boundlesstelecom
Boundless 2.0
Invitation tier · By consultation

The line that was only ever issued to the people who couldn't afford to be intercepted.Now the door is open.

Boundless 2.0 - sovereign-secure mobile, by discovery only. Built against a comparable threat model to the one that drove the NSA to issue a custom BlackBerry to a sitting US President.10 Brought, for the first time, into the public domain.

Boundless is not affiliated with the United States Government, the NSA or any handset manufacturer. References describe the public threat landscape only.

Scope your own package, on your own terms. The Concierge Application asks the same questions we'd cover in discovery - then a senior member of the team picks it up from there.

Hardware root of trust Sovereign UK + EU routing Cryptographic SIM re-issue
Boundless 2.0 SIM  -  premium machined hardware

The most secure consumer SIM in the public domain.

About this product · please read

What Boundless 2.0 is, what it isn't, and what we promise.

What it is

A UK consumer-and-SME mobile service operated by Boundless on top of a UK multi-network carrier relationship (Mobifon Communications Ltd). A SIM-and-service product with a hardened security plane - the Abel stack - sold by discovery consultation only.

What it isn't

Not a government-issued device, not a classified system, and not affiliated with the United States Government, the NSA, the UK Government, GCHQ, NCSC, Apple, Samsung or any handset manufacturer or sitting/former head of state. References to NSA-issued presidential phones, Samsung Knox for US-government use, and FBI/FCDO/GSMA guidance are cited solely to describe the public threat landscape that motivates the product's design.

What we promise

Boundless 2.0 raises the cost and complexity of common attacks against mobile lines. It cannot defeat a state-compelled device handover at a border, an attacker holding the principal's biometrics, or interception methods outside the public domain. "The most secure consumer SIM in the public domain" is qualified by in the public domain - not a claim against classified state systems. Service availability is subject to UK and EU coverage.

Full limits and sources are listed at the bottom of this page - see what we will not say and references.

One product · two front doors

The shift

Until now, this category of line was reserved for principals whose role, profile or family meant a normal SIM was a liability.

Boundless 2.0 opens a limited public intake. Pricing is set by consultation, not published - because the right answer for a listed-company CEO travelling to Asia twice a quarter is not the right answer for a public figure protecting a teenager from stalkerware. Same product. Different deployment. One conversation to scope it correctly.

Presidential-grade threat model

Same threats.
Different audience.
Same answer.

The threat surface that drove the NSA to issue President Obama a custom-modified BlackBerry - now on public display at the National Cryptologic Museum10 - is the same threat surface a board director, founder or public figure faces today on a standard consumer SIM. Samsung publishes a hardened platform (Knox) for US-government use11; the public-domain consumer equivalent of that posture is what Boundless 2.0 delivers.

For the record

Boundless 2.0 is not a government-issued device and is not affiliated with the United States Government, the NSA, or any handset manufacturer. References above are cited to describe the public threat landscape - not to claim a partnership.

Hotel & public Wi-Fi as default-hostile

UK FCDO travel advice for China explicitly tells business travellers to assume hotel and public networks are monitored. The FBI's Denver field office issued the public 'juice-jacking' warning on the same risk class for charging stations and public Wi-Fi.

Sources: [1] [2]

SS7 / Diameter signalling abuse

The GSMA has documented signalling-layer attack surfaces in FS.11 (SS7) and FS.19 (Diameter) for over a decade. Live exploits against ordinary consumer SIMs were demonstrated publicly at 31C3 in 2014 and have been re-confirmed in academic literature every year since.

Sources: [3]

SIM-swap fraud at scale

The UK's National Cyber Security Centre publishes guidance treating SIM-swap as a recognised attack pattern against high-value individuals. The FBI's IC3 reported losses from SIM-swap in the US alone in the hundreds of millions of dollars.

Sources: [4] [5]

AI-driven voice & number impersonation

The US FCC ruled in February 2024 that AI-generated voice in robocalls is illegal under the TCPA - a regulator-level acknowledgement that the threat is real, scaled, and now in the consumer threat model.

Sources: [6]

Compelled device-handover at borders

US Customs and Border Protection and UK Border Force both publish lawful authority to inspect, image and detain mobile devices at ports of entry - without the level of judicial oversight applied inside the country.

