|
May 20, 2018, 02:49:13 PM Last edit: May 20, 2018, 03:05:08 PM by vic2 |
|
Samsung C6112 phone contains three main functions: 1. protection of conversations and SMS from control via GSM operator, as well as through active, semi-active complexes of GSM interception, catcher 2. phone bridge mode, when the phone hides your location or Vice versa indicates what you need. 3. mode secure calls through a server with blood.
The phone has a mechanical mute. When the halves of the phone are shifted, the microphone is mechanically disconnected, if you push the halves of the phone apart, the microphone will be turned on. This feature will not allow you to remotely turn on the phone's microphone while it is complicated. Thus, there is no need to buy noise cases.
Talk protection mode: In this mode, the phone will detect any active and semi-active interception systems and ketchers. This is a very real threat recently, and it is connected with a significant drop in prices for equipment for GSM communication interception. None of the phones can see the operation of the interception systems, because the systems have become perfect, and the regular functions of the phone do not contain the ability to detect complexes. Even the output of an open lock when disabling encryption is now absent in phones. Our phone based on the analysis of many features detects interception complexes. Phone settings can be made manually ( for specialists) and automatically set to the recommended values by the manufacturer. When you change the SIM card and change the phone IMEI you go away from control through the operator.
Mode secure calls through a server with blood: Phone calls, working with service takeover, through the server set in England. Using the service will allow you to set the phone number that the subscriber will see on the screen of your phone to which you are calling. In this case, if this subscriber takes from the operator his printout of conversations, he will see the same number that he had displayed on the phone screen. And since you have set the number yourself, it can not be put on control, you can not know the history of conversations. You will be able to change your voice that your caller will hear. The service includes unlimited calls all over the world. The location of the phone cannot be detected. Made a very convenient use of this service, you can, how to dial a number on the screen or select it from your notebook, and make a regular call. Then the phone will do everything automatically.
Telephone bridge mode: This mode allows you to either hide your real location position or Vice versa, specify it where you want. For example, at a certain time you have to be in some place for those who control you. And you will be able to provide it, being at this time, for example, in another country. The operation of this mode does not require the Internet, and complex settings.
The hidden phone menu contains the following functions:
IMEI-automatic and manual change of IMEI, protection from the control of conversations through the operator LAC tracking - create a profile for a specific location Weak A5 - warning about lowering of encryption relative to A5.1 Detect call ping-detect silent calls; Detect SMS ping-detect all types of hidden SMS, and ban all types of SMS that may harm your phone Channel lock-phone operation from remote base stations Alerts - select alarm for events Show TIMSI display TIMSI on the phone screen Clear call log deletion of information about calls from the phone Fake SMS detection SMS spoofing rooms Block C2-phone ignores one of the parameters controlled by the operator complex to capture the phone Parameters - a set of parameters by which the phone detects the interception complex Parameters1 Parameters2 One channel Recording-automatic recording of conversations Master RF-on delay-delay of switching on one of the phone's halves relative to the other Substitution-setting the phone operation in mode 1. regular calls 2. calls in mode telephone bridge 3. calls with number substitution through the server Online test - the ability to quietly find out whether the subscriber is on the network Encrypting SMS-SMS encryption Event log view-log of the last 20 events Settings profiles - automatic configuration of parameters Reset settings-reset to recommended Information-display of the software version
If the phone detects one of the enabled events, an audio signal will be heard, and \ or a vibration signal, depending on the settings, the screen will display a message about what event happened, for which SIM card this event was, as well as this event will be recorded in the log file.txt.
|