSI is
17
entirely on the networks side, without any control by the ME or even the
18
subscriber.
19

    
20
This leads to a variety of attacks on subscriber location privacy, including
21
the use of passive air-interface sniffing as well as false base station
22
attacks, where an attacker impersonates a base station which
23
subsequently inquires every ME about its IMSI.
24

    
25
Some related devices have been termed _IMSI catchers_ or _Stingray_ in
26
both scientific literature as well as mainstream media. IMSI catchers have
27
become small and affordable during the last decade; criminals actors
28
and in some cases even tabloid journalists without much budget have
29
reportedly used them to track anybody with a mobile phone.
30

    
31
5G addresses this problem with the Subscriber Concealed Identifier (SUCI),
32
which uses public-key cryptography to ensure that the permanent subscriber
33
identity (IMSI) is not transmitted over the air interface anymore.
34
Rather, a concealed version of it is transmitted (3GPP TS 33.501,
35
Section 6.12.2).  The 5G SUCI mechanism can not be adapted easily for previous
36
generations of cellular networks as it relies on introducing an entirely
37
new mobile identity type of larger size (SUCI) than any of the existing
38
ones (e.g. IMSI), causing significant implications on protocol stacks
39
and implementations all across the protocol stack of all network elements,
40
including the ME.
41

    
42
No mechanism for increasing subscriber identity and location privacy on
43
the radio interface has been specified for the previous cellular
44
technologies 2G (GSM), 3G (UMTS) and 4G (LTE).  Meanwhile, pure 5G
45
networks are and will remain rare for many years to come, as operators
46
have to support billions of deployed legacy pre-5G ME.  Operating
47
combined 5G + previous technology networks enables the so-called
48
"downgrade attacks" where the attacker blocks access to 5G e.g. by means
49
of jamming/interference, and hence triggers the ME to use a previous
50
generation which is still susceptible to the attacks.
51

    
52
This specification proposes a different approach to conceal the
53
IMSI for legacy 2G, 3G and 4G networks.
54

    
55
=== Summary of Proposed Solution
56

    
57
The solution presented in this document is to periodically change the IMSI of
58
the ME to a new pseudonymous IMSI allocated by the Home Location Register (HLR)
59
or Home Subscriber Service (HSS). The next pseudonymous IMSI is sent to the SIM/USIM
60
via Short Message Service (SMS), then a SIM applet overwrites the IMSI of the
61
SIM/USIM with the new value. The only components in the network that need to be
62
changed in order to support this mechanism are the SIM/USIM and the
63
HLR/HSS.  All other elements (like BTS, NodeB, eNodeB, BSC, RNC, MME,
64
MSC/VLR, SGSN, GGSN, S-GW, P-GW, ...) remain as-is, without any changes
65
to their specification or implementation.
66

    
67
Constraining the required changes to only two elements in the network
68
enables quick adoption potential for the proposed mechanism.
69
Furthermore, as SIM/USIM and HLR/HSS are the only two elements under control
70
of a Mobile Virtual Network Operator (MVNO), this mechanism can be
71
deployed by a MVNO without any changes to the operators of the physical
72
infrastructure (MNO).
73

    
74
<<<
75
=== Summary of Existing Location Updating Procedures in RAN and CN
76

    
77
Every subscriber's SIM/USIM is provisioned with the IMSI and secret
78
cryptographic keys (Ki or K+OP[c]).  The same IMSI and key data is also provisioned
79
into the HLR/HSS, the central subscriber database of a cellular network.
80

    
81
In a number of different situations, the IMSI is sent over the air
82
interface and back-haul towards the Core Network (CN), where it is
83
validated by the HLR/HSS. The involved components vary by the generation
84
of the network and whether the SIM/USIM is attempting a Circuit Switched (CS)
85
or Packet Switched (PS) connection, but the principle is the same. This
86
document uses 2G CS Location Updating for reference, as in
87
<<figure-imsi-regular>>.
88

