Bitcoin Forum
April 18, 2024, 09:00:44 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Samsung G600 Stealth Secure Phone Anti Spy Interception-IMSI catcher, Auto Imei  (Read 1729 times)
Card_master (OP)
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
March 25, 2015, 09:51:04 AM
 #1

Hi this sale is for 1x samsung g600 anti interceptor anti tapping stealth self imei changing phone

phone comes with a charger and a tutorial

http://i.ebayimg.com/00/s/NDAwWDUwMA==/z/VuQAAOSw9NxTw7qe/$_35.JPG


PRICE: 150$

Accepting BTC, PP, SKRILL, WU

Possible to buy through Cryptothrift

Samsung g600 stealth anti-interceptor anti-tapping self imei changing phone..

This is a GSM untraceable mobile phone device which can’t be tapped or traced and is based on the Samsung cellular phone will ware you about any intrusion and interception attempt.

Every time you change the SIM card, the phone will randomize its unique IMEI number automatically. The IMEI numbers that are produced automatically by this phone will never be repeated. The IMEI will also change on every new call that is made and on any sent SMS messages. Interception of calls made or received by such a phone becomes and impossible mission.

You can change the IMEI number of the device to another number of your choice e.g. enter the IMEI number of another person.

The telephone tap defeat / GSM Interception detection is accomplished using in-built fake base station / GSM Interceptor detector technology of which will alert you if either an SMS / text message, outgoing or incoming call is made via such GSM interception technology.

Over the past decades, telecommunications interception has developed into a huge worldwide industry allowing a phone to be bugged remotely.

Different foreign and local agencies, security organizations within almost all countries routinely intercept calls and are able to bug a telephone remotely that may yield sensitive politica, military or economic information. The use of wiretapping has become so widespread, simple and uncontrolled that you must assume that records of you private calls end up in the wrong hands.

If you change the IMEI and the SIM all the identification structures which you can be controlled with, will be changed. So that the provider does not know who he should control. If you change only the SIM or only theIMEI it will not have any result and you will still be controllable like you have not changed anything. If you are being controlled using a complex, the simultaneous change of the IMEI and the SIM will temporary stop control. Because all the identification structures, which are recorded in the selection list of the complex, were changed, the complex has to make extra efforts to get your new identification structures. In addition, often the complex cannot directly see that it has no control over your phone anymore. It is better not just to turn off the device, but to remove the battery from the working device so that the complex cannot register that the phone was switched off. Active complexes may not work correctly, so they can be detected by additional features. For example, a test of the device with only changing of IMEI on one of the most functional and popular active complexes has shown that when the phone comes to the area which is covered by the complex, the phone seems to work normally, also the level of a signal is shown, but it is impossible to call from this phone, also the incoming calls cannot be received.
Bitcoin mining is now a specialized and very risky industry, just like gold mining. Amateur miners are unlikely to make much money, and may even lose money. Bitcoin is much more than just mining, though!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713474044
Hero Member
*
Offline Offline

Posts: 1713474044

View Profile Personal Message (Offline)

Ignore
1713474044
Reply with quote  #2

1713474044
Report to moderator
vic2
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
May 19, 2018, 05:59:15 PM
 #2

And so - it is a copy of our phone with the program of a sample of 2007-2008. Then we had only just started and because there have been many shortcomings and mistakes. In consequence all legal copies to your clients we have updated. In this program, even in the function change IMEI is an error about which we did not know then. Your native email will be at the operator at each change of the SIM card. Later this glitch was eliminated. The new version of this buggy you'll be externally input in the settings menu EXTRA. In the new version this menu is not explicitly in the phone menu. And you can get to the Extra only by a combination of numbers * # XXXXXXXX# and then enter the password. The latest update on the Samsung G600 was made in the fall of 2014. More this model is not supported, and it was replaced by a new model Samsung C6112, which is much better than this and which will be supported for another 2-3 years. Buying a phone from crooks with strara program you will not only lose money but also put yourself at risk, because the phone does not perform as expected the stated functions.?
it piratska copy but what is the difference from the original I carefully explain to their clients and bad reviews fiction ). - I'm sure that's not true, because I'm turning off up to a hundred phones a month around the world, remotely.
Since you do not know what contains our old version I will write to you - still I was asked to do it normal sellers:
because a lot of them were sold in England on the XCell website first about the holes in this version

What did the crooks do from Home / XCell Stealth Phones :

1. According to their website, they made their box.

2. Erased inscription Samsung on the glass and drew his traforata.

3. Instead of writing EXTRA written XCELL, this is done in 5 minutes, we did not attach importance that you can easily change the name, but as I see in vain.