Sources: [7] [8]

Stalkerware on consumer phones

Coalition Against Stalkerware industry data shows tens of thousands of confirmed installations annually on civilian devices - the threat is no longer reserved for high-profile targets.

Sources: [9]

Real travel · Real exposure

What happens on a normal SIM. What 2.0 does about it.

Shanghai · 21:40 local · M&A diligence trip

A regional MD lands for a board meeting and joins the hotel Wi-Fi to download the morning's deck. Captive portal, accept terms, done. From the moment the handshake completes, every TLS-stripped fallback, every DNS query, every SIP registration is observable on the local network. The UK FCDO's published advice for travellers to China is to assume exactly this.

Boundless 2.0

On Boundless 2.0 the SIM refuses to fail open. The device prefers the hardware-rooted cellular identity over an unverified Wi-Fi join, routes through a sovereign EU/UK egress by default, and writes a tamper-evident audit row for every routing decision so the trip can be reviewed against your DPIA on return.

Sources: [1]

London → Frankfurt → Riyadh · pre-deal week

A senior counsel travels the deal route carrying privileged communications. On a normal SIM, every roaming partner along the route can attempt SS7 location queries and SMS interception - published, demonstrable attacks against the signalling plane that ordinary consumer SIMs do not defend against.

Boundless 2.0

Boundless 2.0 lines sit behind a signalling firewall posture aligned to GSMA FS.11 and FS.19. Anomalous signalling patterns trigger live key rotation and a notification to the named concierge, not a silent compromise.

Sources: [3]

FTSE-listed parent · 40-handset C-suite estate

A board considers issuing burner devices for travel. The reality is most executives will use their primary line anyway, and a burner doesn't survive contact with an aggressive welcome pack of public Wi-Fi at the airport.

Boundless 2.0

2.0 covers principals plus optional staff and family lines under the same root of trust - one provisioning ceremony, one named owner, one audit chain - without forcing burner-device theatre that nobody actually follows.

Family office · multi-jurisdictional operations

A principal's vehicle, residence and travel kit each carry connected modules that telemeter location and status. Each of those modules, on a standard M2M SIM, is reachable on the public signalling plane.

Boundless 2.0

2.0 extends the same hardware root of trust to selected M2M lines under the principal's account, with per-line behavioural baselines and a single kill-switch under named authority.

Boundless 2.0 SIM  -  exploded view of three substrates

Substrate 1

Hardware root of trust · Abel L16

Substrate 2

Sovereign routing logic · Abel L13

Substrate 3

Behavioural baseline · Abel L2

The SIM

The most secure consumer SIM
in the public domain.

Three substrates, one provisioning ceremony, one named owner. The SIM refuses to fail open within the policy boundary defined in your provisioning ceremony: no silent fallback, no helpdesk-overridden re-issue, no opaque routing decision. Every action is signed, hash-chained, and exportable.

How the partnership actually works

Carrier provides the radio.
Boundless provides the security plane.

Boundless 2.0 sits on top of a UK multi-network wholesale relationship spanning the major UK MNOs, per Mobifon Communications Ltd's published service catalogue12. That means your 2.0 line is not locked to a single operator's coverage map and not exposed to a single operator's outage profile.

On top of that radio layer, Boundless contributes the security plane that consumer carriers do not provide to retail subscribers: the hardware root of trust, the signalling firewall posture, the sovereign routing default, and the tamper-evident audit chain. Neither side does the other's job.

We do not claim Mobifon as a sovereign MNO with its own 5G SA core or satellite hybrid; the integration described on the Network page reflects the surface we have built against, not capabilities the carrier has independently published.

Connectivity guarantees · the radio layer

The signal you'd expect from a national operator - across three of them at once.

Security is the headline. Connectivity is the prerequisite. Every guarantee below is either contractual, inherited from a published carrier capability, or governed by an open 3GPP/ETSI specification. We do not invent figures we cannot stand behind.

Multi-network coverage

3 UK networks

Sits across EE, Vodafone and O2 wholesale via the underlying carrier relationship - not locked to a single operator's coverage map or outage profile.

