image_pdfimage_print
Author Archives: FMTAD

Phishing Cyber victims caught between the hammer and the anvil

Phishing: Cyber victims caught between the hammer and the anvil

Phishing Cyber Victims by Jacques Gascuel This article will be updated with any new information on the topic, and readers are encouraged to leave comments or contact the author with any suggestions or additions.

Phishing: how cyber-victims are caught between scam and blackmail

Have you ever received an email or a message that looked like an official communication from a trusted organization, such as your bank, your phone operator or your social network? Did it ask you to confirm your personal or financial information, to pay a fine or to update your software? If so, you may have been targeted by a phishing attack.

2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Discover our other articles on digital security

Phishing is a fraudulent technique that aims to deceive internet users and to steal their information, money or identity. Phishing is a major threat for the security of individuals and organizations, as it can lead to financial losses, identity theft, extortion or malware infections. In this article, I will explain to you what phishing is, how to protect yourself from it, what to do if you fall victim to it and what are the current trends of this phenomenon.

What is phishing?

Phishing is a form of social engineering that exploits the human factor rather than the technical factor. In other words, phishing relies on manipulating people’s emotions, such as fear, curiosity or greed, rather than hacking their devices or systems.

Phishing usually involves sending emails or messages that mimic the appearance and content of official communications from legitimate organizations. These messages often contain a link or an attachment that directs the recipients to a fake website or a malicious file. The goal of phishing is to trick the recipients into revealing their personal, financial or confidential information, such as their passwords, their bank account numbers or their credit card details. Alternatively, phishing can also persuade the recipients to make fraudulent payments or to download malware on their devices.

Phishing can target anyone who uses the internet, whether they are individuals or organizations. However, some groups are more vulnerable than others, such as seniors, students or employees. According to a report by Verizon (https://enterprise.verizon.com/resources/reports/dbir/), phishing was involved in 36% of data breaches in 2020.

How to protect yourself from phishing?

To protect yourself from phishing, you need to be able to recognize the signs that can indicate that a message is fraudulent. Here are some examples of signs to watch out for:

  • Spelling or grammar mistakes in the message.
  • Suspicious addresses or links that do not match the supposed organization behind the message.
  • Urgent or unusual requests, such as confirming your bank details, paying a fine or updating your software.
  • Attachments or links that invite you to download or open a file.

If you receive a suspicious message, do not click on the links, do not open the attachments and do not reply to the message. Instead, check the source of the message by looking at the sender’s address, hovering over the links with your mouse to see their real destination or contacting directly the organization supposed to be behind the message by another means (phone, official website, etc.).

You can also use some tools and practices to enhance your security online, such as:

  • Installing an antivirus software and keeping it updated.
  • Using strong and unique passwords for each site and service you use.
  • Enabling two-factor authentication whenever possible.
  • Avoiding public Wi-Fi networks or using a VPN (Virtual Private Network) when accessing sensitive sites.
  • Educating yourself and others about cyber threats and how to prevent them.

What to do if you are a victim of phishing?

If you have clicked on a link, opened an attachment or disclosed personal or financial information following a fraudulent message, you may be a victim of phishing. In this case, it is important to act quickly to limit the consequences. Here are some tips to follow:

  • Change your passwords on all sites and services you use, especially those related to your bank accounts, your social networks or your email accounts.
  • Contact your bank or your phone operator to report the incident and block your cards or lines if necessary.
  • File a complaint with the competent authorities, such as the police, the FTC (Federal Trade Commission) or the IC3 (Internet Crime Complaint Center).
  • Report the fraudulent message to the concerned organizations, such as https://www.antiphishing.org/ or https://www.us-cert.gov/report-phishing. These sites also offer you information and services to help you cope with the consequences of phishing.

What is the new bill on justice and why is it raising concerns about privacy?

The bill on justice is a legislative project. It aims to modernize and simplify justice in France. It covers civil, criminal, administrative and digital justice. It also strengthens the investigation and prosecution of serious offenses, such as terrorism and organized crime.

One measure authorizes remote activation of phones by the police for some investigations. Article 3 “An unfailing commitment to better prevent radicalization and fight against terrorism” of the bill includes this measure. It modifies article 706-102-1 of the code of criminal procedure. This article defines how to activate remotely any electronic device that can emit, transmit, receive or store data.

This measure raises privacy concerns because it lets the police access personal or professional data in phones without the owners’ or possessors’ consent or knowledge. It also lets the police locate, record or capture sounds and images from phones without notification or justification. This measure may violate fundamental rights and freedoms, such as privacy, confidentiality, dignity, presumption of innocence and right to a fair trial.

What is remote activation of phones and how does it work?

Remote activation of phones by the police is an intelligence technique that allows law enforcement agencies to access data or record sounds and images from phones without the consent or knowledge of the phone users. This technique can be used for criminal investigations or national security purposes.

To remotely activate phones, law enforcement agencies need three factors: compatibility, connectivity, and security of the phones. They need to be compatible with the software or hardware that enables remote activation. They need to be connected to a network or a device that allows remote access. They need to have security flaws or vulnerabilities that can be exploited or bypassed.

Law enforcement agencies can remotely activate phones by three methods: exploiting vulnerabilities, installing malware, or using spyware on phones. Exploiting vulnerabilities means taking advantage of security flaws or weaknesses in the phone’s operating system, applications, or protocols. Installing malware means putting malicious software on the phone that can perform unauthorized actions or functions. Using spyware means employing software or hardware that can monitor or control the phone’s activity or data.

By remotely activating phones, law enforcement agencies can access data such as contacts, messages, photos, videos, location, browsing history, or passwords. They can also record sounds and images such as conversations, ambient noises, or camera shots. They can do this in real time or later by retrieving the data from the phone’s memory or storage.

What is the French bill on remote activation of phones by the police and what are its implications?

The French bill on remote activation of phones by the police is a legislative text that was promulgated on 25 May 2021. It is part of the justice orientation and programming bill for 2023-2027, which aims to modernize the justice system and reinforce its efficiency and independence.

The bill introduces a new article in the code of criminal procedure, which allows the judge of liberties and detention (at the request of the prosecutor) or the examining magistrate to order the remote activation of an electronic device without the knowledge or consent of its owner or possessor for the sole purpose of locating it in real time. This measure can be applied for crimes or misdemeanors punishable by at least five years’ imprisonment, a fairly broad criterion.

The bill also allows the judge of liberties and detention (at the request of the prosecutor) or the examining magistrate to order the remote activation of an electronic device without the knowledge or consent of its owner or possessor for the purpose of recording sounds and images from it. This measure can be applied only for crimes relating to organized crime and terrorism.

These measures cannot concern parliamentarians, journalists, lawyers, magistrates and doctors, nor the defendants when they are in the judge’s office or with their lawyer.

The bill also specifies that the remote activation of an electronic device must be done in a way that does not alter its functioning or data, and that the data collected must be destroyed within six months after their use.

The bill aims to provide law enforcement agencies with more tools and information to prevent, investigate and prosecute crimes, especially in cases where phones are encrypted, hidden or destroyed. It also aims to harmonize the French legislation with other countries that have used or considered this technique, such as the United States, Germany, Italy, Israel, Canada, China, France, and the United Kingdom.

However, the bill also raises ethical and social challenges, as it involves a trade-off between security and privacy, as well as between effectiveness and legitimacy. It may undermine the right to respect for private life and the right to a fair trial, which are guaranteed by the European Convention on Human Rights and the French Constitution. It may also expose law enforcement agencies to legal or technical challenges or dangers, such as encryption technologies that can prevent or hinder remote activation. It may also create distrust or resistance among phone users or providers, who may use encryption technologies or legal remedies to protect their data or communications.

The bill has been criticized by several actors, such as lawyers, human rights defenders, digital rights activists, journalists and academics. They have denounced its lack of proportionality, necessity and oversight. They have also questioned its effectiveness and legitimacy. They have called for its withdrawal or amendment.

The bill is still subject to constitutional review by the Constitutional Council before its final promulgation.

How did the Senate vote on the bill and where to find the official sources?

The Senate adopted this measure on October 20, 2021, with some amendments. The Senate voted in favor of this measure by 214 votes against 121. The Senate also added some safeguards to this measure, such as limiting its duration to four months renewable once and requiring prior authorization from an independent judge.

The National Assembly still has to examine the bill before adopting it definitively. The National Assembly may approve, reject or modify this measure. The final text may differ from the one that the Senate voted.

The examination of the bill by the National Assembly will start on December 6, 2021. You can follow the progress of the bill on the website of the National Assembly. You can also find the official text of the bill and the report of the Senate on their respective websites. You can also consult the website of the Ministry of Justice for more information on the bill and its objectives.

What are the benefits and risks of remote activation of phones?

This technique can affect citizens’ and suspects’ behavior in different ways.

On one hand, it can deter people from serious offenses. It exposes them to a higher risk of detection and identification. It reduces their incentives for criminal activities.

On the other hand, it can also make people more cautious or paranoid. It increases their uncertainty and fear. It leads them to avoid electronic devices, encrypt their communications, or use countermeasures such as jamming devices.

This technique can also impact public safety and security positively and negatively.

On one hand, it can improve the efficiency and effectiveness of law enforcement agencies. It provides them with more information and evidence. It helps them prevent, investigate and prosecute crimes.

On the other hand, it can also pose risks for human rights and civil liberties. It allows intrusive and covert surveillance. It violates privacy, confidentiality and dignity. It can also be subject to abuse, misuse or error by law enforcement agents or hackers.

Finally, it can create a feeling of insecurity and mistrust towards institutions, which can access personal or professional data in phones. It can also harm respect for presumption of innocence by placing permanent suspicion on people targeted by this technique. It can also infringe on protection of journalistic sources or right to information by discouraging whistleblowers or witnesses from speaking freely. It can finally encourage people concerned to adopt avoidance or circumvention strategies, such as changing phones regularly, using encrypted applications or switching to airplane mode.

