Invitation tier · By consultation

The line that was only ever issued to the people who couldn't afford to be intercepted.Now the door is open.

Boundless 2.0 - sovereign-secure mobile, by discovery only. Built against a comparable threat model to the one that drove the NSA to issue a custom BlackBerry to a sitting US President.10 Brought, for the first time, into the public domain.

Boundless is not affiliated with the United States Government, the NSA or any handset manufacturer. References describe the public threat landscape only.

Scope your own package, on your own terms. The Concierge Application asks the same questions we'd cover in discovery - then a senior member of the team picks it up from there.

Hardware root of trust Sovereign UK + EU routing Cryptographic SIM re-issue
Boundless 2.0 SIM  -  premium machined hardware

The most secure consumer SIM in the public domain.

About this product · please read

What Boundless 2.0 is, what it isn't, and what we promise.

What it is

A UK consumer-and-SME mobile service operated by Boundless on top of a UK multi-network carrier relationship (Mobifon Communications Ltd). A SIM-and-service product with a hardened security plane - the Abel stack - sold by discovery consultation only.

What it isn't

Not a government-issued device, not a classified system, and not affiliated with the United States Government, the NSA, the UK Government, GCHQ, NCSC, Apple, Samsung or any handset manufacturer or sitting/former head of state. References to NSA-issued presidential phones, Samsung Knox for US-government use, and FBI/FCDO/GSMA guidance are cited solely to describe the public threat landscape that motivates the product's design.

What we promise

Boundless 2.0 raises the cost and complexity of common attacks against mobile lines. It cannot defeat a state-compelled device handover at a border, an attacker holding the principal's biometrics, or interception methods outside the public domain. "The most secure consumer SIM in the public domain" is qualified by in the public domain - not a claim against classified state systems. Service availability is subject to UK and EU coverage.

Full limits and sources are listed at the bottom of this page - see what we will not say and references.

One product · two front doors

The shift

Until now, this category of line was reserved for principals whose role, profile or family meant a normal SIM was a liability.

Boundless 2.0 opens a limited public intake. Pricing is set by consultation, not published - because the right answer for a listed-company CEO travelling to Asia twice a quarter is not the right answer for a public figure protecting a teenager from stalkerware. Same product. Different deployment. One conversation to scope it correctly.

Presidential-grade threat model

Same threats.
Different audience.
Same answer.

The threat surface that drove the NSA to issue President Obama a custom-modified BlackBerry - now on public display at the National Cryptologic Museum10 - is the same threat surface a board director, founder or public figure faces today on a standard consumer SIM. Samsung publishes a hardened platform (Knox) for US-government use11; the public-domain consumer equivalent of that posture is what Boundless 2.0 delivers.

For the record

Boundless 2.0 is not a government-issued device and is not affiliated with the United States Government, the NSA, or any handset manufacturer. References above are cited to describe the public threat landscape - not to claim a partnership.

Hotel & public Wi-Fi as default-hostile

UK FCDO travel advice for China explicitly tells business travellers to assume hotel and public networks are monitored. The FBI's Denver field office issued the public 'juice-jacking' warning on the same risk class for charging stations and public Wi-Fi.

Sources: [1] [2]

SS7 / Diameter signalling abuse

The GSMA has documented signalling-layer attack surfaces in FS.11 (SS7) and FS.19 (Diameter) for over a decade. Live exploits against ordinary consumer SIMs were demonstrated publicly at 31C3 in 2014 and have been re-confirmed in academic literature every year since.

Sources: [3]

SIM-swap fraud at scale

The UK's National Cyber Security Centre publishes guidance treating SIM-swap as a recognised attack pattern against high-value individuals. The FBI's IC3 reported losses from SIM-swap in the US alone in the hundreds of millions of dollars.

Sources: [4] [5]

AI-driven voice & number impersonation

The US FCC ruled in February 2024 that AI-generated voice in robocalls is illegal under the TCPA - a regulator-level acknowledgement that the threat is real, scaled, and now in the consumer threat model.

Sources: [6]

Compelled device-handover at borders

US Customs and Border Protection and UK Border Force both publish lawful authority to inspect, image and detain mobile devices at ports of entry - without the level of judicial oversight applied inside the country.