Source: Mobifon Communications Ltd, published service catalogue [12]

Best-signal selection

Selected at session start

The modem picks the strongest viable cell when a new attachment is made. Once an IP session is up, handsets do not jump to a stronger network mid-session - that is standard 3GPP/handset behaviour, not a Boundless choice. The Signal Refresh Engine (below) is how we close that gap without breaking the user's session.

Source: ETSI TS 22.011 · 3GPP TS 23.122 PLMN selection

EU + UK roaming

30+ EEA countries

Inclusive roaming across the European Economic Area under the EU 'roam-like-at-home' framework. Coverage outside the EEA is country-by-country and confirmed during discovery.

Source: EU Regulation 2022/612 (roaming)

Failover behaviour

Automatic re-attach

On loss of the serving cell, the device re-selects the next available network per published 3GPP procedures. No manual intervention from the principal.

Source: 3GPP TS 23.122 · TS 24.008 PLMN re-selection

Sovereign egress posture

UK + EU preferred

Routine sessions prefer a UK or EU egress point by default. Visited-network breakout is used only where local lawful-intercept rules require it, and that decision is written to your audit chain.

Source: Abel L13 - sovereignty routing, default-on policy

Incident response

15-min P1 engagement

Named-concierge engagement on a P1 incident, 24/7. Not a ticket queue, not a script - one named person with the authority to act on your behalf inside the platform.

Source: Boundless concierge SLA - included on every 2.0 line

Network hopping · plain English

The line is not married to one mast.

The 2.0 SIM is provisioned across the underlying multi-MNO wholesale relationship, not a single operator. When you place a call or open a session, the device evaluates the available networks and attaches to the strongest viable cell. If that cell degrades - you walk into a basement, a mast goes down, you cross a coverage seam - the modem re-selects another network per the published 3GPP procedures.

For the record: this is standard cellular behaviour enabled by the multi-MNO SIM. It is not a proprietary Boundless radio technology, and we do not market it as one. The Boundless contribution sits above this layer - in the security plane, the sovereign routing default, and the audit chain.

Signal Refresh Engine · DDRR

Detect → Defer → Refresh → Reconnect.

Once a phone is attached to a cell with an active IP session, it does not roam to a stronger network on its own. The Boundless app closes that gap with a four-step engine that is fully compliant with App Store and Play Store rules - never silent, never disruptive.

1 · Detect

Real connection quality

RSRP/RSRQ where exposed by the OS, plus latency, jitter, packet loss, throughput, failed retries, and cell-change-vs-performance deltas - not just bars.

2 · Defer

Never interrupt the user

If you're on a call, streaming, navigating, typing or in an email, the engine waits. Zero disruption is the rule.

3 · Refresh

Single-tap, user-approved

When you're idle, a subtle prompt offers a one-tap refresh. We never silently toggle airplane mode - Apple and Google do not allow consumer apps to do that.

4 · Reconnect

Multi-MNO re-attach

The refresh drops the stale attachment, the multi-MNO SIM re-scans, and the device attaches to the strongest viable cell per 3GPP TS 23.122.

Enterprise extension

On MDM-managed and Android Enterprise device-owner handsets, parts of the refresh cycle can be automated, APN and routing policy controlled, and a private APN enforced - without losing the audit trail.

What we will not promise

Coverage and signal strength are inherited from the underlying UK mobile network operators and are subject to their published coverage maps. Boundless does not own radio infrastructure and does not guarantee service inside radio dead-zones, in tunnels, below ground, or in jurisdictions outside the carrier compatibility list. We do not publish an end-to-end uptime SLA for components we do not own end to end. We do not silently toggle airplane mode or force a cellular reset on consumer iOS or Android - the Refresh step is always user-approved.

Side by side

Where 2.0 sits against the rest of the secure-mobile category.

Not the ordinary UK telco market - that comparison lives on /transparent-comparison. This table shows the products that actually compete with 2.0 in the secure / sovereign mobile category, with publicly verifiable pricing and capability data.

Any device · no modified hardware

Keep your iPhone.
Keep your Galaxy.
Get the protection.