    
89
The IMSI is transmitted in the Location Updating Request from ME. The VLR
90
needs an authentication challenge specific to the secret keys on the SIM/USIM to
91
authenticate the SIM/USIM, and looks the authentication challenges up by the IMSI.
92
If the VLR does not have any more authentication challenges for the IMSI (as it
93
happens when the VLR sees the IMSI for the first time), the VLR requests new
94
authentication challenges from the HLR/HSS. Then the HLR/HSS verifies that the IMSI is
95
known and, if it is unknown, sends back an error that will terminate the
96
Location Updating procedure.
97

    
98
After the VLR found the authentication challenge, it authenticates the SIM/USIM, and
99
performs a Classmark Enquiry and Physical Channel Reconfiguration. Then the VLR
100
has the required information to finish the Location Updating, and continues
101
with Process Update_Location_HLR (3GPP TS 29.002). Afterwards, the VLR assigns
102
a new TMSI with the Location Updating Accept, which is acknowledged by the TMSI
103
Reallocation Complete. In following Location Updates with the same MSC, the ME
104
sends the TMSI instead of the IMSI in the Location Updating Request.
105

    
106
However, the allocation of the TMSI is optional (the network may choose
107
to not perform it), and particularly at mobility changes across the
108
MSC/VLR boundary, or even across the PLMN boundary, the TMSI allocated
109
by the previouis network element may not be known, and an IMSI based
110
Location Updating procedure is used.
111

    
112
Furthermore, at any given point in time, a legitimate network or a rogue
113
base station can inquire the IMSI from the ME using the "MM IDENTITY
114
REQUEST (IMSI)" command.
115

    
116
[[figure-imsi-regular]]
117
.Location Updating in 2G CS with IMSI
118
["mscgen"]
119
----
120
msc {
121
  hscale="1.75";
122
  ME [label="ME"], BTS [label="BTS"], BSC [label="BSC"], MSC [label="MSC/VLR"],
123
  HLR [label="HLR"];
124

    
125
  // BTS <=> BSC: RSL
126
  // BSC <=> MSC: BSSAP, RNSAP
127
  // MSC <=> HLR: MAP (process Update_Location_HLR, 3GPP TS 29.002)
128

    
129
  ME   => BTS [label="Location Updating Request"];
130
  BTS  => BSC [label="Location Updating Request"];
131
  BSC  => MSC [label="Location Updating Request"];
132

    
133
  --- [label="If necessary: VLR requests new authentication challenges for this IMSI"];
134
  MSC  => HLR [label="Send Auth Info Request"];
135
  MSC <=  HLR [label="Send Auth Info Result"];
136
  ---;
137

    
138
  BSC <=  MSC [label="Authentication Request"];
139
  BTS <=  BSC [label="Authentication Request"];
140
  ME  <=  BTS [label="Authentication Request"];
141
  ME   => BTS [label="Authentication Response"];
142
  BTS  => BSC [label="Authentication Response"];
143
  BSC  => MSC [label="Authentication Response"];
144

    
145
  --- [label="Process Update_Location_HLR (3GPP TS 29.002)"];
146
  MSC  => HLR [label="Update Location Request"];
147
  MSC <=  HLR [label="Insert Subscriber Data Request"];
148
  MSC  => HLR [label="Insert Subscriber Data Result"];
149
  MSC <=  HLR [label="Update Location Result"];
150
  ---;
151

    
152
  BSC <=  MSC [label="Location Updating Accept"];
153
  BTS <=  BSC [label="Location Updating Accept"];
154
  ME  <=  BTS [label="Location Updating Accept"];
155
  ME   => BTS [label="TMSI Reallocation Complete"];
156
  BTS  => BSC [label="TMSI Reallocation Complete"];
157
  BSC  => MSC [label="TMSI Reallocation Complete"];
158
}
159
----
160

    
161
<<<
162
== Required Changes
163

    
164
This section covers the changes / enhancements required
165
compared to the existing 3GPP specifications.
166

    
167
[[hlr-imsi-pseudo-storage]]
168
=== Pseudonymous IMSI Storage in the HLR/HSS
169

    
170
The HLR/HSS must store up to two pseudonymous IMSIs (`imsi_pseudo`) and
171
their related counters (`imsi_pseudo_i`) per subscriber. Each subscriber
172
initially has one pseudonymous IMSI allocated. A subscriber has two
173
valid pseudonymous IMSIs only during the transition phase from the old
174
pseudonymous IMSI to the new one.
175