These strategies can reduce the actual effectiveness of this technique for preventing terrorism and organized crime.

What are the arguments in favor of remote activation of phones?

Some people support this technique because they think it has several advantages for law enforcement and public security.

How can remote activation of phones violate privacy and data protection?

One of the main arguments against this technique is that it can violate privacy and data protection for individuals and groups. Privacy and data protection are fundamental rights recognized by international standards and laws. They ensure human dignity and autonomy.

Remote activation of phones violates privacy and data protection by letting law enforcement agencies access personal or professional data without the owners’ or possessors’ consent or knowledge. It also lets law enforcement agencies access sensitive or confidential data without notification or justification. It also lets law enforcement agencies access excessive or irrelevant data without limitation or proportionality.

For example, remote activation of phones could let the police access medical records, financial transactions, political opinions, religious beliefs, sexual preferences, or other intimate information on a device or a communication. It could also let the police access information that is not related to the investigation or that is out of scope on a device or a communication. It could also let the police access information that is not necessary or appropriate for the investigation or that is disproportionate to the seriousness of the offense on a device or a communication.

How can remote activation of phones improve access to justice and evidence?

Another argument in favor of this technique is that it can improve access to justice and evidence for law enforcement agencies and victims of crimes. Justice and evidence ensure the rule of law and the protection of rights.

Remote activation of phones improves access to justice and evidence by letting law enforcement agencies obtain information that is otherwise inaccessible or difficult to obtain. It also lets law enforcement agencies obtain information that is more reliable and accurate than other sources. It also lets law enforcement agencies obtain information that is timelier and more relevant than other sources.

For example, remote activation of phones could help the police access data that is encrypted or password-protected on a device or a communication. It could also help the police access data that is authentic and verifiable on a device or a communication. It could also help the police access data that is up-to-date and pertinent on a device or a communication.

What are the arguments against remote activation of phones?

Some people oppose this technique because they think it has several disadvantages for human rights and civil liberties.

How can remote activation of phones violate privacy and data protection?

One of the main arguments against this technique is that it can violate privacy and data protection for individuals and groups. Privacy and data protection are fundamental rights recognized by international standards and laws. They ensure human dignity and autonomy.

Remote activation of phones violates privacy and data protection by letting law enforcement agencies access personal or professional data without the owners’ or possessors’ consent or knowledge. It also lets law enforcement agencies access sensitive or confidential data without notification or justification. It also lets law enforcement agencies access excessive or irrelevant data without limitation or proportionality.

For example, remote activation of phones could let the police access medical records, financial transactions, political opinions, religious beliefs, sexual preferences, or other intimate information on a device or a communication. It could also let the police access information that is not related to the investigation or that is out of scope on a device or a communication. It could also let the police access information that is not necessary or appropriate for the investigation or that is disproportionate to the seriousness of the offense on a device or a communication.

How can remote activation of phones undermine the presumption of innocence and the right to a fair trial?

Another argument against this technique is that it can undermine the presumption of innocence and the right to a fair trial for individuals and groups. The presumption of innocence and the right to a fair trial are fundamental rights recognized by international standards and laws. They ensure justice and accountability.

Remote activation of phones undermines the presumption of innocence and the right to a fair trial by letting law enforcement agencies access data that they can use against individuals or groups without any legal basis or due process. It also lets law enforcement agencies access data that they can manipulate or falsify by law enforcement agents or hackers. It also lets law enforcement agencies access data that individuals or groups can challenge or contest.

For example, remote activation of phones could let the police access data that they can incriminate individuals or groups without any warrant or authorization from a judge. It could also let the police access data that they can alter or corrupt by law enforcement agents or hackers. It could also let the police access data that individuals or groups can dispute or refute.

How can remote activation of phones create a risk of abuse and misuse by the authorities?

Another argument against this technique is that it can create a risk of abuse and misuse by the authorities for individuals and groups. Abuse and misuse are illegal or unethical actions that violate rights and obligations. They damage trust and legitimacy.

Remote activation of phones creates a risk of abuse and misuse by the authorities by letting law enforcement agencies access data that they can use for purposes other than those authorized or intended. It also lets law enforcement agencies access data that they can share or disclose to third parties without any oversight or control. It also lets law enforcement agencies access data that they can retain or store for longer than necessary or permitted.

For example, remote activation of phones could let the police access data that they can use for political, personal, commercial, or other interests on a device or a communication. It could also let the police access data that they can transfer or leak to other agencies, organizations, media, or individuals on a device or a communication. It could also let the police access data that they can keep or archive for indefinite periods on a device or a communication.

What are the alternatives and safeguards for remote activation of phones?

Some people suggest that there are alternatives and safeguards for remote activation of phones that can balance security and privacy.

What are the existing legal tools to access phone data with judicial authorization?

One of the alternatives for remote activation of phones is to use existing legal tools to access phone data with judicial authorization. Judicial authorization is a legal requirement that ensures respect for rights and obligations. An independent and impartial judge grants it after evaluating the necessity and proportionality of the request.

Existing legal tools to access phone data with judicial authorization include search warrants, wiretaps, geolocation orders, data requisitions, and international cooperation agreements. These tools let law enforcement agencies obtain information from phones in a lawful and transparent manner. They also provide legal protection and recourse for individuals and groups.

For example, search warrants let law enforcement agencies physically seize phones and extract data from them with judicial authorization. Wiretaps let law enforcement agencies intercept calls and messages from phones with judicial authorization. Geolocation orders let law enforcement agencies track the location of phones with judicial authorization. Data requisitions let law enforcement agencies request data from phone operators or service providers with judicial authorization. International cooperation agreements let law enforcement agencies exchange data with foreign authorities with judicial authorization.

What are the principles and conditions for remote activation of phones according to the bill?

One of the safeguards for remote activation of phones is to follow the principles and conditions for remote activation of phones according to the bill. The bill on justice sets some rules and limits for this technique to prevent abuse and misuse.

The principles and conditions for remote activation of phones according to the bill include:

  • The technique can only be used for terrorism and organized crime investigations.
  • An independent judge who authorizes it must supervise the technique. The technique can only last for four months renewable once.
  • The technique must respect necessity, proportionality, subsidiarity, and legality.
  • Parliament and independent authorities must oversee and control the technique.
  • Experts and stakeholders must evaluate and review the technique.

These principles and conditions aim to ensure a reasonable and accountable use of this technique. They also aim to protect the rights and interests of individuals and groups.

What are the possible ways to limit or challenge remote activation of phones?

Another safeguard for remote activation of phones is to use possible ways to limit or challenge remote activation of phones by individuals or groups. These ways can help protect rights and interests, as well as ensure accountability and transparency.

Some of the possible ways to limit or challenge remote activation of phones are:

  • Using encryption technologies:

    Encryption technologies can make data on phones unreadable or inaccessible to law enforcement agencies, even if they remotely activate them. Encryption technologies can also protect communications from law enforcement agencies’ interception or recording. For example, using end-to-end encryption apps, such as Signal or WhatsApp, can prevent law enforcement agencies from accessing messages or calls on phones.

  • Using security features:

    Security features can prevent law enforcement agencies from installing or activating software or applications on phones that enable remote activation. Security features can also detect or remove software or applications that enable remote activation. For example, using antivirus software, firewalls, passwords, biometrics, or VPNs can prevent law enforcement agencies from accessing phones.

  • Using legal remedies:

    Legal remedies can let individuals or groups contest or oppose remote activation of phones by law enforcement agencies. Legal remedies can also let individuals or groups seek compensation or redress for damages caused by remote activation of phones. For example, using judicial review, administrative appeals, complaints, lawsuits, or human rights mechanisms can challenge law enforcement agencies’ actions or decisions regarding remote activation of phones.

How does this technique compare with other countries?

Law enforcement agencies in other countries, such as the United States, Germany, Italy, Israel, Canada, China, France, and the United Kingdom, have used or considered remote activation of phones by the police. This technique is not new or unique. However, the legal framework, the technical methods, and the ethical and social implications of this technique vary from country to country..

How does remote activation of phones by the police work in different countries?

Remote activation of phones by the police is an intelligence technique that varies from country to country. It depends on the legal framework, the technical methods and the ethical issues of each country. Here are some examples of how it works in different countries.

  • In the United States, this technique is known as “roving bugs” or “mobile device tracking”. The Foreign Intelligence Surveillance Act (FISA) authorizes it for national security purposes and Title III of the Omnibus Crime Control and Safe Streets Act for criminal investigations. It requires a court order based on probable cause and limited in scope and duration. It can locate or record sounds and images from phones. It can be done by installing malware or exploiting vulnerabilities on phones.
  • In Germany, this technique is known as “Quellen-TKÜ” or “source telecommunications surveillance”. The Code of Criminal Procedure and the Telecommunications Act regulate it for criminal investigations and the Federal Intelligence Service Act for national security purposes. It requires a court order based on reasonable suspicion and proportionality. It can intercept communications from phones. To do so, it installs software or uses spyware on phones.
  • In Italy, this technique is known as “Trojan horse” or “spyware”. The Code of Criminal Procedure and the Data Protection Code regulate it for criminal investigations. It requires a court order based on serious indications of guilt and necessity. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.
  • In Israel, this technique is known as “IMSI catchers” or “stingrays”. The Wiretapping Law and the Privacy Protection Law regulate it for criminal investigations and the Security Service Law for national security purposes. It requires a court order based on reasonable grounds and proportionality. It can locate or intercept communications from phones. To do so, it uses devices that mimic cell towers and trick phones into connecting to them.
  • In Canada, this technique is known as “cell site simulators” or “IMSI catchers”. The Criminal Code and the Charter of Rights and Freedoms regulate it for criminal investigations. It requires a court order based on reasonable grounds and proportionality. It can locate or intercept communications from phones. To do so, it uses devices that mimic cell towers and trick phones into connecting to them.
  • In China, this technique is known as “network interception” or “remote control”. The Criminal Procedure Law and the Cybersecurity Law regulate it for criminal investigations and national security purposes. It does not require a court order but only an approval from a higher authority. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.
  • In France, real-time geolocation is regulated by the Criminal Procedure Code and the Intelligence Law for criminal and national security investigations. Article 706-102-1 of the Criminal Procedure Code allows police officers and agents to use a technical device to access, record, store and transmit computer data without the consent of the persons concerned. This requires a court order based on serious reasons and proportionality. Article 230-32 of the Criminal Procedure Code states that “Any technical means for real-time location, throughout the national territory, of a person, without his consent, a vehicle or any other object, without the consent of its owner or possessor, may be used if this operation is required by necessity: “. This also requires a court order based on serious reasons and proportionality.
  • In the United Kingdom, this technique is known as “equipment interference” or “hacking”. The Investigatory Powers Act regulates it for criminal investigations and national security purposes. It requires a warrant based on necessity and proportionality. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.

