Project

General

Profile

Download (21.2 KB) Statistics
| Branch: | Revision:
1
= Specification for IMSI Pseudonymization on the Radio Interface for 2G/3G/4G
2

    
3
== Introduction
4

    
5
=== Protecting the IMSI on the Radio Interface is Desirable
6

    
7
A long-standing issue in the 3GPP specifications for cellular mobile
8
communications starting from 2G (GSM) is, that mobile phones and
9
other mobile equipment (ME) have to send the International Mobile Subscriber
10
Identity (IMSI) unencrypted over the air.  Each IMSI is a unique identifier for
11
the subscriber. Therefore, most people can be uniquely identified by recording
12
the IMSI that their ME is sending.
13

    
14
The 3GPP specifications provide means for implementations to send the
15
IMSI less often by using the Temporary Mobile Subscriber Identity (TMSI)
16
where possible.  However, the decision on when to use IMSI or TMSI is
17
entirely on the networks side, without any control by the ME or even the
18
subscriber.
19

    
20
This leads to a variety of attacks on subscriber location privacy, including
21
the use of passive air-interface sniffing as well as false base station
22
attacks, where an attacker impersonates a base station which
23
subsequently inquires every ME about its IMSI.
24

    
25
Some related devices have been termed _IMSI catchers_ or _Stingray_ in
26
both scientific literature as well as mainstream media. IMSI catchers have
27
become small and affordable during the last decade; criminals actors
28
and in some cases even tabloid journalists without much budget have
29
reportedly used them to track anybody with a mobile phone.
30

    
31
5G addresses this problem with the Subscriber Concealed Identifier (SUCI),
32
which uses public-key cryptography to ensure that the permanent subscriber
33
identity (IMSI) is not transmitted over the air interface anymore.
34
Rather, a concealed version of it is transmitted (3GPP TS 33.501,
35
Section 6.12.2).  The 5G SUCI mechanism can not be used 1:1 for previous
36
generations of cellular networks as it relies on extending the
37
subscriber identity from the small, 15-decimal-digit IMSI to a much
38
larger SUPI (Subscriber Permanent Identifier) only available in 5G.
39

    
40
No mechanism for increasing subscriber identity and location privacy on
41
the radio interface has been specified for the previous cellular
42
technologies 2G (GSM), 3G (UMTS) and 4G (LTE).  Meanwhile, pure 5G
43
networks are and will remain rare for many years to come, as operators
44
have to support billions of deployed legacy pre-5G ME.  Operating
45
combined 5G + previous technology networks enables the so-called
46
"downgrade attacks" where the attacker blocks access to 5G e.g. by means
47
of jamming/interference, and hence triggers the ME to use a previous
48
generation which is still susceptible to the attacks.
49

    
50
This specification proposes a different approach to conceal the
51
IMSI for legacy 2G, 3G and 4G networks.
52

    
53
=== Summary of Proposed Solution
54

    
55
The solution presented in this document is to periodically change the IMSI of
56
the ME to a new pseudonymous IMSI allocated by the Home Location Register (HLR)
57
or Home Subscriber Service (HSS). The next pseudonymous IMSI is sent to the SIM/USIM
58
via Short Message Service (SMS), then a SIM applet overwrites the IMSI of the
59
SIM/USIM with the new value. The only components in the network that need to be
60
changed in order to support this mechanism are the SIM/USIM and the
61
HLR/HSS.  All other elements (like BTS, NodeB, eNodeB, BSC, RNC, MME,
62
MSC/VLR, SGSN, GGSN, S-GW, P-GW, ...) remain as-is, without any changes
63
to their specification or implementation.
64

    
65
Constraining the required changes to only two elements in the network
66
enables quick adoption potential for the proposed mechanism.
67
Furthermore, as SIM/USIM and HLR/HSS are the only two elements under control
68
of a Mobile Virtual Network Operator (MVNO), this mechanism can be
69
deployed by a MVNO without any changes to the operators of the physical
70
infrastructure (MNO).
71

    
72
<<<
73
=== Summary of Existing Location Updating Procedures in RAN and CN
74

    
75
Every subscriber's SIM/USIM is provisioned with the IMSI and secret
76
cryptographic keys (Ki or K+OP[c]).  The same IMSI and key data is also provisioned
77
into the HLR/HSS, the central subscriber database of a cellular network.
78