    
176
Subsequently, the amount of available IMSIs must be higher than the
177
amount of subscribers registered with the HLR/HSS. If the amount of
178
available IMSIs is too small, the HLR/HSS could delay assigning new
179
pseudonymous IMSIs until new IMSIs are available again.
180

    
181
.Examples for additional subscriber data in HLR
182
[options="header"]
183
|===
184
| Subscriber ID | imsi_pseudo | imsi_pseudo_i
185
// example IMSIs taken from Wikipedia
186
| 123
187
| 310150123456789
188
| 1
189

    
190
| 234
191
| 502130123456789
192
| 1
193

    
194
| 234
195
| 460001357924680
196
| 2
197
|===
198

    
199
==== imsi_pseudo
200

    
201
The value for `imsi_pseudo` is a random choice from the pool of available
202
IMSIs that the HLR/HSS controls. The pseudonymous IMSI must not be used
203
by any subscriber as pseudonymous IMSI yet, but may be the real IMSI of
204
a subscriber.
205

    
206
[[hlr-imsi-pseudo-i]]
207
==== imsi_pseudo_i
208

    
209
The counter `imsi_pseudo_i` indicates how often a subscribers pseudonymous IMSI
210
was changed. The value is 1 for the first allocated pseudonymous IMSI of a
211
subscriber. When allocating a new pseudonymous IMSI for the same subscriber,
212
the new `imsi_pseudo_i` value is increased by 1. The counter is used by the SIM/USIM
213
applet to detect and ignore outdated requests related to changing the
214
pseudonymous IMSI.
215

    
216
<<<
217
=== SIM/USIM Provisioning
218

    
219
IMSI pseudonymization as specified by this document works with
220
traditional SIM (used in 2G), as well as with USIM (used from 3G
221
onwards).
222

    
223
The initial IMSI provisioned in the SIM/USIM is provisioned as the initial
224
pseudonymous IMSI in the HLR/HSS.
225

    
226
[[sim-app]]
227
==== SIM applet
228

    
229
SIM/USIM have long supported the installation and operation of
230
additional applets on the card itself.  The programming language and
231
runtime environment for such applets is an implementation detail.
232
However, the industry has converged around JavaCards with related
233
additional APIs specific to SIM, UICC and USIM.  Depending on the card
234
profile / provisioning, it is possible for such applets to access the
235
card file system and modify files on the card, such as the file storing
236
the IMSI.
237

    
238
A SIM/USIM compatible with this specification is provisioned with a SIM
239
applet, which is able to change the IMSI once the next pseudonymous IMSI
240
arrives from the HLR/HSS. A reference implementation is provided in
241
<<reference-src>>.
242

    
243
===== Counter Storage
244

    
245
The following counter variables are stored in the SIM applet.
246

    
247
[options="header",cols="20%,12%,68%"]
248
|===
249
| Name | Initial value | Description
250

    
251
| imsi_pseudo_i
252
| 1
253
| See <<hlr-imsi-pseudo-i>>.
254

    
255
| imsi_pseudo_lu
256
| 0
257
| Amount of Location Updating procedures done with the same pseudonymous IMSI.
258

    
259
| imsi_pseudo_lu_max
260
| (decided by operator)
261
| Maximum amount of Location Updating procedures done with the same
262
  pseudonymous IMSI, before the SIM applet shows a warning to the subscriber.
263
|===
264

    
265
===== Switch to Next Pseudonymous IMSI
266

    
267
The SIM applet registers to a suitable SMS trigger (3GPP TS 43.019, Section
268
6.2). When an SMS from the HLR/HSS in the structure of <<sms-structure>> arrives,
269
the applet must verify that the SMS is not outdated by comparing `imsi_pseudo_i`
270
from the SMS with the last `imsi_pseudo_i` that was used when changing the IMSI
271
(initially 1 as in <<hlr-imsi-pseudo-i>>). The new value must be higher. The
272
SIM applet must also verify, that the pseudonymous IMSI arriving in the SMS is
273
different from the currently active IMSI. If any of the checks fail, the SMS
274
must not be processed further.
275