Sources: [7] [8]

Stalkerware on consumer phones

Coalition Against Stalkerware industry data shows tens of thousands of confirmed installations annually on civilian devices - the threat is no longer reserved for high-profile targets.

Sources: [9]

Real households · Real exposure

Threat models we used to call 'celebrity-grade'. Now ordinary.

European hub airport · half-term · family of four

The teenager joins an unsecured airport Wi-Fi to keep watching a stream. Within an hour, an attacker on the same network has scraped persistent device identifiers - the same pattern the FBI's juice-jacking PSA describes for charging stations and free Wi-Fi.

Boundless 2.0

Every device on a 2.0 family root prefers the hardware-rooted cellular identity over an unverified Wi-Fi join, and the line itself rejects SIM-swap requests without cryptographic proof of re-issue from the principal's named owner.

Sources: [2] [4]

Domestic-abuse survivor · post-separation

An estranged ex-partner has previously installed stalkerware on the survivor's phone and convinced a high-street store to perform a SIM swap. Coalition Against Stalkerware data shows this pattern is no longer rare.

Boundless 2.0

The 2.0 line cannot be re-issued by a high-street store. Re-issue requires a cryptographic proof tied to the original provisioning ceremony, and any attempt is logged to the audit chain in real time.

Sources: [9]

Public figure · paparazzi geolocation attempts

Repeated SS7 location-lookup attempts against a publicly-known mobile number - a known-good attack against the signalling plane that requires no consent from the target.

Boundless 2.0

Anomalous signalling patterns are detected and quarantined at the edge. The principal's concierge is paged inside minutes, not the next quarterly review.

Sources: [3]

Discreet philanthropy · cross-border travel

A principal travels to coordinate with NGOs in jurisdictions where mobile traffic is routinely inspected at the border. CBP and UK Border Force both publish lawful authority to detain and image devices.

Boundless 2.0

2.0 cannot prevent compelled handover - no commercial product can. What it does provide is a clean, sealed evidence chain of every routing decision and every signalling event, exportable on demand for the principal's legal team.

Sources: [7] [8]

Boundless 2.0 SIM  -  exploded view of three substrates

Substrate 1

Hardware root of trust · Abel L16

Substrate 2

Sovereign routing logic · Abel L13

Substrate 3

Behavioural baseline · Abel L2

The SIM

The most secure consumer SIM
in the public domain.

Three substrates, one provisioning ceremony, one named owner. The SIM refuses to fail open within the policy boundary defined in your provisioning ceremony: no silent fallback, no helpdesk-overridden re-issue, no opaque routing decision. Every action is signed, hash-chained, and exportable.

How the partnership actually works

Carrier provides the radio.
Boundless provides the security plane.

Boundless 2.0 sits on top of a UK multi-network wholesale relationship spanning the major UK MNOs, per Mobifon Communications Ltd's published service catalogue12. That means your 2.0 line is not locked to a single operator's coverage map and not exposed to a single operator's outage profile.

On top of that radio layer, Boundless contributes the security plane that consumer carriers do not provide to retail subscribers: the hardware root of trust, the signalling firewall posture, the sovereign routing default, and the tamper-evident audit chain. Neither side does the other's job.

We do not claim Mobifon as a sovereign MNO with its own 5G SA core or satellite hybrid; the integration described on the Network page reflects the surface we have built against, not capabilities the carrier has independently published.

Connectivity guarantees · the radio layer

The signal you'd expect from a national operator - across three of them at once.

Security is the headline. Connectivity is the prerequisite. Every guarantee below is either contractual, inherited from a published carrier capability, or governed by an open 3GPP/ETSI specification. We do not invent figures we cannot stand behind.

Multi-network coverage

3 UK networks

Sits across EE, Vodafone and O2 wholesale via the underlying carrier relationship - not locked to a single operator's coverage map or outage profile.

Source: Mobifon Communications Ltd, published service catalogue [12]

Best-signal selection

Selected at session start

The modem picks the strongest viable cell when a new attachment is made. Once an IP session is up, handsets do not jump to a stronger network mid-session - that is standard 3GPP/handset behaviour, not a Boundless choice. The Signal Refresh Engine (below) is how we close that gap without breaking the user's session.