How does remote activation of phones by the police raise ethical and social challenges?

Remote activation of phones by the police raises ethical and social challenges in different contexts and situations because it involves a trade-off between security and privacy, as well as between effectiveness and legitimacy.

Security versus privacy

On one hand, remote activation of phones by the police can enhance security by providing law enforcement agencies with more information and evidence to prevent, investigate, and prosecute crimes. It can also deter criminals from using phones to plan or commit crimes.

On the other hand, remote activation of phones by the police can undermine privacy by letting law enforcement agencies access personal or professional data without consent or knowledge. It can also violate human rights and civil liberties by letting law enforcement agencies monitor or record sounds and images without notification or justification.

Effectiveness versus legitimacy

On one hand, remote activation of phones by the police can be effective by increasing the chances of finding relevant information or evidence on phones that may be encrypted, hidden, or destroyed. It can also be efficient by reducing the costs and risks of physical surveillance or interception.

On the other hand, remote activation of phones by the police can be illegitimate by violating the legal framework, the technical methods, or the oversight and control mechanisms that regulate this technique in each country. It can also be counterproductive by creating distrust or resistance among phone users or providers, who may use encryption technologies or legal remedies to protect their data or communications.

The ethical and social challenges of remote activation of phones by the police depend on the legal framework, the technical methods, and the oversight and control mechanisms that regulate this technique in each country. They also depend on the cultural and political values, the public opinion, and the media coverage that shape the perception and acceptance of this technique in each country.

Some of the ethical and social challenges of remote activation of phones by the police are how to :

  • balance security and privacy in the use of this technique?
  • ensure compliance with fundamental rights and freedoms in the use of this technique?
  • prevent abuse, misuse, or error in the use of this technique?
  • provide legal protection and recourse for individuals or groups affected by this technique?
  • ensure accountability and transparency in the use of this technique?
  • evaluate the effectiveness and legitimacy of this technique?
  • foster trust and cooperation between law enforcement agencies and phone users in the use of this technique?

What is the impact of encryption technologies on this technique?

Encryption technologies are methods or systems that make data unreadable or inaccessible to unauthorized parties. Encryption technologies can have a significant impact on remote activation of phones by the police, as they can make this technique more difficult, risky, or controversial.

How can encryption technologies make remote activation of phones by the police more difficult or impossible?

Encryption technologies can make remote activation of phones by the police more difficult or impossible by preventing law enforcement agencies from accessing data or communications on phones, even if they remotely activate them. Encryption technologies can also protect phones from malware or spyware that enable remote activation.

For example, end-to-end encryption, which some apps such as Signal or WhatsApp use, can prevent law enforcement agencies from intercepting or reading messages or calls on phones, as only the sender and the receiver have the keys to decrypt them. Device encryption, which some operating systems such as iOS or Android use, can prevent law enforcement agencies from extracting or viewing data on phones, as they require a password or a biometric authentication to unlock them.

How can encryption technologies make remote activation of phones by the police more risky or harmful?

Encryption technologies can make remote activation of phones by the police more risky or harmful by exposing law enforcement agencies to legal or technical challenges or dangers. Encryption technologies can also harm phone users by compromising their security or privacy.

For example, breaking encryption, which law enforcement agencies sometimes do to access data or communications on phones, can expose them to legal challenges, as it may violate laws or regulations that protect encryption or privacy. It can also expose them to technical dangers, as it may weaken the security of phones or networks and create vulnerabilities for hackers or criminals. Hacking encryption, which law enforcement agencies sometimes do to install malware or spyware on phones, can harm phone users by compromising their security or privacy, as it may allow unauthorized access to their data or functions.

How can encryption technologies make remote activation of phones by the police more controversial or unacceptable?

Encryption technologies can make remote activation of phones by the police more controversial or unacceptable by raising ethical and social issues or debates. Encryption technologies can also create conflicts or tensions between law enforcement agencies and phone users or providers.

For example, undermining encryption, which law enforcement agencies sometimes request to facilitate remote activation of phones, can raise ethical and social issues or debates, as it may affect human rights and civil liberties, such as privacy, confidentiality, dignity, presumption of innocence, and right to a fair trial. It can also create conflicts or tensions between law enforcement agencies and phone users or providers. They may have different interests or values regarding encryption and security.

How does EviCore NFC HSM technology developed by Freemindtronic offer a high level of protection for phone users?

Remote activation of phones by the police can be facilitated by exploiting security flaws, installing malware, or requesting backdoors in encryption technologies. However, some encryption technologies may be resistant to these measures and offer a higher level of protection for phone users. One of them is the EviCore NFC HSM technology developed by Freemindtronic.

This technology lets users create their own encryption keys in a random way and store them in a physical device that communicates with the phone via NFC (Near Field Communication). The device also lets users define their own trust criteria that must be met to use the keys or their segments. The encryption is done in Quantum-Safe AES-256 mode from either a device compatible with the EviCore NFC HSM technology or from an encrypted enclave in the phone created in the Key chain (Apple) or the Key store (Android) via the EviCore HSM OpenPGP technology. The encryption keys are segmented and superior to 256 bits. Moreover, they are physically externalized from computer systems. Everything is designed by Freemindtronic to effectively fight against espionage and corruption of telephone, computer, communication and information systems. Finally, without a server, without a database, even in air gap and airplane mode works EviCore NFC HSM or EviCore HSM OpenPGP technology. Everything is designed to work in volatile memory to leave no trace in telephone and computer systems.

This technology offers a high level of security and privacy for phone users who want to protect their data from unauthorized access, including by the police. It also offers a high level of performance and usability for phone users who want to encrypt or over-encrypt all types of messaging in the world, including SMS and MMS. It also works with other applications that use encryption, such as email, cloud storage or blockchain.

Furthermore, this technology is designed to be totally anonymous, autonomous, unconnected, without a database, without collecting any information of any kind on the identity of the user, nor on the hardware, nor on the terminals used. The technology is designed to be totally isolated and totally independent of the security of the terminal used whether it is connected or not. Freemindtronic does not keep the unique pairing keys for each NFC HSM device. And even if it did, the user at installation will automatically generate segmented complementary keys for encryption with administrator and user passwords. Each NFC device has a unique 128-bit signature dedicated to fighting against counterfeiting of NFC devices. It is also used as a key segment. The secret stored in eprom memories or in enclaves of the phone and/or computer can be individually secured by other segmented keys characterized by additional trust criteria such as a geozone, a random hexadecimal code via an existing or generated QR code or Bar Code via EviCore HSM. It is therefore physically impossible for Freemindtronic but under judicial assignment to decrypt data encrypted via EviCore HSM technologies even with a quantum computer.

In conclusion, remote activation of phones by the police is an intelligence technique. It aims to fight terrorism and crime by accessing data or sounds and images from phones without consent or knowledge. Law enforcement agencies in various countries have used or considered this technique. For example, France, the United States, Germany, Italy, Israel, Canada, China, and the United Kingdom. However, this technique raises technical, legal, ethical, and social challenges. They need to be addressed.

On the technical side, remote activation of phones by the police depends on three factors: compatibility, connectivity, and security of the phones. It can be done by three methods: exploiting vulnerabilities, installing malware, or using spyware on phones.For example, EviCore NFC HSM technology developed by Freemindtronic protects data and communications on phones from remote activation by the police. Encryption technologies can make this technique more difficult or impossible by preventing law enforcement agencies from accessing data or communications on phones, even if they remotely activate them.

On the legal side, remote activation of phones by the police requires a legal framework that regulates its use and scope. Laws or regulations can authorize it and specify the conditions and criteria for its application. Legal remedies can also challenge it and contest or oppose its validity or legality.

On the ethical side, remote activation of phones by the police involves a trade-off between security and privacy, as well as between effectiveness and legitimacy. It can enhance security by providing more information and evidence to law enforcement agencies to prevent, investigate, and prosecute crimes. It can also undermine privacy by letting law enforcement agencies access personal or professional data without notification or justification.

On the social side, remote activation of phones by the police raises issues or debates that affect human rights and civil liberties. For example, privacy, confidentiality, dignity, presumption of innocence, and right to a fair trial. It can also create conflicts or tensions between law enforcement agencies and phone users or providers, as they may have different interests or values regarding encryption and security.

Therefore, remote activation of phones by the police is a complex and controversial technique that requires a careful and balanced approach that respects the rights and interests of all parties involved. The French bill on remote activation of phones by the police and the EviCore NFC HSM Open PGP technology developed by Freemindtronic illustrate the complex and evolving relationship between intelligence and encryption in the digital age. They raise questions about finding a balance. It is between security and privacy, between public interest and individual rights, between innovation and regulation.