Boundless 2.0 delivers its security at the SIM and network layer - not the handset. It does not require a modified, custom-built or jailbroken phone. Any current-generation iPhone or Android that accepts a standard SIM (or eSIM) can run a 2.0 line, and the same protections apply identically across both ecosystems.

The SIM is the security boundary

A SIM is an independently certified secure element with its own cryptographic processor. The handset doesn't need to be modified for the SIM to enforce policy.

Source: ETSI TS 102 221 · GlobalPlatform Card Spec v2.3

The network plane does the rest

Defences against SS7 / Diameter abuse, SIM-swap and silent re-routing live in the carrier core, above the handset. This is where Abel sits.

Source: GSMA FS.11 (SS7) · FS.19 (Diameter)

Why others built custom phones

Bittium, Blackphone, KryptAll and Librem 5 ship modified hardware as a deliberate architectural choice - their security plane is integrated with the device OS. We chose the opposite architecture.

Source: Each vendor's own product page

What this claim does and does not cover

"Same protections" refers to the SIM-and-network plane only. Device-level threats - a compromised OS, a malicious app installed by the user, biometric coercion, a state-compelled handover at a border - are outside that plane and are addressed by the threat-profile workshop, not by the SIM. Device support is subject to the carrier's standard handset compatibility list (4G/5G bands, eSIM where used). We do not claim universal compatibility with every device ever made.

What others charge

A range, not a price.

Public secure-mobile plans range from $99/mo (Efani) to government-grade hardware lines from €1,795+ one-off (Bittium) plus service. Custom-modified iPhones from $4,500 (KryptAll). Several enterprise-grade vendors don't publish at all.

Figures sourced from each vendor's public pricing page - see Sources beneath the matrix.

Why we don't publish a number

Same product. Different deployment.

The right answer for a listed-company CEO travelling to Asia twice a quarter is not the right answer for a founder protecting a single executive assistant. Same SIM. Same Abel stack. Different threat surface - different scope. One conversation to size it correctly.

What discovery actually buys you

A scoped package - not a sales call.

  • ·Threat-profile workshop with our team and yours
  • ·Named concierge from day one - not a ticket queue
  • ·Sovereign routing scoped to your travel pattern
  • ·Fleet sizing for your principals and travelling staff
  • ·Audit-chain ownership in your name, exportable
Request a discovery call

Commercial transparency

Public list price, contract length, and what you sign for.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
Public list price
What the vendor publishes on its own website.
Bespoke / discoveryFrom €1,795 hardware + service[1]From $799 device + service[2]From $4,500 per device[3]From $1,999 + AweSIM service[4]$99/mo SAFE Plan[5]Not published
Contract length
Discovery-scopedHardware purchase + service contract[1]Device + monthly service[2]Device purchase, service optional[3]Hardware purchase + AweSIM monthly[4]Monthly[5]Not published
Setup / hardware fee
Provisioning ceremonyHardware mandatory[1]Hardware mandatory[2]Hardware mandatory[3]Hardware mandatory[4]None - works on existing device[5]Not published

Hardware requirement

Whether you have to buy a custom phone - or whether the security plane works on your current iPhone or Android.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
Modified handset required
Are you locked to the vendor's own hardware?
BYOD with current iPhone
BYOD with current Android
Where the security plane lives
OS-level vs SIM-and-network-level.
SIM + carrier coreCustom OS layer[1]Silent OS (Android fork)[2]Modified iOS + voice app[3]PureOS hardware kill-switches[4]Carrier-side anti-swap[5]Device + crypto module

Hardware & SIM security

What's on the SIM itself, and whether re-issue can be defeated.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
Hardware root of trust on the SIM
Cryptographic SIM re-issue ceremony
Defeats helpdesk-driven SIM-swap fraud.
Not published
Tamper-evident audit chain, customer-exportable
Not published
Secure-element certification (where published)
CC EAL-graded SECC EAL4+ device[1]Not publishedNot publishedNot publishedNot publishedNot published

Network & sovereignty

Carrier model, jurisdiction, and signalling-layer defence.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
Carrier model
UK multi-MNO via Mobifon[6]Customer-supplied SIM[1]Customer-supplied SIM[2]Customer-supplied SIM[3]Bundled US MVNO (AweSIM)[4]US MVNO (T-Mobile host)[5]Not published
Sovereign UK + EU routing default
Not published
SS7 / Diameter signalling firewall by default
Defends against silent re-routing and location tracking.