4. Drew a picture in the format .gifs are moving pictures. And their picture does not make any changes in the functionality, just a picture.

5. Pasted stickers on chips with the statement that these chips they rewired and put their own, which is a blatant lie.

On Siemens, the same hole in the email, besides the first half of the numbers there does not change at all, we offered the buyer (bought the firmware) for some money to bring to mind but they did not agree, so vparivayut.

This is where their innovation ends!

Our policy on the contrary is that the phone is no different from the usual phone. Therefore, we have not engaged in such nonsense such as the pictures and inscriptions.

They constantly write that they have updated versions of what is a lie, because NOTHING to change in the program and even more so to correct or improve, they basically can not. Sellers are just crooks who deliberately deceive customers.


Holes and glitches in the copy version:
0. The phone did not see and did not react to the complexes that did not send a command to lower the encryption, these complexes simply do not support encryption. And such complexes now became very much, is done roughly speaking on two tubes of a Motorola, or freely sold receiver and transmission boards.

1. The function of changing the e-MAIL has a hole that neviliruet change the SIM card in the phone. Ie, having once native IMEY phone further change of SIM card do not make sense, if a person who controls you have access to the service provider. This is due to the fact that the EMAIL in the phone changes dynamically, and the operator when you change the SIM card has the ability to receive and actually receives the factory email stitched into the phone. We found out about this hole about two years after the version of our phone was copied. In all new versions we separately did a patch that would close this hole.
The version that will be for sale in the Internet all contain this flaw. This drawback remained in all models of Siemens phone with IMEI change that we did.

2. The function of pings calls after 2007 (namely this version sold on the Internet) has been modified many times, because there were many false positives. Detection method perovich calls were radically reworked.

3. We changed the function of operator profiles by abandoning the profiles in principle and made it different, because users often forgot to create a profile for a new operator.

4. The fuction of work from remote base stations has been repeatedly improved, because when the signal was lost, the device reset this mode and went to the strongest channel, while the user did not see it because everything remained as before in the phone menu, as if nothing had happened. It is for this reason that we first did not see this glitch for a long time and then it was difficult to find the cause of its occurrence.

5. The icon of encryption decrease did not work, and the device did not see if there was a decrease during passive operation of the phone. This has been fixed by a separate item in our menu-Scan detector

6. when working with new base stations, the device was happily restarted at any time, either in conversation or on duty. The glitch appeared about 4 years ago.

7. Recording conversations did not always work. I myself have had a couple of cases when the phone did not record important conversations, it would be better he did not write sooner and these recorded. And it was a recording restriction for 30 minutes.



It was a lot smaller and not clearly visible patches.............



Differences from the final version of Samsung G600 made in the autumn of 2014:

1. Fixed a hole with sending native IMEI to the operator.

2. Made the most correct (it is recommended by the manufacturer when resetting) mode change IMEI - only in the case of changing the SIM card.

3. The extremely important functions related to the detection of active, semi-active complexes and ketchers have been improved, I do not even want to list what has been done, but the phone 2007 (copies) and 2014 are heaven and earth.


The phone contains the following functions:

IMEI - change IMEI, protection from the control of conversations through the operator
A5 profiles-protection against active complexes
Call ping-silent call detection
SMS ping-detection of all types of hidden SMS, as well as SMS that can harm the phone.
Scan detector - detection lowering it in a passive state phone
Channels lock - protection against passive and active complexes with A5 processor.1
Alerts - select alarm for events
Show TIMSI display TIMSI on the phone screen
Clear call log deletion of information about calls from the phone
One channel-determine if there is one channel in the network
Bluetooth-low level
Recording-automatic recording of conversations
Reset settings-reset to recommended
Information - shows the version of the software




About Motorola: in them except a glitch with an e-mail there is not correctness that the first 8 digits remain invariable, it is a serious binding. I used to ask the Englishman to rework Siemens for a fee, but he refused.


 the price of the G600 is 40 000 rubles, the last update in autumn 2014. And here is a new model based on Samsung C6112-150 000 rubles. But this phone was not standing next to the G600 and this is a cool professional product.

ray-spyphones.com
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!