: According to Okta, privacy is the right to control how your information is viewed and used, while security is protection from threats or dangers (https://www.okta.com/identity-101/privacy-vs-security/).

: According to Carnegie Endowment for International Peace, finding a balance between security and privacy requires addressing technical, legal, and social questions (https://carnegieendowment.org/2019/09/10/moving-encryption-policy-conversation-forward-pub-79573).

: According to Springboard, finding a balance between innovation and regulation requires cooperation among stakeholders and respect for human rights (https://www.springboard.com/blog/cybersecurity/privacy-vs-security-how-to-balance-both/).

Phishing: Cyber victims caught between the hammer and the anvil

Responsibility for Phishing, SMiShing, typosquatting, ransomhack, spear phishing, sim swapping, vishing, email and web Spoofing cybervictims is engaged.

There can no longer be any doubt, the responsibility of the Internet user is legally engaged with almost no recourse for the victims to obtain any refund!

Note that we most often find the English term “phishing” which translates “phishing” into French, as well as for the typosquatting that comes from the English “typosquatting” or spear phishing targeted phishing via social engineering techniques or Spoofing technique of spotting.

Following the 2015/2366 directive of the European Parliament and the Council of 25 November 2015, Order No. 2017-1252 of 9 August 2017 makes amendments to Articles L133-16 and L.133-19 of the Monetary and Financial Code for victims of bank card phishing.

Article L133-16 of the Monetary and Financial Code (below) states: “As soon as he receives a payment instrument, the user of payment services takes all reasonable measures to preserve the security of his custom security devices. It uses the payment instrument in accordance with the conditions governing its issuance and use. »

https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006072026&idArticle=LEGIARTI000020860774&dateTexte=&categorieLien=cid

Article L.133-19 of the Monetary and Financial Code (below) states in paragraph IV: “The payer bears all losses caused by unauthorized payment transactions if these losses result from fraudulent conduct on his part or if he did not intentionally or grossly negligently satisfy the obligations referred to in Articles L.133-16 and L.133-17 of the Monetary and Financial Code.”

https://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000020861589&cidTexte=LEGITEXT000006072026

The judgment of the Court of Cassation of 25 October 2017 and that of 28 March 2018 form a case law on the liability of the Internet user victim of phishing by telephone via identity theft and/or via a fake website and/or a fake email.

The judgment of October 25, 2017, (cases of 25.10.17, No. 16-11 644)

https://www.legifrance.gouv.fr/affichJuriJudi.do?idTexte=JURITEXT000035925298&fastReqId=1348908414&fastPos=5&oldAction=rechJuriJudi

Monde.fr press article: http://sosconso.blog.lemonde.fr/2017/10/26/elle-avoue-a-sa-banque-avoir-ete-victime-de-phishing

The judgment of March 28, 2018, (cases. of 28.3.18, No. 16-20 018)

https://www.legifrance.gouv.fr/affichJuriJudi.do?oldAction=rechJuriJudi&idTexte=JURITEXT000036780076&fastReqId=1780826332&fastPos=1

The cassation courts reinforce the obligation of caution of Internet users in the face of phishing attacks that can be telephone, via SMS or e-mail, relating to the use of its bank cards or confidential codes.

  • The March 28, 2018 ruling deepens the liability framework for the Internet user by stating that the failure, by gross negligence, to take any reasonable measures to preserve the safety of its personalised security devices.
  • The user of a payment service who discloses the personal data of this security device in response to an email that contains clues allowing a normally attentive user to doubt its provenance is held solely responsible
  • The bank is not required to inform its customers of the risks of phishing.

How do cybercriminals circumvent 3D Secure code authentication?

Step  1:    The cybercriminal must obtain from his next victim the identifiers and passwords of his phone operator.

What for? To enable the cybercriminal to set up telephone referrals of messages received in particular from his bank. It’s easier than stealing the phone. Hence the importance of regularly changing your passwords from your operator’s account. This point becomes more and more crucial since the smartphone is a mobile payment and/or access control terminal.

Step2:    The cybercriminal must now obtain all the information from the bank card. Several possibilities; or phishing by email, SMS, blackmail, phone by impersonation by an agent of the operator. The victim overconfidence gives him his information. She is not aware that the 3D Secure will also be sent to cybercriminals.

The cybercriminal only has to make the payment that he can validate himself instead of the victim.

The victim informed at the same time as the cybercriminal that there is a request to validate a purchase via his bank card thinks, since she has not validated the payment, that she is safe. She can object to her credit card. Only it’s already too late. The payment is irrevocable and the bank’s liability is cleared. This is the judgment of October 25, 2017.

In another case, the theft of the smartphone with the bank card may have the same result. In the same way when you pay physically with your bank card where you can see in clear the CCV or CVC composed of 3 to 4 digits used for payments on the internet.

It is advisable to use   Freemindtronic  Andorra  EviAlpha technologies for personal use and  EviToken  or  EviCypher  for professional use that allow, after you have physically removed the CCV or CVC code, to make payments on the internet safely. In case of bank card theft, the cybercriminal does not physically have access to the CCV or CVC, the protection with Fullsecure solutions is immediate. This solution is not dependent on the time factor associated with reporting loss or theft for use on the internet. In addition, this solution is capable of managing multiple bank cards and is compatible with any type of bank card internationally, at no additional cost or financial commitment.

There are CCVs or CVCs that change dynamically several times a day. A new security that has an additional annual cost. Used for physical payments, the CCV or CVC is visible. The cybercriminal has only a very short interval of time to rob his victims before the automatic change of the CCV or CVC. In case of theft of this type of bank card, the time depends on the time and date of the declaration of the theft as for other bank cards.

Sim swapping: What does the Monetary and Financial Code say about Secure?sim swapping 3D codes

According to Article L133-23 of the Monetary and Financial Code, it is up to the bank to provide proof of the registration of this type of authentication which makes it possible to presume that the payment has been validated by the rightful holder. Failing that, according to Article L133-18, the transaction is deemed “unauthorized”, the bank is obliged to repay.

The 3D Secure code was developed by Visa and MasterCard to combat the risks of Internet fraud. This code is therefore sent by visa or Master Card’s digital services and is not known to the user until it is received. In fact, it cannot communicate it to a cybercriminal unless the latter has stolen the smartphone, managed to make a copy of the SIM and the most common access to the customer’s accounts of the telephone operator to make a call return to obtain the 3D Secure Code.

What is vishing?

Vishing is a form of phishing that uses the phone as a means of deceiving victims. The term comes from the combination of “voice” and “phishing”. Vishing involves calling victims and pretending to be a trusted person or organization, such as a bank, a public service or a phone operator, and asking them for personal, financial or confidential information. For example, a scammer may claim that the victim’s bank card has been compromised and ask them to confirm their card number and PIN. Vishing can also be used to persuade victims to make fraudulent payments or to download malicious software on their phone.

Vishing is a growing threat, as it exploits the trust that people have in the phone and their lack of vigilance against unsolicited calls. Moreover, scammers use sophisticated techniques to make their calls more credible, such as spoofing, which consists of falsifying the phone number displayed on the recipient’s screen. To protect themselves from vishing, it is important to never disclose personal or financial information over the phone, to verify the identity of the caller by calling back the official number of the organization they claim to represent, and to report any suspicious call to the relevant authorities.

How phishing detection ?

The Internet user must become an expert in phishing detection and typosquatting in the face of the ingenuity of cybercriminals.

According to the case law, the Internet user must carry out a “watchful examination of the correspondent’s changing internet addresses or certain clues, such as misspellings…   which should provide clues  “of a sufficient nature to appeal to the Internetuser.”

However, the criteria adopted by the case law since 2015 are already obsolete because of the quality of counterfeiting of websites in perpetual increase, but not only.

Indeed, the only test to detect a“changing address”has become complex for #cybervictimes. These ingenious cyber criminals find many solutions to deceive their vigilance, especially by the use of special characters in the domain name.

Jurisprudential obsolescence in the face of the evolution of phishing by Unicode

Cyber criminals use special characters similar to the Latin alphabet, theunicode E100. They have more than 26 characters at their disposal  (Ḁ ḁ Ḃ ḃ Ḅ Ḇ ḇ Ḉ ḉ Ḋ ḋ ‘Ḏ ḏ Ḑ ḑ Ḓ ḓ Ḕ’, ‘Ḏ ḏ Ḑ ḑ Ḓ ḓ Ḕ’,  ‘Ṟ’, ṟ, ‘, ‘ Ṯ’, ṯ, Ṱ, ṱ’. All they have to do is buy a domain name similar to the original, and replace one of the characters with a unicode character, as similar as possible, with for example a dot below the character.

For example, we will use the websites of telephone operators and banks, just by replacing the letter “r” with“O”it can give this “f-ee.fr”orby replacing “b” with “ḅ” “ḅouyguestelecom.fr” or “ḅanquepopulaire.fr”.

A perverse new game that would be imposed by the jurisprudence that involves the Cyber-Victim to detect the hidden difference in the URL (address).

Are cyber criminals responding to my request? Indeed I had suggested to them in order to help the #cybervictimes to change their modus operandi to help them in the face of jurisprudence. “Please  don’t make any more spelling mistakes, and if it’s not grammatically correct, make sure that the simple review of the changing address is not obvious on the exam  alone.”

With the fake URL and once the counterfeit site is identical to the original, the trap is activated to capture future #cybervictimes.

Smishing (SMS Phishing)

A cybercriminal sends you an SMS (i.e. a text message) asking you to click on a link. If you click on the link in the message, you will be redirected to a fake website asking you to provide your information in a phishing form.