Service model

How you actually deal with the vendor.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
Named human concierge from day one
Not published
Threat-profile workshop included
Not published
Provisioning ceremony with NDA
Not published
24/7 incident response
Not published

Honesty markers

How transparent the vendor is about its own limits.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCrypto AG successors
States its limits in writing on the marketing page
Not published
Discloses lawful-intercept jurisdiction
Not published

Sources for this comparison

  1. [1] Bittium Tough Mobile 2 - product page & datasheet - source (retrieved 2026-04-22)
  2. [2] Silent Circle - Blackphone & Silent OS - source (retrieved 2026-04-22)
  3. [3] KryptAll - K-iPhone product page - source (retrieved 2026-04-22)
  4. [4] Purism - Librem 5 + AweSIM bundle - source (retrieved 2026-04-22)
  5. [5] Efani - SAFE Plan pricing & SIM-swap protection - source (retrieved 2026-04-22)
  6. [6] Mobifon Communications Ltd - UK multi-MNO service catalogue - source (retrieved 2026-04-22)

Comparative advertising under the UK Business Protection from Misleading Marketing Regulations 2008 and EU Directive 2006/114/EC. Competitor names are referenced nominatively for honest comparison. No logos, no brand colours, no copyrighted creative is reproduced. Where a vendor does not publish a figure we render "Not published" rather than estimate. All competitor pricing and capability data retrieved from each vendor's own website on the dates listed in Sources. Trademarks belong to their respective owners.

All third-party names are trademarks of their respective owners. References are made for the purpose of factual comparison under the UK Business Protection from Misleading Marketing Regulations 2008 and EU Directive 2006/114/EC, and do not imply endorsement, affiliation or sponsorship.

What's in the box

Concrete, verifiable, mapped to our own security stack.

Hardware root of trust on the SIM

Per-line cryptographic identity issued in a provisioning ceremony, not a high-street activation.

Abel L16 · Cryptographic provisioning

Live key rotation under attack signal

Sub-minute rotation when the signalling firewall flags a credible anomaly against the line.

Abel L17 · Live key rotation

Sovereign EU/UK routing by default

No best-effort, no paid upgrade. Every session prefers a sovereign-resident path with a signed routing decision.

Abel L13 · Sovereignty routing (twin-disclosed)

SS7 / Diameter signalling firewall posture

Edge inspection aligned to GSMA FS.11 and FS.19 - the published industry baseline most consumer SIMs do not implement.

Abel L3 · Signalling anomaly detection

Cryptographic SIM-swap defence

Re-issue requires proof tied to the provisioning ceremony. A high-street store cannot port your line.

Abel L22 · Money-path / identity guard

Per-line behavioural baseline

Each line has a rolling expected-behaviour profile. Deviations page the concierge, not next quarter's review.

Abel L2 · Per-SIM baseline

Tamper-evident audit chain, customer-exportable

Hash-chained evidence of every routing decision, signalling event and policy invocation - exportable on demand for your security or legal team.

Abel L23/L26 · Evidence chain

24/7 named human concierge

Not a script, not a queue. One person, named, with the authority to act on your behalf inside the platform.

Optional family / staff lines under one root

Provision additional lines for partner, children, EA or principal investment manager under a single root of trust.

Annual independent threat review

Delivered to the principal in private, covering threat surface specific to their role, family and travel pattern.

Eligibility & how it works

Three steps. No public price. One named owner from day one.

01

Discovery call

30 minutes. NDA on request. We listen first; we scope the threat surface honestly; we tell you whether 2.0 is the right answer or whether one of our existing tiers fits better.

02

Threat-profile workshop

Boundless team plus your security lead, EA, or principal advisor. We map travel patterns, family structure, public exposure, and produce a written threat profile signed by both sides.

03

Provisioning ceremony

Issuance of the hardware-rooted line(s), introduction of the named concierge, baseline of the audit chain. From this point your line cannot be re-issued without cryptographic proof.

Advocate Programme · uncapped

Bring someone in. Be rewarded - every time, every line, no ceiling.