Source: ETSI TS 22.011 · 3GPP TS 23.122 PLMN selection

EU + UK roaming

30+ EEA countries

Inclusive roaming across the European Economic Area under the EU 'roam-like-at-home' framework. Coverage outside the EEA is country-by-country and confirmed during discovery.

Source: EU Regulation 2022/612 (roaming)

Failover behaviour

Automatic re-attach

On loss of the serving cell, the device re-selects the next available network per published 3GPP procedures. No manual intervention from the principal.

Source: 3GPP TS 23.122 · TS 24.008 PLMN re-selection

Sovereign egress posture

UK + EU preferred

Routine sessions prefer a UK or EU egress point by default. Visited-network breakout is used only where local lawful-intercept rules require it, and that decision is written to your audit chain.

Source: Abel L13 - sovereignty routing, default-on policy

Incident response

15-min P1 engagement

Named-concierge engagement on a P1 incident, 24/7. Not a ticket queue, not a script - one named person with the authority to act on your behalf inside the platform.

Source: Boundless concierge SLA - included on every 2.0 line

Network hopping · plain English

The line is not married to one mast.

The 2.0 SIM is provisioned across the underlying multi-MNO wholesale relationship, not a single operator. When you place a call or open a session, the device evaluates the available networks and attaches to the strongest viable cell. If that cell degrades - you walk into a basement, a mast goes down, you cross a coverage seam - the modem re-selects another network per the published 3GPP procedures.

For the record: this is standard cellular behaviour enabled by the multi-MNO SIM. It is not a proprietary Boundless radio technology, and we do not market it as one. The Boundless contribution sits above this layer - in the security plane, the sovereign routing default, and the audit chain.

Signal Refresh Engine · DDRR

Detect → Defer → Refresh → Reconnect.

Once a phone is attached to a cell with an active IP session, it does not roam to a stronger network on its own. The Boundless app closes that gap with a four-step engine that is fully compliant with App Store and Play Store rules - never silent, never disruptive.

1 · Detect

Real connection quality

RSRP/RSRQ where exposed by the OS, plus latency, jitter, packet loss, throughput, failed retries, and cell-change-vs-performance deltas - not just bars.

2 · Defer

Never interrupt the user

If you're on a call, streaming, navigating, typing or in an email, the engine waits. Zero disruption is the rule.

3 · Refresh

Single-tap, user-approved

When you're idle, a subtle prompt offers a one-tap refresh. We never silently toggle airplane mode - Apple and Google do not allow consumer apps to do that.

4 · Reconnect

Multi-MNO re-attach

The refresh drops the stale attachment, the multi-MNO SIM re-scans, and the device attaches to the strongest viable cell per 3GPP TS 23.122.

Enterprise extension

On MDM-managed and Android Enterprise device-owner handsets, parts of the refresh cycle can be automated, APN and routing policy controlled, and a private APN enforced - without losing the audit trail.

What we will not promise

Coverage and signal strength are inherited from the underlying UK mobile network operators and are subject to their published coverage maps. Boundless does not own radio infrastructure and does not guarantee service inside radio dead-zones, in tunnels, below ground, or in jurisdictions outside the carrier compatibility list. We do not publish an end-to-end uptime SLA for components we do not own end to end. We do not silently toggle airplane mode or force a cellular reset on consumer iOS or Android - the Refresh step is always user-approved.

Side by side

Where 2.0 sits against the rest of the secure-mobile category.

Not the ordinary UK telco market - that comparison lives on /transparent-comparison. This table shows the products that actually compete with 2.0 in the secure / sovereign mobile category, with publicly verifiable pricing and capability data.

Any device · no modified hardware

Keep your iPhone.
Keep your Galaxy.
Get the protection.

Boundless 2.0 delivers its security at the SIM and network layer - not the handset. It does not require a modified, custom-built or jailbroken phone. Any current-generation iPhone or Android that accepts a standard SIM (or eSIM) can run a 2.0 line, and the same protections apply identically across both ecosystems.

The SIM is the security boundary

A SIM is an independently certified secure element with its own cryptographic processor. The handset doesn't need to be modified for the SIM to enforce policy.