The cybercriminal attempts to obtain your sensitive information through a text message (i.e. SMS). They will ask you to provide personal information such as a social security number, credit card or health insurance information. He claims that you must give this information or something bad will happen to you (e.g. your electricity is cut off, your credit card is blocked or your online account is terminated). To learn more about Smishing, click HERE.

Typosquatting another form of phishing

Almost identical to phishing, fake site, fake URL, with the big difference that the cybercriminal bets on the typos of #cybervictimes when the user informs the internet address. Examples include “fri.fr” without (ee) or “bouyguetelecom.fr” without (s) or “banque-populaire.fr” with the addition of a hyphen or “free.com” by changing the extension (.fr).

A new playground for cyber criminals, a fake address bar on Android phones that use the Chrome browser.

Google Chrome on Android smartphone only shows the title of the site visited rather than displaying the full address bar with the URL. A new feature for user comfort to make more room for content to be played. This allows the cybercriminal to pass a phishing page as a legitimate web page.

Spoofing over domain name extension makes many cyber victims, especially for domains in .com. The cybercriminal buys a .co domain name with a name identical to that of a known site, an example “www.amazon.co”. The cyber victim receives an email that appears to be from the original site. She is invited to log in via a link to the “www.amazon.co” mirror site. She’s not going to be careful that she’s not on the original site with a .co extension instead of .com. It is therefore with confidence that the cyber victim will enter personal information, especially his login ID and password.

How will the case law evolve to determine the threshold that will qualify the Cyber victim as “negligent”?

Natural protection against phishing and typosquatting

There is a barrier to phishing when the domain name extension is proprietary. This is the case, for example, of the extension of the BNP Paribas bank with its own extension “.bnpparibas” of the website “www.mabanque.bnpparibas”. In this case, it is a cost of around $185,000 and a binding procedure to obtain fromICANN  its custom domain name extension that establishes a natural barrier against this type of attack. However, users of these sites still need to be informed of this distinction. Otherwise, the case law is unequivocal and will be imposed on cyber-victims. Indeed, it is difficult to explain that they did not see the different extension.

Learn more about custom extension

https://www.prodomaines.com/extension-personnalisee

Is the overall level of computing so linear among Internet users that they are all able to carry out such a review?

I doubt it very much.

In the same way, to think that only insiders are safe from phishing seems to me a very risky shortcut.

It is becoming more and more difficult for the Internet user to differentiate between the true and the false.

Shouldn’t case law or a revision of the law take into account the quality of the forger as for the currency, to exonerate the responsibility of the victim?

Instant transfer payment, a new eldorado of cybercriminals?!

What will cybercriminals imagine to create new victims following the new implementation initiated by the ECB with the instant transfer payment system, in less than 10 seconds, irrevocably, achievable with a simple telephone number?

How does it work? (Source the tribune)

It is a transfer in euros that is initiated from the website of his bank or his mobile banking application by choosing the instant mode. Simply enter the IBAN or, less tedious, its mobile phone number (converted to IBAN by the bank), or even scan a QR code to send the money. The account is credited in less than 10 seconds and payment confirmation is sent by SMS within 20 seconds. The transfer is irrevocable. The service is usable 24 hours a day, 365 days a year. A ceiling of 15,000 euros has been decided at European level (the Netherlands has abolished it).

I predict an increase in cybercrime on this new SEPA Express system, if the security system is not equal to or greater than that of bank cards!

Innovation goes further and further to allow the machine to gradually substitute for human physical consent since currents of thought believe that man is more failing than the machine.

To this day, we cannot assign a machine to court. In fact, no one is safe from being between the hammer and the anvil.

‘Ransomhack’: blackmail to non-compliance RGPD

Cyber criminals also use phishing to steal private data, known asransomhack. Taken hostage, this data is being blackmailed by using the new European regulations (RGPD) to put pressure on victims. The goal is to get the ransom faster. It is enough to threaten the victim to make public the data if the ransom is not paid, weighing the risk of strong criminal and civil penalties incurred in the event of non-reporting to the CNIL of the theft of data.

Once again the technique of hammer and anvil becomes a formidable weapon in the face of the fear of double punishment, victim and criminally and civilly litigant.

The phishing technique is no longer the preserve of cyber criminals: it may be more or less legal!

It is difficult to establish statistics, as victims do not file complaints. It is very likely that many of you will recognize yourself in this situation.

What for?

Despite the new provisions imposed by the RGDP, online sites selling goods and/or services have found a way to obtain their customers’ bank card information. However, there is no reason for the client to provide this type of information.

Only here, it takes on a legal appearance, to get this valuable information from bank cards. In principle, legally you have the right to request their removal.

Now that we’re done with the theory, let’s move on to practice

As we have seen before, giving the information of bank cards is under the full responsibility of the Internet user.

Similarly, it is common knowledge that cyber criminals regularly steal private data, including bank cards from the databases of merchant sites.

According to the principle of prudence established by the Court of Cassation, could it not be taken up against the victim? Could the Court not consider that there is no need to inform the Internet user that there is a risk that his credit card information will be derogating? That he is in fact the only one responsible for the information he transmits!

Why do online sales sites need this credit card information? What do they really do with it?

I believe that in terms of the RGPD, you would be entitled to ask the question.

There are many good reasons that will be invoked, but these are not for the customer but for the service provider, especially when the service provider has a recurring payment system in place.

This credit card information becomes valuable for the quality of the outstanding accountable or EENE. If you want to know more(https://comptabilite.ooreka.fr/astuce/voir/609429/effet-escompte-non-echu).

What to remember: The expected effect is passed on to another creditor or bank. The higher the quality of the debt, the less expensive the cost of the discount. Even if rates are low, it is a gain.

Another interest is the forgetting and withdrawal of small sums that often go under the radar of customers. Agreements are established that provide for automatic renewal and anniversary dates with a minimum period of time to report the contract.

New: drown the fish under the guise of updates to the terms and conditions of sale! The service contract for which you consented is unilaterally amended. The trick is the criterion of trust. You are made to accept new conditions that cancel the previous ones.

Let us go even further in the violation of the rules of law.

If you cannot be accepted for a new document, a principle of law that does not exist in contractual matters is used. Just as a contract cannot be changed unilaterally, either by adhesion or synallagmatically, without the consent of the co-contractor.

Silence is not worth acceptance!

However, many service companies send you emails informing you that if you do not respond within a certain period of time, the contract will be considered accepted. If you refuse, you lose the service for which the provider had committed. However, the commitment may also include back-doors such as the subject of an update of general terms of sale.

The hammer and anvil method is activated!

This is a form of blackmail that is illegal, done digitally but does not rank in cyber crimes.

What for?

A beginning of response trail, because they act overdrawn and they are legally registered in corporate registers but not cyber criminals in principle.

The deterrent force of a recourse by the Internet user!

They also have a master asset, the cost of a civil or criminal action procedure in relation to the small amounts involved. The cost of obtaining a court order, such as legal fees, legal fees, time spent and the uncertainty of obtaining redress, is enough to make any desire for prosecution give up.

Even if the civil and/or criminal dol can be qualified, no one will ever know that you are also the victim of phishing by deception of the co-contractor to obtain the information of bank cards or private data.

However, when you show the teeth against cybercriminals, they trade without resisting too much. It will also depend on who you are in the fuse position. Ane  against measure of the Internet user. This will also depend on the caller in the fuse position.

The balance of power through blackmail can be balanced. The risk of bad publicity on social networks, the CNIL Pro  or  Private,can have morecostly consequences than the sums incurred. In the same way if the Internet user has insurance that pays for legal and procedural costs. In this hypothesis the blackmail is reversed by the Internet user. The latter is no longer between the hammer and the anvil.

In the end, the amicable arrangement is better than a long trial. As a result, the risk of bad publicity on social networkscan have  more costly consequences than the sums incurred. In this case, this form of threat may allow the Internet user to no longer be between the hammer and the anvil.

What are the current trends of phishing?

Phishing is a constantly evolving phenomenon, which adapts to new technologies and new behaviors of internet users. According to the statistics provided by https://www.phishing.org/phishing-statistics/ or https://www.kaspersky.com/resource-center/threats/phishing-statistics-report, phishing increased significantly in 2020 and 2021, especially because of the Covid-19 pandemic that favored remote work and online shopping. Phishing accounts for about 80% of cyberattacks and affects both individuals and businesses.

Moreover, phishing diversifies and takes new forms, such as vishing, smishing or spear phishing. Vishing is a form of phishing that uses phone calls to trick victims. Smishing is a form of phishing that uses SMS or instant messages. Spear phishing is a form of phishing that targets specific individuals or organizations using personalized information. These new forms of phishing are harder to detect and prevent, as they exploit the trust and emotion of victims.

To conclude, phishing is a major risk for the security of internet users and organizations, which requires vigilance and prevention. By following the tips that I gave you in this article, you can protect yourself from phishing and reduce the chances of being a victim.

You want to know more about the deception of the co-contractor from a legal point of view.

https://www.superprof.fr/ressources/droit/droit-general/droit-des-obligations/faute-et-nullite-du-contrat.html

Having the freedom not to give credit card information outside of a single transaction and under the exclusive control and consent of the payer, should not be a right to defend. Freemindtronic technologies  such as  EviToken  or  EviCypher  with web browser extensions protect bank card information and counter phishing attacks. It is above all a tool to exercise this right to no longer give his credit card information on the internet to be saved.

To learn more about our credit card protection solutions, you can read the following articles on Linkedin:

Why are Freemindtronic’s #NFC Offline electronic safes already in compliance with the decree that will come into effect on 01/01/19?

https://www.linkedin.com/pulse/pourquoi-les-coffres-forts-%C3%A9lectroniques-nfc-offline-de-gascuel/

A new cloud-free individual security service with anti-phishing to protect all types of bank cards from start to finish

https://www.linkedin.com/pulse/un-nouveau-service-de-s%C3%A9curit%C3%A9-individual-without-cloud-with-gascuel/

https://www.linkedin.com/pulse/victimes-dhame%C3%A7onnage-impunity%C3%A9-of-cybercriminals-jacques-gascuel/

766 trillion years to find 20-character code like a randomly generated password

A server rack filled with multiple GPUs connected by yellow and black cables, illustrating the complexity and power needed to crack a 20-character code in 766 trillion years.