    
79
In a number of different situations, the IMSI is sent over the air
80
interface and back-haul towards the Core Network (CN), where it is
81
validated by the HLR/HSS. The involved components vary by the generation
82
of the network and whether the SIM/USIM is attempting a Circuit Switched (CS)
83
or Packet Switched (PS) connection, but the principle is the same. This
84
document uses 2G CS Location Updating for reference, as in
85
<<figure-imsi-regular>>.
86

    
87
The IMSI is transmitted in the Location Updating Request from ME. The VLR
88
needs an authentication challenge specific to the secret keys on the SIM/USIM to
89
authenticate the SIM/USIM, and looks the authentication challenges up by the IMSI.
90
If the VLR does not have any more authentication challenges for the IMSI (as it
91
happens when the VLR sees the IMSI for the first time), the VLR requests new
92
authentication challenges from the HLR/HSS. Then the HLR/HSS verifies that the IMSI is
93
known and, if it is unknown, sends back an error that will terminate the
94
Location Updating procedure.
95

    
96
After the VLR found the authentication challenge, it authenticates the SIM/USIM, and
97
performs a Classmark Enquiry and Physical Channel Reconfiguration. Then the VLR
98
has the required information to finish the Location Updating, and continues
99
with Process Update_Location_HLR (3GPP TS 29.002). Afterwards, the VLR assigns
100
a new TMSI with the Location Updating Accept, which is acknowledged by the TMSI
101
Reallocation Complete. In following Location Updates with the same MSC, the ME
102
sends the TMSI instead of the IMSI in the Location Updating Request.
103

    
104
However, the allocation of the TMSI is optional (the network may choose
105
to not perform it), and particularly at mobility changes across the
106
MSC/VLR boundary, or even across the PLMN boundary, the TMSI allocated
107
by the previouis network element may not be known, and an IMSI based
108
Location Updating procedure is used.
109

    
110
Furthermore, at any given point in time, a legitimate network or a rogue
111
base station can inquire the IMSI from the ME using the "MM IDENTITY
112
REQUEST (IMSI)" command.
113

    
114
[[figure-imsi-regular]]
115
.Location Updating in 2G CS with IMSI
116
["mscgen"]
117
----
118
msc {
119
  hscale="1.75";
120
  ME [label="ME"], BTS [label="BTS"], BSC [label="BSC"], MSC [label="MSC/VLR"],
121
  HLR [label="HLR"];
122

    
123
  // BTS <=> BSC: RSL
124
  // BSC <=> MSC: BSSAP, RNSAP
125
  // MSC <=> HLR: MAP (process Update_Location_HLR, 3GPP TS 29.002)
126

    
127
  ME   => BTS [label="Location Updating Request"];
128
  BTS  => BSC [label="Location Updating Request"];
129
  BSC  => MSC [label="Location Updating Request"];
130

    
131
  --- [label="If necessary: VLR requests new authentication challenges for this IMSI"];
132
  MSC  => HLR [label="Send Auth Info Request"];
133
  MSC <=  HLR [label="Send Auth Info Result"];
134
  ---;
135

    
136
  BSC <=  MSC [label="Authentication Request"];
137
  BTS <=  BSC [label="Authentication Request"];
138
  ME  <=  BTS [label="Authentication Request"];
139
  ME   => BTS [label="Authentication Response"];
140
  BTS  => BSC [label="Authentication Response"];
141
  BSC  => MSC [label="Authentication Response"];
142
  BSC <=  MSC [label="Classmark Enquiry"];
143
  BTS <=  BSC [label="Classmark Enquiry"];
144
  ME  <=  BTS [label="Classmark Enquiry"];
145
  ME   => BTS [label="Classmark Change"];
146
  BTS  => BSC [label="Classmark Change"];
147
  BSC  => MSC [label="Classmark Update"];
148
  BSC <=  MSC [label="Physical Channel Reconfiguration"];
149
  BTS <=  BSC [label="Ciphering Mode Command"];
150
  ME  <=  BTS [label="Ciphering Mode Command"];
151
  ME   => BTS [label="Ciphering Mode Complete"];
152
  BTS  => BSC [label="Ciphering Mode Complete"];
153
  BSC  => MSC [label="Ciphering Mode Complete"];
154