    
276
The SIM applet registers a timer with `min_sleep_time` from the SMS. When the
277
timer triggers, EF~IMSI~ of the SIM/USIM is overwritten with the new pseudonymous
278
IMSI. The TMSI and related data (EF~LOCI~, EF~PSLOCI~) and ciphering keys
279
(EF~Kc~, EF~KcGPRS~, EF~Keys~, EF~KeysPS~) are invalidated (see 3GPP TS
280
31.102). The current `imsi_pseudo_i` from the SMS is stored in the
281
SIM applet to compare it with the next SMS. `imsi_pseudo_lu` is reset to 0. Afterwards,
282
the EF~IMSI~ changing procedure in 3GPP TS 11.14, Section 6.4.7.1 is executed
283
to apply the new IMSI.
284

    
285
// FIXME: do we need to enforce the LU now, with an arbitrary CM Service
286
// Request, or would this only be necessary for Osmocom? (OS#4404)
287

    
288
The SIM must start a Location Updating Request after changing the pseudonymous
289
IMSI, so the CN does not try to contact the ME with the previous pseudonymous
290
IMSI. The SIM applet must wait before switching the pseudonymous IMSI, because
291
otherwise it would be possible for an attacker to correlate the arrival time of
292
the SMS with the time of the following Location Updating Request.
293

    
294
===== Warning the Subscriber If the Pseudonymous IMSI Does Not Change
295

    
296
An attacker could potentially block the next pseudonymous IMSI SMS on purpose.
297
Because the SIM applet cannot decide the next pseudonymous IMSI, it would have
298
the same pseudonymous IMSI for a long time. Then it could become feasible for
299
an attacker to track the subscriber by their pseudonymous IMSI. Therefore the
300
SIM applet must warn the subscriber if the pseudonymous IMSI does not change.
301

    
302
The SIM applet registers to EVENT_EVENT_DOWNLOAD_LOCATION_STATUS (3GPP TS
303
03.19, Section 6.2) and increases `imsi_pseudo_lu` by 1 when the event is
304
triggered. If `imsi_pseudo_lu` reaches `imsi_pseudo_lu_max`, the SIM applet
305
displays a warning to the subscriber.
306

    
307
<<<
308
[[process-update-location-hlr]]
309
=== Process Update_Location_HLR
310

    
311
All IMSI Pseudonymization related changes to Process Update_Location_HLR
312
(3GPP TS 29.002) are optional. Deviations from the existing specification that
313
are outlined in this section are expected to be enabled or disabled entirely
314
where IMSI pseudonymization is implemented.
315

    
316
[[figure-imsi-pseudo]]
317
.Process Update_Location_HLR with IMSI pseudonymization changes
318
["mscgen"]
319
----
320
msc {
321
  hscale="1.75";
322
  MSC [label="MSC/VLR"], SMSC [label="SMS-SC"], HLR [label="HLR"];
323

    
324
  MSC   => HLR  [label="Update Location Request"];
325

    
326
  --- [label="If new pseudonymous IMSI was used: deallocate and cancel old pseudonymous IMSI"];
327
  HLR  box HLR  [label="Deallocate old pseudonymous IMSI"];
328
  MSC  <=  HLR  [label="Cancel Location Request"];
329
  MSC   => HLR  [label="Cancel Location Result"];
330
  ---;
331

    
332
  MSC  <=  HLR  [label="Insert Subscriber Data Request"];
333
  MSC   => HLR  [label="Insert Subscriber Data Result"];
334
  HLR  box HLR  [label="Start Next_Pseudo_IMSI_Timer"];
335
  MSC  <=  HLR  [label="Update Location Result"];
336
  MSC  box MSC  [label="Finish Location Updating with ME"],
337

    
338
  HLR  box HLR  [label="Wait for Next_Pseudo_IMSI_Timer expiry"];
339
  |||;
340
  ...;
341
  |||;
342
  HLR  box HLR  [label="Next_Pseudo_IMSI_Timer expired"];
343

    
344
  HLR  box HLR  [label="\nAllocate new pseudonymous IMSI\nif subscriber has only one allocated\n"];
345
  SMSC <=  HLR  [label="Next Pseudonymous IMSI SMS"];
346
  SMSC box SMSC [label="Deliver SMS to ME"];
347
}
348
----
349