766 trillion years to find randomly generated 20-character code like randomly generated password

766 trillion years to find randomly generated 20-character code is the result of a simulator to find a 20-character generated by technology EviPass.

The age of the universe is estimated at only 14 billion years, this gives you an idea of comparison.

How did I find this result that you can control on your own?

We used the Password Strength Calculator developed by Bob Beeman [1] which was last updated on January 4, 2013.

This simulator is freely available on the www.bee-man.us website as well as the source code used.

Why We Chose Bob Beeman’s Simulator

In our quest to estimate the time it would take to crack a random 20-character code, we had several simulation tools at our disposal, including lastbit.com [2], password-checker.online-domain-tools.com [3], and ANSSI’s [4] simulator from ssi.gouv.fr. However, we ultimately opted for Mr. Bob BEEMAN’s simulator due to its transparent calculation method and its technical approach to brute force attacks.

Acknowledging Mr. Bob BEEMAN

Before delving into the details of our simulation, we must extend our gratitude to Mr. Bob BEEMAN for making his code freely accessible and copyable while upholding his copyrights, as explained on his website. We hope our research can contribute to his already impressive achievements, including a record-breaking 15-millisecond feat.

Reference to Ultra-Powerful Computers

To provide you with a comprehensive understanding of the state-of-the-art technology for brute force attacks in 2013, we examined Bob Beeman’s simulator’s reference to an ultra-powerful computer designed in 2012 specifically for password cracking.

Considering Computational Capacity

Bob Beeman’s simulator takes into account the computational capabilities of computers, including the 2012 design, for executing brute force attacks on passwords. It allows for adjustments in the “Values of Hacker: Axes/Second,” providing a valuable point of reference and comparison.

Staying with Default Parameters

For the sake of consistency, we maintained the default example provided by Bob Beeman, which assumed a rate of 60-109 (billion) attempts per second.

Radeon City: Revolutionizing Password Security

In this section, we’ll delve into the incredible story of Radeon City, a game-changing password-cracking cluster boasting 25 AMD Radeon graphics cards. Discover how it was built, what it can achieve, and why it’s reshaping the world of password security.

Building Radeon City

Jeremi Gosney, the visionary behind Radeon City and the CEO of Stricture Consulting Group, sought to create a powerhouse capable of cracking passwords with unprecedented speed and efficiency. His solution? Virtual OpenCL (VCL), a groundbreaking virtualization software.

Gosney assembled five servers, each armed with five AMD Radeon HD7970 graphics cards, interconnected through VCL. The cluster, aptly named Radeon City, was born at a cost of approximately $30,000 in 2012.

Unleashing Radeon City’s Power

Radeon City is a juggernaut, capable of generating an astounding 350 billion guesses per second when cracking NTLM cryptographic algorithm hashes. In just 5.5 hours, it can test every combination of eight-character passwords, including uppercase and lowercase letters, digits, and symbols.

But it doesn’t stop there. Radeon City can crack a range of cryptographic algorithms, from MD5 and SHA1 to SHA2 and even SHA3, at unprecedented speeds. It employs various attack types, including brute force, dictionary, rule-based, combinator, and hybrid attacks, using extensive wordlists and intricate rules.

Radeon City isn’t confined to offline attacks. It can also perform online attacks through distributed cracking, where passwords are guessed on live systems.

Why Radeon City is a Game-Changer

Radeon City marks a seismic shift in password security. It reveals the vulnerability of passwords protected by fast algorithms like NTLM and challenges the belief that longer, complex passwords equate to greater security. The key takeaway? Truly secure passwords are random strings absent from dictionaries.

Moreover, Radeon City advocates for slow and salted algorithms like Bcrypt, PBKDF2, or SHA512crypt, and underscores the importance of password management tools like EviPass.

Radeon City Specifications

Jeremi Gosney, a data security researcher, engineered a groundbreaking desktop rig that can swiftly dismantle older protocols. Leveraging the Open Computing Language (OpenCL) framework and Virtual OpenCL Open Cluster (VCL), Gosney deployed HashCat—a dedicated password-cracking program. The system comprises five quad-core servers, each housing 25 AMD Radeon GPUs, providing the immense computational power required for the task. These servers are interconnected with a 10 to 20 Gbps transfer rate facilitated by an Infiniband switch.

server filled with 25 AMD Radeon HD 7970 GPUs

Here’s a snapshot of Radeon City’s technical specifications:

  • Servers: 5
  • Graphics Cards: 25 AMD Radeon GPUs
  • Model: AMD Radeon HD7970
  • Memory: 3 GB GDDR5
  • Clock Speed: 925 MHz
  • Compute Units: 32
  • Stream Processors: 2048
  • Peak Performance: 3.79 TFLOPS
  • Virtualization Software: Virtual OpenCL (VCL)
  • Password-Cracking Software: ocl-Hashcat Plus
  • Cost: $30,000 (2012)

This powerhouse enables Radeon City to achieve unprecedented speeds in password cracking, making it a game-changer in the realm of data security.

Advantages and Disadvantages of Radeon City

Advantages:

  1. Power: Radeon City cracks passwords using both fast and slow algorithms.
  2. Flexibility: It executes a variety of attacks with extensive wordlists and complex rules.
  3. Innovation: Using virtualization technology, it overcomes hardware limitations.

Disadvantages:

  1. Cost: Building and operating Radeon City can be expensive, including high electricity costs.
  2. Noise: It generates significant noise, requiring specialized cooling and soundproofing.
  3. Ethical Considerations: While powerful, its capabilities raise ethical and legal questions about its potential misuse.

Simulation Parameters and Results

To calculate the estimated time required to find a 20-character code with 94 symbols, we used the formula:

a^b / (c * 2)

Where:

  • “a” represents the number of possible characters,
  • “b” denotes the number of characters in the password,
  • “c” indicates the number of hash calculations achievable per second.

By selecting 94 symbols, a password length of 20 characters, and a 50% probability of success compared to the theoretical result, our simulation yielded an astonishing result: 766.076,000,000,000,000 years or 766 trillion [5] years.

Understanding the Financial Implications

This simulation approach not only provides insights into the time required but also sheds light on the financial investments necessary to establish a computer system capable of cracking such a password.

Consider this: The reference computer, as configured by Gosney, relies on a pool of 25 virtual AMD GPUs to crack even robust passwords. Yet, a single unit of this type, priced at approximately $30,000 in 2012, can generate just 348 billion hashes of NTLM passwords per second. To achieve results within the realm of 766 trillion years, one would need to acquire multiple such machines.

Hence, to decipher only a 20-character password generated with EviPass technology, residing within an EviTag NFC HSM or EviCard NFC HSM device, an investment of nearly $25 billion would be required. A remarkable comparison, given that global military expenses were estimated at 1.7 billion dollars [6].

Beyond Brute Force

It’s important to note that this test focused solely on brute force attacks without taking into account the activation and utilization of additional countermeasures, such as physical blockchain and jamming, which will be explored in future articles.

A Point of Reference: ANSSI’s Simulator

To provide further context, we examined the ANSSI website [7], whose simulator is limited to 20 characters and 90 symbols. This simulator yielded a score of 130, the maximum attainable. This score places passwords of this nature on par with the smallest key size of the standard AES (128-bit) encryption algorithm. Notably, our password generators exceed this maximum, boasting 20 characters with 94 symbols [8].

Forming Your Own Opinion

The aim of this article is to empower you to form your own assessment of the resilience of our password generators against brute force attacks. While we are not the sole providers of powerful password generators, our test stands as a benchmark against other comparable implementations.

Ensuring Ongoing Security

Our embedded password generator undergoes regular updates to maintain its complexity and withstand the evolving landscape of brute force attacks. Our commitment is to enhance security without compromising user convenience—a complex yet vital undertaking.

Diverse Password Generation Options

Our password creation options offer versatility. Users can either select passwords from the pool of 95 available characters, opt for a semi-automatic generation followed by modification, or automate the process entirely according to default criteria, allowing passwords of up to 20 characters.

Adaptability to Website Constraints

For websites that impose restrictions on symbols or character limits, users can customize their password generation preferences, choosing between identifiers, letters, and/or numbers, with or without symbols.

Hexadecimal Generator for Added Utility

We’ve also introduced a hexadecimal generator to facilitate programming of digital codes. This feature proves invaluable in various domains, including electronics, electromechanics, and maintenance services, enabling the creation and modification of digital access codes with ease. Furthermore, codes can be securely shared with building residents through functions like “scrambling” or encryption via a QR Code, all made possible by EviCore technologies from Freemindtronic.

To learn more about our solutions, please visit:

Contactless Secrets Keeper Multiple Trust Criteria

Contactless secrets keeper and data encryption the new invention 2021 from Jacques Gascuel 100 years after Mr Hugo Alexander Koch by freemindtronic Andorra

Contactless Secrets Keeper & Data Encryption the new invention 2021 from Jacques

100 years after Hugo Alexander Koch, Jacques Gascuel invented the the first secrets keeper & contactless encryption system that fits in your pocket.

Jacques Gascuel presents the latest implementation of his invention on segmented key encryption at the 2021 International Exhibition of Inventions Geneva.

The inventor, of French origin, is a resident of the Principality of Andorra. In fact, Andorra is one of the 25 countries participating in the international invention’s competition in Geneva.

Andorra, Spain and France have 9 participants in this competition.