    
155
  --- [label="Process Update_Location_HLR (3GPP TS 29.002)"];
156
  MSC  => HLR [label="Update Location Request"];
157
  MSC <=  HLR [label="Insert Subscriber Data Request"];
158
  MSC  => HLR [label="Insert Subscriber Data Result"];
159
  MSC <=  HLR [label="Update Location Result"];
160
  ---;
161

    
162
  BSC <=  MSC [label="Location Updating Accept"];
163
  BTS <=  BSC [label="Location Updating Accept"];
164
  ME  <=  BTS [label="Location Updating Accept"];
165
  ME   => BTS [label="TMSI Reallocation Complete"];
166
  BTS  => BSC [label="TMSI Reallocation Complete"];
167
  BSC  => MSC [label="TMSI Reallocation Complete"];
168
}
169
----
170

    
171
<<<
172
== Required Changes
173

    
174
This section covers the changes / enhancements required
175
compared to the existing 3GPP specifications.
176

    
177
[[hlr-imsi-pseudo-storage]]
178
=== Pseudonymous IMSI Storage in the HLR/HSS
179

    
180
The HLR/HSS must store up to two pseudonymous IMSIs (`imsi_pseudo`) and
181
their related counters (`imsi_pseudo_i`) per subscriber. Each subscriber
182
initially has one pseudonymous IMSI allocated. A subscriber has two
183
valid pseudonymous IMSIs only during the transition phase from the old
184
pseudonymous IMSI to the new one.
185

    
186
Subsequently, the amount of available IMSIs must be higher than the
187
amount of subscribers registered with the HLR/HSS. If the amount of
188
available IMSIs is too small, the HLR/HSS could delay assigning new
189
pseudonymous IMSIs until new IMSIs are available again.
190

    
191
.Examples for additional subscriber data in HLR
192
[options="header"]
193
|===
194
| Subscriber ID | imsi_pseudo | imsi_pseudo_i
195
// example IMSIs taken from Wikipedia
196
| 123
197
| 310150123456789
198
| 1
199

    
200
| 234
201
| 502130123456789
202
| 1
203

    
204
| 234
205
| 460001357924680
206
| 2
207
|===
208

    
209
==== imsi_pseudo
210

    
211
The value for `imsi_pseudo` is a random choice from the pool of available
212
IMSIs that the HLR/HSS controls. The pseudonymous IMSI must not be used
213
by any subscriber as pseudonymous IMSI yet, but may be the real IMSI of
214
a subscriber.
215

    
216
[[hlr-imsi-pseudo-i]]
217
==== imsi_pseudo_i
218

    
219
The counter `imsi_pseudo_i` indicates how often a subscribers pseudonymous IMSI
220
was changed. The value is 1 for the first allocated pseudonymous IMSI of a
221
subscriber. When allocating a new pseudonymous IMSI for the same subscriber,
222
the new `imsi_pseudo_i` value is increased by 1. The counter is used by the SIM/USIM
223
applet to detect and ignore outdated requests related to changing the
224
pseudonymous IMSI.
225

    
226
<<<
227
=== SIM/USIM Provisioning
228

    
229
IMSI pseudonymization as specified by this document works with
230
traditional SIM (used in 2G), as well as with USIM (used from 3G
231
onwards).
232

    
233
The initial IMSI provisioned in the SIM/USIM is provisioned as the initial
234
pseudonymous IMSI in the HLR/HSS.
235

    
236
[[sim-app]]
237
==== SIM applet
238

    
239
SIM/USIM have long supported the installation and operation of
240
additional applets on the card itself.  The programming language and
241
runtime environment for such applets is an implementation detail.
242
However, the industry has converged around JavaCards with related
243
additional APIs specific to SIM, UICC and USIM.  Depending on the card
244
profile / provisioning, it is possible for such applets to access the
245
card file system and modify files on the card, such as the file storing
246
the IMSI.
247

    
248
A SIM/USIM compatible with this specification is provisioned with a SIM
249
applet, which is able to change the IMSI once the next pseudonymous IMSI
250
arrives from the HLR/HSS. A reference implementation is provided in
251
<<reference-src>>.
252

    
253
===== Counter Storage
254

    
255
The following counter variables are stored in the SIM applet.
256

    
257
[options="header",cols="20%,12%,68%"]
258
|===
259
| Name | Initial value | Description
260