    
350
==== Update Location Request
351

    
352
When Update Location Request arrives, the HLR/HSS does not look up the subscriber
353
by the IMSI, but by the pseudonymous IMSI instead. If the subscriber has two
354
pseudonymous IMSI allocated and used the new pseudonymous IMSI in the Update
355
Location Request, <<ul-new-pseudo-imsi>> applies. Otherwise, the HLR continues
356
with the existing Insert Subscriber Data Request logic.
357

    
358
[[ul-new-pseudo-imsi]]
359
===== Update Location Request With New Pseudonymous IMSI
360

    
361
If the subscriber has two pseudonymous IMSIs allocated, and the newer entry was
362
used (higher `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>), this section applies.
363
The older pseudonymous IMSI is deallocated in the HLR/HSS. This is done as early
364
as possible, so the timeframe where two pseudonymous IMSI are allocated for one
365
subscriber is short.
366

    
367
A Cancel Location Request with the old pseudonymous IMSI is sent to the VLR, so
368
the conflicting subscriber entry with the old pseudonymous IMSI is deleted from
369
the VLR. Receiving a Cancel Location Result is followed by the existing logic
370
to continue with Insert Subscriber Data Request.
371

    
372
===== Update Location Request With Old Pseudonymous IMSI
373

    
374
If the subscriber has two pseudonymous IMSIs allocated, and the older entry was
375
used (lower `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>), the newer entry is _not_
376
deallocated. This could lock out the subscriber from the network if the SMS
377
with the new pseudonymous IMSI arrives with a delay.
378

    
379
==== Insert Subscriber Data Result
380

    
381
When Insert Subscriber Data Result arrives, a subscriber specific
382
Next_Pseudo_IMSI_Timer starts.
383

    
384
[[next-pseudo-imsi-timer-expires]]
385
==== Next_Pseudo_IMSI_Timer Expires
386

    
387
If the subscriber has only one pseudonymous IMSI allocated, and the amount of
388
available IMSIs in the HLR/HSS is high enough, a second pseudonymous IMSI and
389
related `imsi_pseudo_i` gets allocated for the subscriber (as described in
390
<<hlr-imsi-pseudo-storage>>).
391

    
392
If the subscriber still has only one pseudonymous IMSI, because not enough
393
IMSIs were available in the HLR/HSS, the process is aborted here and no SMS with
394
a next pseudonymous IMSI is sent to the subscriber. The subscriber will get a
395
new pseudonymous IMSI during the next Location Updating Procedure, if
396
the HLR/HSS has enough IMSIs available at that point.
397

    
398
An SMS is sent to the SMS - Service Centre (SMS-SC) with the newer pseudonymous
399
IMSI (higher `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>) and related
400
`imsi_pseudo_i` value.
401

    
402
[[sms-structure]]
403
==== Next Pseudonymous IMSI SMS Structure
404

    
405
.Next pseudonymous IMSI SMS structure
406
[packetdiag]
407
----
408
{
409
	colwidth = 32
410

    
411
	0-31:	 IMSI_PSEUDO_I
412
	32-63:   MIN_SLEEP_TIME
413
	64-119:  IMSI_PSEUDO
414
	120-127: PAD
415
}
416
----
417

    
418
// FIXME
419
IMPORTANT: This is a draft. The structure is likely to change after the
420
reference implementation phase.
421

    
422
IMSI_PSEUDO_I: 32 bits::
423
See <<hlr-imsi-pseudo-i>>.
424

    
425
MIN_SLEEP_TIME: 32 bits::
426
Amount of seconds, which the SIM applet must wait before changing to the new
427
pseudonymous IMSI. Since it is unclear when the SMS will arrive (ME might be
428
turned off), this is a minimum amount.
429

    
430
IMSI_PSEUDO: 60 bits::
431
Telephony Binary Coded Decimal (TBCD, 3GPP TS 29.002) version of the next
432
pseudonymous IMSI.
433

