馃摗 The talk is about decoupling the SIM card from the mobile phone or modem to perform various measurements.
馃寪 Roaming in cellular networks can be complex and interesting due to the differences in configurations, hardware, and software between home and visiting networks.
馃挵 International travel and testing in different networks can be expensive and tedious.
馃寪 MobileAtlas decouples SIM cards from modems and enables global connectivity.
鈿欙笍 Goals of the project include scalability, automatability, and controlling background noise.
馃敀 Challenges faced include adapting the SIM interface and protocol for global usage.
馃敡 The use of SIM tunneling and Schottky diodes simplifies the negotiation of speeds and voltages between the SIM provider and the modem.
馃攧 Linux network spaces and binary encoding are used to control background traffic and ensure accurate measurements of data counting.
馃摬 Bluetooth rSAP protocol allows for the connection and sharing of SIM cards between an Android phone and the system.
馃寪 SIM tunneling provides an opportunity for carriers to verify services and improve configurations for Voice over LTE roaming.
馃攽 SIM cards can update or change their unique identifier (IMSI) over the air for roaming purposes.
鈿欙笍 USB devices have a practical limit of around 20-30 devices due to hardware and driver limitations.
馃搷 The system has been deployed to 10 European countries and North America, with some limitations in Canada.
馃敩 The use of modems instead of software-defined radios is due to regulatory challenges and safety concerns.
馃挕 The platform allows for internet-related measurements, including billing and abuse of zero-rating offers.
馃攳 Different metrics are used for traffic classification, including UDP port, IP address, and deep packet inspection.
馃搳 The study focused on deep packet inspection and analyzed zero-rating applications like WhatsApp, Snapchat, and Facebook Messenger.
馃И Experiments were conducted to verify web endpoints' zero-rating, detect IP-based and hostname-based classification methods.
馃敀 Operators use both IP-based and hostname-based classification for zero-rating traffic.
鈿欙笍 Attackers can exploit hostname-based classification by faking host data and spoofing SNI in TLS connections.
馃攳 Location tracking can be done through ringback tones issued by terminating operators, allowing differentiation between operators.
馃實 By analyzing the amplitude and frequency of calls, it is possible to determine the operator and country of the callee.
馃摫 SIM cards can send covert binary SMS messages without the user's knowledge, containing information about the user equipment.
馃敀 Roaming is an interesting case where two operators cooperate, and there are ways to exploit it for hiding traffic and locating subscribers.