    
261
| imsi_pseudo_i
262
| 1
263
| See <<hlr-imsi-pseudo-i>>.
264

    
265
| imsi_pseudo_lu
266
| 0
267
| Amount of Location Updating procedures done with the same pseudonymous IMSI.
268

    
269
| imsi_pseudo_lu_max
270
| (decided by operator)
271
| Maximum amount of Location Updating procedures done with the same
272
  pseudonymous IMSI, before the SIM applet shows a warning to the subscriber.
273
|===
274

    
275
===== Switch to Next Pseudonymous IMSI
276

    
277
The SIM applet registers to a suitable SMS trigger (3GPP TS 43.019, Section
278
6.2). When an SMS from the HLR/HSS in the structure of <<sms-structure>> arrives,
279
the applet must verify that the SMS is not outdated by comparing `imsi_pseudo_i`
280
from the SMS with the last `imsi_pseudo_i` that was used when changing the IMSI
281
(initially 1 as in <<hlr-imsi-pseudo-i>>). The new value must be higher,
282
otherwise the SMS should not be processed further.
283

    
284
The SIM applet registers a timer with `min_sleep_time` from the SMS. When the
285
timer triggers, EF~IMSI~ of the SIM/USIM is overwritten with the new pseudonymous
286
IMSI. The TMSI and related data (EF~LOCI~, EF~PSLOCI~) and ciphering keys
287
(EF~Kc~, EF~KcGPRS~, EF~Keys~, EF~KeysPS~) are invalidated (see 3GPP TS
288
31.102). The current `imsi_pseudo_i` from the SMS is stored in the
289
SIM applet to compare it with the next SMS. `imsi_pseudo_lu` is reset to 0. Afterwards,
290
the EF~IMSI~ changing procedure in 3GPP TS 11.14, Section 6.4.7.1 is executed
291
to apply the new IMSI.
292

    
293
// FIXME: do we need to enforce the LU now, with an arbitrary CM Service
294
// Request, or would this only be necessary for Osmocom? (OS#4404)
295

    
296
===== Warning the Subscriber If the Pseudonymous IMSI Does Not Change
297

    
298
An attacker could potentially block the next pseudonymous IMSI SMS on purpose.
299
Because the SIM applet cannot decide the next pseudonymous IMSI, it would have
300
the same pseudonymous IMSI for a long time. Then it could become feasible for
301
an attacker to track the subscriber by their pseudonymous IMSI. Therefore the
302
SIM applet should warn the subscriber if the pseudonymous IMSI does not change.
303

    
304
The SIM applet registers to EVENT_EVENT_DOWNLOAD_LOCATION_STATUS (3GPP TS
305
03.19, Section 6.2) and increases `imsi_pseudo_lu` by 1 when the event is
306
triggered. If `imsi_pseudo_lu` reaches `imsi_pseudo_lu_max`, the SIM applet
307
displays a warning to the subscriber.
308

    
309
<<<
310
[[process-update-location-hlr]]
311
=== Process Update_Location_HLR
312

    
313
All IMSI Pseudonymization related changes to Process Update_Location_HLR
314
(3GPP TS 29.002) are optional. Deviations from the existing specification that
315
are outlined in this section are expected to be enabled or disabled entirely
316
where IMSI pseudonymization is implemented.
317

    
318
[[figure-imsi-pseudo]]
319
.Process Update_Location_HLR with IMSI pseudonymization changes
320
["mscgen"]
321
----
322
msc {
323
  hscale="1.75";
324
  MSC [label="MSC/VLR"], SMSC [label="SMS-SC"], HLR [label="HLR"];
325

    
326
  MSC   => HLR  [label="Update Location Request"];
327

    
328
  --- [label="If new pseudonymous IMSI was used: deallocate and cancel old pseudonymous IMSI"];
329
  HLR  box HLR  [label="Deallocate old pseudonymous IMSI"];
330
  MSC  <=  HLR  [label="Cancel Location Request"];
331
  MSC   => HLR  [label="Cancel Location Result"];
332
  ---;
333

    
334
  MSC  <=  HLR  [label="Insert Subscriber Data Request"];
335
  MSC   => HLR  [label="Insert Subscriber Data Result"];
336
  HLR  box HLR  [label="Start Next_Pseudo_IMSI_Timer"];
337
  MSC  <=  HLR  [label="Update Location Result"];
338
  MSC  box MSC  [label="Finish Location Updating with ME"],
339