France 5 participants in classes C, K, N and F

Espagne 3 participants in classes P and V

Andorre 1 participant in Class C (page 32)

There are a total of 352 participants, 77 in Class C, 68 in Class V, 21 in Class P, 18 in Class F, 16 in Class K and 5 in Class N. (meaning classes at the end of article)

The beginnings of a portable encryption machine

In October 1919 Hugo Alexander Koch filed a patent application for a portable electromechanical encryption machine that would be used by the German army during World War II. It will be developed and marketed by Arthur Schermie’s to the Enigma brand.

No alternative text for this image

100 years later, on August 31, 2018, the first segmented key authentication system for encryption was invented by Jacques Gascuel. The first tool of individual sovereignty was born.

No alternative text for this image

After 3 years of research and development to find an effective solution to combat cybercrime and corporate espionage, inventor Jacques Gascuel creates in 2021 the first contactless encryption device, retro compatible, which fits in a pocket.

Greentech technology

It is a the the first secrets keeper & contactless encryption system that respects the environment. It works for life without battery, maintenance and cloud. It can be reset, in “factory return” configuration for the second hand market. Compatible with almost all information systems, IT systems and cloud services. The system is designed to operate in an extreme environment, for  more than 40 years, without the need for electrical energy. Finally, the system uses the energy it recovers via the NFC signal from the phone’s antenna. Thus, the system uses energy only at the time of use. That’s as much electrical power saved for storing sensitive data such as passwords and encryption keys still connected to computer systems around the world.

Absolute Anonymity, a force of individual sovereignty

This unconnected system, which collects no data from the user or the type of NFC device used, makes its use completely anonymous.

A scalable and adaptable 360-degree encryption system

The user can encrypt almost everything: instant messaging services, SMS and MMS. It can also encrypt data stored on physical media such as USB sticks, SD card, SSD and internal or external hard drive, including online storage services.

The user can also encrypt his communication protocols.

The system also allows the conditions for the use of encryption to be enslaved to confidence criteria of physical origin, such as territorial areas of 1 m2 to 2,500 km2.

This technology is scalable. It can be advantageously used as, a Token security manager dongle, an IoT encryption system or as an authentication system with more than 12 configurable factors at the discretion of the user and/or administrator.

Users of this technology immediately acquire absolute individual sovereignty over their data via an unencrypted, end-to-end, unconnected NFC device.

A system designed for sensitive professional activities

EviCypher technology features a fully automated intelligent fleet manager. This gives RSSIs a simple solution for managing multi-station computing and NFC phones that interface with devices.

A solution that solves countless cyber security and security problems related to telecommuting, mobility and CYOD, BYOD, COPE and COBO.

EviCypher technology is based on an Air Gap system that significantly reduces attack surfaces, especially remotely.

The administrator and user of this technology have absolute control over their digital lives and physical access.

An efficient solution for businesses

A solution quickly depreciable, without financial commitment, via a “one-shot” purchase.

The speed of commissioning, the ease of use and learning, save a considerable amount of time on a daily basis.

This is all the truer in the case of its use by companies that use telework and international mobility.

An effective hardware system to combat identity theft and espionage.

This new tool, which can be set at the discretion of the administrator and/or the user, offers an authentication solution that includes 12 physical trust criteria. This effectively combats “attacks on the president.”

EviCypher will be compatible with the #Thunderbird #Mozilla e-mail service to encrypt and decrypt, without contact, via a #NFC device, emails and attachments.

A hardware manager of complicated encryption keys and passwords

It is designed to handle and store up to 200 AES 256 encryption keys and 4 RSA 2048 keys or 2 RSA 4096 keys.

It is also possible to manage up to 200 complicated passwords and/or password phrases with self-login system and logon.

EviCypher is a technology developed, marketed and custom-made only by Freemindtronic Andorra.

 

Continue reading

EviCypher Universitat Andorra Training Cybersecurity

EviCypher Universitat Andorra Training Cybersecurity Fabrice Crasnier director research development Freemindtronic Andorra 11 12 May 2021

EviCypher Universitat Andorra First Training on EviCypher

First training on EviCypher was inaugurated in collaboration with  Universitat d’Andorra  on the theme “Cybersecurity, the key to telecommuting. When crime becomes digital”  RCP2021.

The training provided by  Fabrice CRASNIER,  Director of Research and Development at  Freemindtronic SL,  was theoretical and practical with interactive demonstrations with participants.

The number of participants allowed them to benefit from personalized attention and at the same time to ensure compliance with health measures in Andorra.

Who it is for

The course is aimed at teachers, students, IT professionals and anyone working in the field of IT security or sensitive data.

Regarding the practical part of the course

Participants will develop a mature audit that will allow them to assess the level of security of their information system.

As part of an information system engagement, participants discovered elements that lead to an understanding of the attack.

The training took place on 11 and 12 May at the University of Andorra.


You want more information click  HERE.

Freemindtronic home

 

Best international invention 2021

Best invention worldwide 2021, EviCypher NFC Hardware Wallet contactless Secrets Management multi trust criteria Gold Medal 2021 Geneva international inventions by Freemindtronic Andorra
evicypher dual nfc hardware wallet black golden encryption key management password manager by freemindtronic andorra

Download press releases 

The following press releases are freely available for download. If you would like more information, please contact us via our contact form by clicking here.

Read more of the best international invention 2021 click here 

Best invention worldwide 2021 with Gold medal of international inventions of Geneva.

The best invention worldwide 2021, it’s EviCypher Technology from Freemindtronic for the category C (computer sciences, software, electronics, electricity and method communication).

Because, the personal security should no longer be in the hands of connected digital services, but in those of the individual. Indeed, it is because cybercriminals have access to digital systems that they can carry out their attacks. Freemindtronic’s EviCypher technologie, invented by Jacques Gascuel, establishes an effective physical and digital barrier. It’s an “Air Gap” device that keeps secrets, but that’s not all.

Make your internet connections anonymous

Make your internet connections anonymous website account with NFC devices hardware wallet Secrets Keeper management EviCypher technologies by Freemindtronic Made in Andorra

OPEN YOUR CONNECTIONS TO WEB ACCOUNTS ANONYMOUSLY

All of which we recommend using freemindtronic products to make anonymous access to internet accounts especially for the EviCypher website.

For your security and anonymization of your account we invited you to follow the following tips.

  • Your EviCypher account ID and password is strictly personal, so keep it secret. Even if we don’t keep credit card data, we invite you to use  EviToken  or  EviCypher   technology toaccess their free web browser extensions to manage and use your passwords.   We advise our customers to use a unique number for this account. It is also possible to use an ephemeral password just to purchase our products and delete your account after receiving the product. Heard, that the warranty of our products is embedded for life in a black box secured by your administrator password. We have a unique manufacturer number that allows us to authenticate that these are our products. Therefore, it is not necessary for our customers to keep the account open after their purchase. This will not require regular changes to the password. This also has the advantage of saving a memory slot to record a  secret in one  of the NFC devices with EviToken  or  EviCypher technology.  For our partners with an account in an affiliate program that involves keeping a password, the password must be unique and regularly randomly replaced with one of our preference solutions.
  • – If you don’t use Freemindtronic’s (FMT) web browser extension with one of our solutions, make sure that the computer you’re viewing your Fullsecure account on is cyber-secured by an antivirus, antimalware, anti-phishing and that these are up to date.
  • Check the address (URL) in your browser bar when you visit
  • The address (URL) must start with https:// and a padlock must appear.
  • Don’t forget to log out of your Fullsecure session before you close your internet browser. This is especially so if you use a shared computer (cybercafé…)
  • To learn more about phishing risks, typosquatting, Ransomhack, click on the following link Phishing Cyber victims caught between the hammer and the anvil

Air Gap secrets management

Air Gap secrets management nfc hardware wallet secrets keeper Safety & Cybersecurity awards Gobal Infosec Freemindtronic Made in Andorra

Air Gap secrets management by Freemindtronic Andorra.

The Importance of Air Gap secrets management

The challenge is to keep the secrets as long as possible, and that they are always accessible, in seconds, by authorized persons. The data must be non-repudiable.

The device must be scalable and easy to use, without batteries, without charge and without guarantee for life. It has a    multi-level access control of physical source confidence. It can be used  offline. It isskimmed from end to end from the device to the display as well as the sharing of secrets.

In addition, the device works for life without battery.

It is resistant to all types of environment, to immersion in liquids, X-rays, electrostatic, magnetic, electrical, thermal -40 to 85 degrees, mechanical stress. It also works under water, in wood or concrete.

Ideally, such a solution should also be favourable to the planet and should be ecologically favorable.

The device decentralizes the secrets of computer systems and information systems. The device has an autonomous energy security  system. It designed to be the best security system  and cyber security physical and digital. It is manageable and usable offline, without contact at the discretion of the administrator and/or the user.

Freemindtronic NFC devices have all the above features. In addition, they withstandbrute force attacks  from a distance  and nearby. A remote cyberattack  is physicallyimpossible. Indeed, the devices are physically not connected with thenetwork,  it communicates with the network only contactless, on demand, in an encrypted way. These are Air Gap devices.

How the Air Gap secrets management Works?

It’s a physical barrier, the Air Gap”! The device is not physically connected to a network! It has no physical connectors! It has no back door! One means of communication, NFC industrial technology! For more information click  

Wikipedia on Air Gap security

How does the devices work?

All operating guides are made in real-time video, and show that sensitive data can be recorded, read and shared in seconds, offline, without a server connection. Everything is done without contact, via an industrial NFC memory capable of keeping the data in its memory for 40 years, without the need for an electrical energy source. It is possible to perform more than a million writing cycles in these memories, without error.

  To learn more about how Freemindtronic’sNFC devices work,  watch the videos from theplaylist of the Freemindtronic  or  EviVaultchannel.