Source: ETSI TS 102 221 · GlobalPlatform Card Spec v2.3

The network plane does the rest

Defences against SS7 / Diameter abuse, SIM-swap and silent re-routing live in the carrier core, above the handset. This is where Abel sits.

Source: GSMA FS.11 (SS7) · FS.19 (Diameter)

Why others built custom phones

Bittium, Blackphone, KryptAll and Librem 5 ship modified hardware as a deliberate architectural choice - their security plane is integrated with the device OS. We chose the opposite architecture.

Source: Each vendor's own product page

What this claim does and does not cover

"Same protections" refers to the SIM-and-network plane only. Device-level threats - a compromised OS, a malicious app installed by the user, biometric coercion, a state-compelled handover at a border - are outside that plane and are addressed by the threat-profile workshop, not by the SIM. Device support is subject to the carrier's standard handset compatibility list (4G/5G bands, eSIM where used). We do not claim universal compatibility with every device ever made.

What others charge

A range, not a price.

Public privacy-MVNO plans run $99/mo (Efani, Cape). Privacy-hardened phones from $1,999 (Librem 5) or $4,500+ (KryptAll). Most consumer secure-mobile vendors require you to buy their phone.

Figures sourced from each vendor's public pricing page - see Sources beneath the matrix.

Why we don't publish a number

Same product. Different deployment.

The right answer for a public figure protecting a teenager from stalkerware is not the right answer for a family of four whose threat model is a stolen iPhone in a holiday rental. Same SIM. Same protections. Different family. One conversation to size it correctly.

What discovery actually buys you

A scoped package - not a sales call.

  • ·Threat-profile workshop with our team and yours
  • ·Named concierge from day one - not a ticket queue
  • ·Sovereign routing scoped to your travel pattern
  • ·Family sizing - principals, spouses, dependants
  • ·Audit-chain ownership in your name, exportable
Request a discovery call

Commercial transparency

Public list price, contract length, and what you sign for.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
Public list price
What the vendor publishes on its own website.
Bespoke / discoveryFrom €1,795 hardware + service[1]From $799 device + service[2]From $4,500 per device[3]From $1,999 + AweSIM service[4]$99/mo SAFE Plan[5]$99/mo (waitlist)[7]
Contract length
Discovery-scopedHardware purchase + service contract[1]Device + monthly service[2]Device purchase, service optional[3]Hardware purchase + AweSIM monthly[4]Monthly[5]Monthly[7]
Setup / hardware fee
Provisioning ceremonyHardware mandatory[1]Hardware mandatory[2]Hardware mandatory[3]Hardware mandatory[4]None - works on existing device[5]None - eSIM[7]

Hardware requirement

Whether you have to buy a custom phone - or whether the security plane works on your current iPhone or Android.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
Modified handset required
Are you locked to the vendor's own hardware?
BYOD with current iPhone
BYOD with current Android
Where the security plane lives
OS-level vs SIM-and-network-level.
SIM + carrier coreCustom OS layer[1]Silent OS (Android fork)[2]Modified iOS + voice app[3]PureOS hardware kill-switches[4]Carrier-side anti-swap[5]Carrier-side privacy MVNO[7]

Hardware & SIM security

What's on the SIM itself, and whether re-issue can be defeated.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
Hardware root of trust on the SIM
Cryptographic SIM re-issue ceremony
Defeats helpdesk-driven SIM-swap fraud.
Tamper-evident audit chain, customer-exportable
Secure-element certification (where published)
CC EAL-graded SECC EAL4+ device[1]Not publishedNot publishedNot publishedNot publishedNot published

Network & sovereignty

Carrier model, jurisdiction, and signalling-layer defence.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
Carrier model
UK multi-MNO via Mobifon[6]Customer-supplied SIM[1]Customer-supplied SIM[2]Customer-supplied SIM[3]Bundled US MVNO (AweSIM)[4]US MVNO (T-Mobile host)[5]US MVNO[7]
Sovereign UK + EU routing default
SS7 / Diameter signalling firewall by default
Defends against silent re-routing and location tracking.