The most practical and useful mobile and communications network of the day deserves advocates who can speak to it from the inside. That's the model - uncapped, transparent ledger, paid against the wallet you can see at any time.

How it works

One conversation. One reward chain.

Bring someone into a Boundless 2.0 discovery call. If they onboard, you're rewarded - and so is everyone they then bring in, within the limits set out in the Advocate Terms. The chain is structured, attributed, and visible.

The model

Uncapped per-line credit. Tiered multiplier.

Per-line credit on every successful onboarding. A tiered multiplier scales the credit for advocates with sustained successful referrals. Everything is paid against your wallet ledger - you can see it move in real time.

Specific rate card and tier thresholds: see Advocate Programme Terms.

Why it scales for active advocates

The chain attributes upward.

As each successful referral becomes an active customer, their own onward referrals attribute a structured share back to the originating advocate, within the limits of the Programme Terms. Active advocates compound.

Read the Advocate Terms

The Advocate Programme is governed by the Advocate Programme Terms and operated under the existing wallet ledger and referral payout infrastructure. Rate card subject to publication and review. No guarantee of any specific earnings is made or implied. Referral attribution is auditable end-to-end via the hash-chained audit log.

Request a discovery call

Speak to the team. No price gate. No SDR script.

Tell us briefly what's prompted the enquiry - a recent travel incident, a family change, a board-level concern. A senior member of the Boundless team will be in touch within one business day to schedule the discovery call.

Schedule a demo

See Boundless 2.0 (Business) on your own estate.

Tell us a little about your setup. We'll set up a 25-minute walkthrough on the part of boundless 2.0 (business) that matters to you most - and you'll be talking to someone properly senior, not an SDR.

  • Reply within one business day
  • Tailored to your sector and scale
  • No pre-call qualification gauntlet

Submitting agrees to our processing of this enquiry under GDPR. We do not sell or share contact data.

Or open the Concierge Application

What we will not say

The honest limits - included on purpose.

  • Boundless 2.0 is not a government-issued device and is not affiliated with the United States Government, the National Security Agency, or any other state security service.
  • Boundless 2.0 has no formal partnership with Apple, Samsung, or any other handset manufacturer. Public references to manufacturer-provided security features (e.g. Samsung Knox) are cited to describe the public threat landscape only.
  • We cannot prevent a customer from being lawfully compelled by a state to hand over a device or unlock it at a border crossing.
  • We cannot defeat an attacker who has come into possession of the principal's actual unlock biometrics or PIN.
  • We cannot guarantee defeat of zero-day baseband or modem-firmware exploits that have not yet been disclosed by the affected vendor.
  • We cannot guarantee against insider threat at the underlying mobile network operator. The Abel audit chain is designed to detect and evidence such activity, not to prevent it physically.
  • The phrase 'the most secure consumer SIM in the public domain' is qualified by 'in the public domain' - we make no claim against classified state systems. It is substantiated by the comparison matrix on this page against publicly published competitor data as of April 2026 and is subject to ongoing review.

References

Every external claim, sourced.

  1. [1]UK FCDO - Foreign travel advice: China (Safety and security). Source
  2. [2]FBI Denver - public service announcement on charging stations and public Wi-Fi ('juice-jacking'). Source
  3. [3]GSMA FS.11 (SS7) and FS.19 (Diameter) Fraud and Security Guidelines. Source
  4. [4]UK NCSC - guidance on SIM-swap fraud. Source
  5. [5]FBI IC3 - SIM-swapping public service announcement. Source
  6. [6]US FCC - Declaratory Ruling on AI-generated voice in robocalls (Feb 2024). Source
  7. [7]US Customs and Border Protection - Border Search of Electronic Devices (CBP Directive 3340-049A). Source
  8. [8]UK Border Force - Schedule 7 Terrorism Act 2000 powers (gov.uk guidance). Source
  9. [9]Coalition Against Stalkerware - annual industry data. Source
  10. [10]NSA - President Obama's modified BlackBerry on display at the National Cryptologic Museum. Source
  11. [11]Samsung Knox - published security platform documentation. Source
  12. [12]Mobifon Communications Ltd - UK multi-network wholesale relationship per its published service catalogue. Source