    
434
PAD: 8 bits::
435
Padding at the end, must be filled with 1111 as in the TBCD specification.
436

    
437
<<<
438
== Error Scenarios
439

    
440
=== Next Pseudonymous IMSI SMS is Lost
441

    
442
If the SMS with the next pseudonymous IMSI does not arrive, the SIM/USIM will start
443
the next Location Updating Procedure with the old pseudonymous IMSI. Because
444
the HLR/HSS has both the old and the new pseudonymous IMSI allocated at this point,
445
the subscriber is not locked out of the network. The HLR/HSS sends the same next
446
pseudonymous IMSI again (<<next-pseudo-imsi-timer-expires>>).
447

    
448
=== Next Pseudonymous IMSI SMS Arrives Out of Order
449

    
450
The next pseudonymous IMSI SMS may arrive out of order. Either, because the
451
network is not able to deliver them in order, or even because an attacker would
452
perform a replay attack.
453

    
454
If the SMS arrives out of order, the `imsi_pseudo_i` counter will not be higher
455
than the value the SIM applet (<<sim-app>>) has stored. Therefore, the applet
456
will discard the message and the subscriber is not locked out of the network.
457

    
458
// === SMS Arrives Before Timer Expires
459
// FIXME: OS#4486
460

    
461
<<<
462
== Recommendations for Real-World Implementations
463

    
464
=== BCCH SI3: ATT = 0
465

    
466
When changing from one pseudonymous IMSI to the next, it is important that the
467
ME does not detach from the network. Otherwise it would be trivial for an
468
attacker to correlate the detach with the attach of the same ME with the next
469
pseudonymous IMSI.
470

    
471
This is controlled with the ATT flag in the SYSTEM INFORMATION TYPE 3 (SI3)
472
message on the Broadcast Control Channel (BCCH), see 3GPP TS 44.018 Section
473
10.5.2.11. It must be set to 0.
474

    
475
// FIXME: verify how it set with operators in germany (OS#4404)
476

    
477
=== End to End Encryption of SMS
478

    
479
When deploying the IMSI pseudonymization, the operator must make sure that
480
the next pseudonymous IMSI SMS (<<sms-structure>>) cannot be read or modified
481
by third parties. Otherwise, the next pseudonymous IMSI is leaked, and if the
482
pseudonymous IMSI in the SMS was changed, the SIM/USIM would be locked out of the
483
network.
484

    
485
The safest way to protect the next pseudonymous IMSI SMS is a layer of end to
486
end encryption from the HLR/HSS to the SIM/USIM.  The existing means for OTA SMS
487
security (3GPP TS 23.048) provide mechanisms for integrity protection,
488
confidentiality as well as replay protection and must be implemented when using
489
IMSI pseudonymization.
490

    
491
=== User-configurable Minimum Duration Between IMSI Changes
492

    
493
It may be desirable to let subscribers configure their minimum duration between
494
IMSI changes. This allows subscribers with a high privacy requirement to switch
495
their pseudonymous IMSI more often, and it allows the pseudonymous IMSI change
496
to happen less frequently if it is distracting to the subscriber.
497

    
498
How distracting the pseudonymous IMSI change is, depends on the ME. The
499
following examples were observed:
500

    
501
// FIXME: might need an update after SYS#4481
502

    
503
* A Samsung GT-I9100 Galaxy SII smartphone with Android 4.0.3 displays a
504
  message at the bottom of the screen for about 5 seconds, but the user
505
  interface remains usable.
506
* A Samsung GT-E1200 feature phone displays a waiting screen for 16 to 17
507
  seconds and is unusable during that time.
508

    
509
<<<
510
[[reference-src]]
511
== Reference Implementation with Source Code
512

    
513
A reference implementation for the SIM applet (<<sim-app>>) is available in
514
source code under the Apache-2.0 license at:
515

    
516
https://osmocom.org/projects/imsi-pseudo
517

    
518
The HLR/HSS modifications described in <<hlr-imsi-pseudo-storage>> and
519
<<process-update-location-hlr>> were implemented for reference in OsmoHLR from
520
the Osmocom project, licensed under AGPL-3.0. Information about the source code
521
and related branches for IMSI pseudonymization can be found at the above URL as
522
well.
(3-3/4)
Add picture from clipboard (Maximum size: 48.8 MB)