    
340
  HLR  box HLR  [label="Wait for Next_Pseudo_IMSI_Timer expiry"];
341
  |||;
342
  ...;
343
  |||;
344
  HLR  box HLR  [label="Next_Pseudo_IMSI_Timer expired"];
345

    
346
  HLR  box HLR  [label="\nAllocate new pseudonymous IMSI\nif subscriber has only one allocated\n"];
347
  SMSC <=  HLR  [label="Next Pseudonymous IMSI SMS"];
348
  SMSC box SMSC [label="Deliver SMS to ME"];
349
}
350
----
351

    
352
==== Update Location Request
353

    
354
When Update Location Request arrives, the HLR/HSS does not look up the subscriber
355
by the IMSI, but by the pseudonymous IMSI instead. Unless the subscriber has
356
two pseudonymous IMSI allocated and used the new pseudonymous IMSI in the
357
Update Location Request, this is followed by the existing logic to continue
358
with Insert Subscriber Data Request.
359

    
360
===== Update Location Request With New Pseudonymous IMSI
361

    
362
If the subscriber has two pseudonymous IMSIs allocated, and the newer entry was
363
used (higher `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>), this section applies.
364
The older pseudonymous IMSI is deallocated in the HLR/HSS. This is done as early
365
as possible, so the timeframe where two pseudonymous IMSI are allocated for one
366
subscriber is short.
367

    
368
A Cancel Location Request with the old pseudonymous IMSI is sent to the VLR, so
369
the conflicting subscriber entry with the old pseudonymous IMSI is deleted from
370
the VLR. Receiving a Cancel Location Result is followed by the existing logic
371
to continue with Insert Subscriber Data Request.
372

    
373
===== Update Location Request With Old Pseudonymous IMSI
374

    
375
If the subscriber has two pseudonymous IMSIs allocated, and the older entry was
376
used (lower `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>), the newer entry is _not_
377
deallocated. This could lock out the subscriber from the network if the SMS
378
with the new pseudonymous IMSI arrives with a delay.
379

    
380
==== Insert Subscriber Data Result
381

    
382
When Insert Subscriber Data Result arrives, a subscriber specific
383
Next_Pseudo_IMSI_Timer starts.
384

    
385
==== Next_Pseudo_IMSI_Timer Expires
386

    
387
If the subscriber has only one pseudonymous IMSI allocated, and the amount of
388
available IMSIs in the HLR/HSS is high enough, a second pseudonymous IMSI and
389
related `imsi_pseudo_i` gets allocated for the subscriber (as described in
390
<<hlr-imsi-pseudo-storage>>).
391

    
392
If the subscriber still has only one pseudonymous IMSI, because not enough
393
IMSIs were available in the HLR/HSS, the process is aborted here and no SMS with
394
a next pseudonymous IMSI is sent to the subscriber. The subscriber will get a
395
new pseudonymous IMSI during the next Location Updating Procedure, if
396
the HLR/HSS has enough IMSIs available at that point.
397

    
398
An SMS is sent to the SMS - Service Centre (SMS-SC) with the newer pseudonymous
399
IMSI (higher `imsi_pseudo_i`, see <<hlr-imsi-pseudo-i>>) and related
400
`imsi_pseudo_i` value.
401

    
402
[[sms-structure]]
403
==== Next Pseudonymous IMSI SMS Structure
404

    
405
.Next pseudonymous IMSI SMS structure
406
[packetdiag]
407
----
408
{
409
	colwidth = 32
410

    
411
	0-31:	 IMSI_PSEUDO_I
412
	32-63:   MIN_SLEEP_TIME
413
	64-119:  IMSI_PSEUDO
414
	120-127: PAD
415
}
416
----
417

    
418
// FIXME
419
IMPORTANT: This is a draft. The structure is likely to change after the
420
reference implementation phase.
421

    
422
IMSI_PSEUDO_I: 32 bits::
423
See <<hlr-imsi-pseudo-i>>.
424

    
425
MIN_SLEEP_TIME: 32 bits::
426
Amount of seconds, which the SIM applet should wait before changing to the new
427
pseudonymous IMSI. Since it is unclear when the SMS will arrive (ME might be
428
turned off), this is a minimum amount.
429