Service model

How you actually deal with the vendor.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
Named human concierge from day one
Threat-profile workshop included
Provisioning ceremony with NDA
24/7 incident response

Honesty markers

How transparent the vendor is about its own limits.

Criterion
UsBoundless 2.0
Bittium Tough Mobile 2Silent Circle BlackphoneKryptAll K-iPhonePurism Librem 5 + AweSIMEfani SAFE PlanCape Privacy MVNO
States its limits in writing on the marketing page
Discloses lawful-intercept jurisdiction

Sources for this comparison

  1. [1] Bittium Tough Mobile 2 - product page & datasheet - source (retrieved 2026-04-22)
  2. [2] Silent Circle - Blackphone & Silent OS - source (retrieved 2026-04-22)
  3. [3] KryptAll - K-iPhone product page - source (retrieved 2026-04-22)
  4. [4] Purism - Librem 5 + AweSIM bundle - source (retrieved 2026-04-22)
  5. [5] Efani - SAFE Plan pricing & SIM-swap protection - source (retrieved 2026-04-22)
  6. [6] Mobifon Communications Ltd - UK multi-MNO service catalogue - source (retrieved 2026-04-22)
  7. [7] Cape - privacy-first mobile plan - source (retrieved 2026-04-22)

Comparative advertising under the UK Business Protection from Misleading Marketing Regulations 2008 and EU Directive 2006/114/EC. Competitor names are referenced nominatively for honest comparison. No logos, no brand colours, no copyrighted creative is reproduced. Where a vendor does not publish a figure we render "Not published" rather than estimate. All competitor pricing and capability data retrieved from each vendor's own website on the dates listed in Sources. Trademarks belong to their respective owners.

All third-party names are trademarks of their respective owners. References are made for the purpose of factual comparison under the UK Business Protection from Misleading Marketing Regulations 2008 and EU Directive 2006/114/EC, and do not imply endorsement, affiliation or sponsorship.

What's in the box

Concrete, verifiable, mapped to our own security stack.

Hardware root of trust on the SIM

Per-line cryptographic identity issued in a provisioning ceremony, not a high-street activation.

Abel L16 · Cryptographic provisioning

Live key rotation under attack signal

Sub-minute rotation when the signalling firewall flags a credible anomaly against the line.

Abel L17 · Live key rotation

Sovereign EU/UK routing by default

No best-effort, no paid upgrade. Every session prefers a sovereign-resident path with a signed routing decision.

Abel L13 · Sovereignty routing (twin-disclosed)

SS7 / Diameter signalling firewall posture

Edge inspection aligned to GSMA FS.11 and FS.19 - the published industry baseline most consumer SIMs do not implement.

Abel L3 · Signalling anomaly detection

Cryptographic SIM-swap defence

Re-issue requires proof tied to the provisioning ceremony. A high-street store cannot port your line.

Abel L22 · Money-path / identity guard

Per-line behavioural baseline

Each line has a rolling expected-behaviour profile. Deviations page the concierge, not next quarter's review.

Abel L2 · Per-SIM baseline

Tamper-evident audit chain, customer-exportable

Hash-chained evidence of every routing decision, signalling event and policy invocation - exportable on demand for your security or legal team.

Abel L23/L26 · Evidence chain

24/7 named human concierge

Not a script, not a queue. One person, named, with the authority to act on your behalf inside the platform.

Optional family / staff lines under one root

Provision additional lines for partner, children, EA or principal investment manager under a single root of trust.

Annual independent threat review

Delivered to the principal in private, covering threat surface specific to their role, family and travel pattern.

Eligibility & how it works

Three steps. No public price. One named owner from day one.

01

Discovery call

30 minutes. NDA on request. We listen first; we scope the threat surface honestly; we tell you whether 2.0 is the right answer or whether one of our existing tiers fits better.

02

Threat-profile workshop

Boundless team plus your security lead, EA, or principal advisor. We map travel patterns, family structure, public exposure, and produce a written threat profile signed by both sides.

03

Provisioning ceremony

Issuance of the hardware-rooted line(s), introduction of the named concierge, baseline of the audit chain. From this point your line cannot be re-issued without cryptographic proof.

Advocate Programme · uncapped

Bring someone in. Be rewarded - every time, every line, no ceiling.