    
430
IMSI_PSEUDO: 60 bits::
431
Telephony Binary Coded Decimal (TBCD, 3GPP TS 29.002) version of the next
432
pseudonymous IMSI.
433

    
434
PAD: 8 bits::
435
Padding at the end, should be filled with 1111 as in the TBCD specification.
436

    
437
<<<
438
== Error Scenarios
439

    
440
=== Next Pseudonymous IMSI SMS is Lost
441

    
442
If the SMS with the next pseudonymous IMSI does not arrive, the SIM/USIM will start
443
the next Location Updating Procedure with the old pseudonymous IMSI. Because
444
the HLR/HSS has both the old and the new pseudonymous IMSI allocated at this point,
445
the subscriber is not locked out of the network.
446

    
447
=== Next Pseudonymous IMSI SMS Arrives Out of Order
448

    
449
The next pseudonymous IMSI SMS may arrive out of order. Either, because the
450
network is not able to deliver them in order, or even because an attacker would
451
perform a replay attack.
452

    
453
If the SMS arrives out of order, the `imsi_pseudo_i` counter will not be higher
454
than the value the SIM applet (<<sim-app>>) has stored. Therefore, the applet
455
will discard the message and the subscriber is not locked out of the network.
456

    
457
// === SMS Arrives Before Timer Expires
458
// FIXME: OS#4486
459

    
460
<<<
461
== Recommendations for Real-World Implementations
462

    
463
=== BCCH SI3: ATT = 0
464

    
465
When changing from one pseudonymous IMSI to the next, it is important that the
466
ME does not detach from the network. Otherwise it would be trivial for an
467
attacker to correlate the detach with the attach of the same ME with the next
468
pseudonymous IMSI.
469

    
470
This is controlled with the ATT flag in the SYSTEM INFORMATION TYPE 3 (SI3)
471
message on the Broadcast Control Channel (BCCH), see 3GPP TS 44.018 Section
472
10.5.2.11. It must be set to 0.
473

    
474
// FIXME: verify how it set with operators in germany (OS#4404)
475

    
476
=== End to End Encryption of SMS
477

    
478
When deploying the IMSI pseudonymization, the operator should make sure that
479
the next pseudonymous IMSI SMS (<<sms-structure>>) cannot be read or modified
480
by third parties. Otherwise, the next pseudonymous IMSI is leaked, and if the
481
pseudonymous IMSI in the SMS was changed, the SIM/USIM would be locked out of the
482
network.
483

    
484
The safest way to protect the next pseudonymous IMSI SMS is a layer of end to
485
end encryption from the HLR/HSS to the SIM/USIM.  The existing means for OTA SMS
486
security (3GPP TS 23.048) provide mechanisms for integrity protection,
487
confidentiality as well as replay protection and must be implemented when using
488
IMSI pseudonymization.
489

    
490
=== User-configurable Minimum Duration Between IMSI Changes
491

    
492
It may be desirable to let subscribers configure their minimum duration between
493
IMSI changes. This allows subscribers with a high privacy requirement to switch
494
their pseudonymous IMSI more often, and it allows the pseudonymous IMSI change
495
to happen less frequently if it is distracting to the subscriber.
496

    
497
How distracting the pseudonymous IMSI change is, depends on the ME. The
498
following examples were observed:
499

    
500
// FIXME: might need an update after SYS#4481
501

    
502
* A Samsung GT-I9100 Galaxy SII smartphone with Android 4.0.3 displays a
503
  message at the bottom of the screen for about 5 seconds, but the user
504
  interface remains usable.
505
* A Samsung GT-E1200 feature phone displays a waiting screen for 16 to 17
506
  seconds and is unusable during that time.
507

    
508
<<<
509
[[reference-src]]
510
== Reference Implementation with Source Code
511

    
512
A reference implementation for the SIM applet (<<sim-app>>) is available in
513
source code under the Apache-2.0 license at:
514

    
515
https://osmocom.org/projects/imsi-pseudo
516

    
517
The HLR/HSS modifications described in <<hlr-imsi-pseudo-storage>> and
518
<<process-update-location-hlr>> were implemented for reference in OsmoHLR from
519
the Osmocom project, licensed under AGPL-3.0. Information about the source code
520
and related branches for IMSI pseudonymization can be found at the above URL as
521
well.
(3-3/4)
Add picture from clipboard (Maximum size: 48.8 MB)