The most practical and useful mobile and communications network of the day deserves advocates who can speak to it from the inside. That's the model - uncapped, transparent ledger, paid against the wallet you can see at any time.

How it works

One conversation. One reward chain.

Bring someone into a Boundless 2.0 discovery call. If they onboard, you're rewarded - and so is everyone they then bring in, within the limits set out in the Advocate Terms. The chain is structured, attributed, and visible.

The model

Uncapped per-line credit. Tiered multiplier.

Per-line credit on every successful onboarding. A tiered multiplier scales the credit for advocates with sustained successful referrals. Everything is paid against your wallet ledger - you can see it move in real time.

Specific rate card and tier thresholds: see Advocate Programme Terms.

Why it scales for active advocates

The chain attributes upward.

As each successful referral becomes an active customer, their own onward referrals attribute a structured share back to the originating advocate, within the limits of the Programme Terms. Active advocates compound.

Read the Advocate Terms

The Advocate Programme is governed by the Advocate Programme Terms and operated under the existing wallet ledger and referral payout infrastructure. Rate card subject to publication and review. No guarantee of any specific earnings is made or implied. Referral attribution is auditable end-to-end via the hash-chained audit log.

Request a discovery call

Speak to the team. No price gate. No SDR script.

Tell us briefly what's prompted the enquiry - a recent travel incident, a family change, a board-level concern. A senior member of the Boundless team will be in touch within one business day to schedule the discovery call.

Schedule a demo

See Boundless 2.0 (Personal) on your own estate.

Tell us a little about your setup. We'll set up a 25-minute walkthrough on the part of boundless 2.0 (personal) that matters to you most - and you'll be talking to someone properly senior, not an SDR.

  • Reply within one business day
  • Tailored to your sector and scale
  • No pre-call qualification gauntlet

Submitting agrees to our processing of this enquiry under GDPR. We do not sell or share contact data.

Or open the Concierge Application

What we will not say

The honest limits - included on purpose.

  • Boundless 2.0 is not a government-issued device and is not affiliated with the United States Government, the National Security Agency, or any other state security service.
  • Boundless 2.0 has no formal partnership with Apple, Samsung, or any other handset manufacturer. Public references to manufacturer-provided security features (e.g. Samsung Knox) are cited to describe the public threat landscape only.
  • We cannot prevent a customer from being lawfully compelled by a state to hand over a device or unlock it at a border crossing.
  • We cannot defeat an attacker who has come into possession of the principal's actual unlock biometrics or PIN.
  • We cannot guarantee defeat of zero-day baseband or modem-firmware exploits that have not yet been disclosed by the affected vendor.
  • We cannot guarantee against insider threat at the underlying mobile network operator. The Abel audit chain is designed to detect and evidence such activity, not to prevent it physically.
  • The phrase 'the most secure consumer SIM in the public domain' is qualified by 'in the public domain' - we make no claim against classified state systems. It is substantiated by the comparison matrix on this page against publicly published competitor data as of April 2026 and is subject to ongoing review.

References

Every external claim, sourced.

  1. [1]UK FCDO - Foreign travel advice: China (Safety and security). Source
  2. [2]FBI Denver - public service announcement on charging stations and public Wi-Fi ('juice-jacking'). Source
  3. [3]GSMA FS.11 (SS7) and FS.19 (Diameter) Fraud and Security Guidelines. Source
  4. [4]UK NCSC - guidance on SIM-swap fraud. Source
  5. [5]FBI IC3 - SIM-swapping public service announcement. Source
  6. [6]US FCC - Declaratory Ruling on AI-generated voice in robocalls (Feb 2024). Source
  7. [7]US Customs and Border Protection - Border Search of Electronic Devices (CBP Directive 3340-049A). Source
  8. [8]UK Border Force - Schedule 7 Terrorism Act 2000 powers (gov.uk guidance). Source
  9. [9]Coalition Against Stalkerware - annual industry data. Source
  10. [10]NSA - President Obama's modified BlackBerry on display at the National Cryptologic Museum. Source
  11. [11]Samsung Knox - published security platform documentation. Source
  12. [12]Mobifon Communications Ltd - UK multi-network wholesale relationship per its published service catalogue. Source