These videos include user guides for various products and services designed and manufactured on the basis of our  EviAlpha,  EviToken  and EviCyphertechnologies.

These devices are designed to store for life many types of secrets such as private cryptocurrency keys (Bitcoin, Ethereum and other crypto-assets such as IOAT, Tron) and the Passphrases of Smart Contracts and Seed Recovery BIP39 as well as passwords and encryption keys in RSA 4096 and AES 256. 

To date, Freemindtronic’s NFC devices can generate the addresses of private keys for Solarcoin, Bitcoin, Bitcoin Cash, Bitcoin Gold, Dash, Digibyte, Dogecoin, Ethereum, Ethereum Classic, Ethereum Gold, Ethereum Lite, Ethereumcash, Feathercoin, Stellar, Litecoin, Namecoin,

To learn more about the EviVault NFC HSM Technology in click here or the EviCore NFC HSM Technology in click here

Hardware secrets manager Eco-friendly

Hardware Secrets Manager, Eco-friendly, NFC devices, works contactless from Freemindtronic is sustainable technology respects the environment design & product made in Andorra

hardware secrets manager eco-friendly goes beyond secret keeper contactless.

hardware secrets manager eco-friendly in our Cybersecurity innovations is much more than a commitment. It’s a reality ! Extreme lifespan, Cloud-free, maintenance-free and infinitely transferable products for the secondary market.

From the birth of this idea, the innovation that uses industrial NFC has integrated sustainable development.

How can we integrate ecology process into our innovations, at our start-up scale, make ecology a reality and design our products and services taking into account the circular production and consumption model to compensate to the problems linked to linear consumption (extract, produce, consume, throw away) which is undoubtedly at the origin of strong environmental impacts (use of resources, greenhouse gas emissions, pollution and more or less waste production dangerous)?
 
Our desire is to extend the lifespan of products and services as much as possible as part of a united ecological approach aimed at reducing, or even extinguishing, our environmental impact. The inventor Jacques Gascuel, the designer of our products and services, integrates from the birth of a new idea the eco friendly parameters in our innovations including their uses and their industrialization in a virtuous cycle of sustainable development. Thus, until they are put on the market, the solutions that we develop go far beyond the criteria laid down by the laws of the energy transition. These same laws that frame green growth with the aim of improving product design, by sanctioning planned obsolescence, that is to say deliberately designing a product so that its lifespan is reduced.

Eco friendly process with the extreme lifespan of our products and services

More than a will, a reality in sustainable development: we design devices with a lifespan of several tens of years.
 
As early as 2007, when he applied for his first patent, the ecological aspect was integrated into Jacques Gascuel’s inventions. In 2010, in Geneva, he received the silver medal for world invention for his safety system for electrical devices equipped with a black box. This same technology is embedded in EVIKEY NFC and EVIDISK NFC products in order to fight against planned obsolescence and protect electronic systems from electrical and / or environmental hazards. It is a black box which not only traces the life of the product and its uses, but which is also capable of identifying the origin of a malfunction to carry out material proof and establish legal responsibilities.
 
The strength of sustainable development also applies to the latest inventions of the inventor Jacques Gascuel. EviCard, Evitag, EviVault, EviToken et EviCypher technologies have an extreme lifespan, estimated at more than 40 years.
 
In addition, extending the lifespan of our manufactured products is one of the levers that significantly reduce environmental impacts. This contributes to waste prevention, as part of a transition to a circular economy, but not only.

Our participation in the other aspect of ecology is energy saving

Our solutions go even further in terms of energy saving since our devices produce their own electrical energy to operate and have no battery (positive energy aspect). This has a double advantage: a saving of electrical energy and the absence of recycling of waste by the absence of a cell or battery whose lifespan is limited between 3 and 5 years.
 
In the same dynamic, our products and services do not use an internet connection or a remote server to host and use your data (identifiers, passwords, bank cards, encryption keys and access codes). They are recorded in real time dynamically in a programmable memory. Our products work with the auto micro energy produced via the signal from the NFC antenna of the terminal (smartphone). In fact, we have almost no impact on the power consumption, nor on the water and / or derived products, used for cooling servers (Cloud).

How do we participate in reducing waste in our Cybersecurity innovations from their conception?

In terms of waste, we are maximizing our development by using active and passive silicon-based components whose lifespan is not yet known. We mainly use components mass produced by the European group STMicroelectronics. This makes it possible to reduce on the one hand the risk linked to the obsolescence of the components, to favor the European economy, and to use components already mass produced and already proven like smartphones, bank cards or industry . In addition, our products such as Rugged NFC EviVault, EviPro, EviPlus, EviLite, EviOne, EviKey, EviDisk, are hardened to the extreme, and are able to withstand mechanical stresses of several tons, erosion, water, air, dust, brute force attacks, which considerably increases the lifespan of silicon components and therefore the on-board system designed to operate for several decades. In the field of service, our protection systems against brute force attacks are designed to restore our products to their factory configuration, of course after irreversibly erasing all the data stored in memory. This factory reset allows the product to be reused. Only one condition, however, that the owner has in his possession the unique pairing key associated with the product.

Making eco friendly innovations means to plan it from conception to industrialization

We also take ecology into account in the manufacturing process of our products. This means design products with the least possible impact on the environment; this is the principle of eco-design seen by the inventor. He sets goals, in the form of challenges, which require creativity. How do you make cybersecurity products as light and robust as possible, resilient in the extreme? How to achieve “zero defects”, to be adaptable and to be compatible between products and services, to anticipate and take into account technological developments with a long-term vision on the various uses? How do you get products that are extremely easy to maintain and up to “maintenance free”? How to favor, from the design, the manufacturing aspect to use recycled or easily recyclable materials?

Our eco friendly bring real values for our consumers due to  sustainable development

  • Products that work without any maintenance, are upgradeable for free, contribute to energy saving, with an extreme lifespan.
  • Products that can be given, sold, loaned or rented, in compliance with normal conditions of use. Designed not to break down, but nevertheless replaced free of charge for at least five years in the event of a manufacturing defect, since in principle no one is required.
  • The on-board security and safety system against brute force attacks and the possibility of formatting allow the product to be returned to factory configuration, which gives our solutions a second life, or even several other lives.
  • User guides available in video with subtitles on youtube EviToken Technology.
  • No batteries to change, no need to recharge, no maintenance, very easy to use, extreme hardened versions capable of operating in a deadly environment for humans.
  • An on-board black box which tracks the entire life of the product and in particular electronic, thermal, electrical or environmental anomalies
  • Cybersecurity solutions that can be used simply, on a daily basis, which respect the environment of the planet, the private and professional life of their user; this is our commitment eco-responsible

Our hardware secrets manager eco-friendly complies with laws, European and international directives

By the simple fact of the design of our products and services, they are already in compliance with the latest European Parliament Resolution of July 4, 2017 about a longer lifespan of products: benefits for consumers and businesses (2016/2272(INI)).

In the same way, we are also in compliance with French law n° 2015-992 of August 17, 2015 relating to the energy transition for green growth which strengthens the fight against planned obsolescence and promotes the extension of the duration of use of products through consumer information.Click here to know more about  the product life as mentioned by Europe since July 4th 2017

Android NFC phones compatible

List of Android NFC Phones compatible with the FMT application from Freemindtronic Made in Andorra

Android NFC Phones Compatible with FMT Application

Welcome in Android NFC phones compatible you will find a NFC compatible phone list Android that work with the FMT application, contactless technologies for NFC devices developed by Freemindtronic Andorra.

Google source update date: 7/05/2021

 


 
Manufacturer Model Name Model Code
A1 A1 Alpha 20+ P671F60
A1 A1 Smart N9 VFD720
AG Mobile AGM A9 HSSDM450QC
AG Mobile AGM A10 SHARKL5
AG Mobile AGM X3 T91EUE1
AT&T U705AA U705AA
ATOL Smart.Slim Plus t50p
AZOM TECH Desert2 Desert2
Accent TANK_P55 TANK_P55
Acer Walle Walle
Acer E380 acer_e3n
Acer A3-A30 omega
Adart RX550 ALIGATOR_RX550
Advantech AIM75-LTE AIM75-LTE
Advantech AIM75-WIFI AIM75-WIFI
Aligator ALIGATOR_RX710_EEA ALIGATOR_RX710
Aligator ALIGATOR RX800 ALIGATOR_RX800
Aligator RX700 RX700
AllView X2 Soul Xtreme X2_Soul_Xtreme
Altice E54 E54
Altice S32_NFC S32_NFC
Altice ALTICE S43 S43
Altice ALTICE S60 S60
Altice S61 S61
Altice ALTICE S70 S70
Archos 50 Diamond ac50da
Archos Archos Sense 50X ac50xse
Archos Logic Instrument Fieldbook F1B lifbf1b
Ascom Ascom Myco 3 ABAA
Ascom Ascom Myco 3 ABBA
Ascom Ascom Myco 3 ACAA
Ascom Ascom Myco 3 ACBA
Ascom Ascom Myco 3 ADAA
Aspera ASPERA R9 R9
Asus PadFone 2 A68
Asus PadFone Infinity ASUS-A80
Asus The new PadFone Infinity (A86) ASUS-A86
Asus PadFone X (A91) ASUS-T00D
Asus ZenFone AR (ZS571KL) ASUS_A002
Asus ZenFone AR ASUS_A002_1
Asus ZenFone Ares (ZS572KL) ASUS_A002_2
Asus ZenFone V ASUS_A006
Asus ROG Phone ll ASUS_I001_1
Asus ZenFone 7 / 7 Pro (ZS670KS/ZS671KS) ASUS_I002D
Asus ROG Phone 3 ASUS_I003_1
Asus ROG Phone 5 ASUS_I005_1
Asus ZenFone 6 (ZS630KL) (WW) / 6Z (ZS630KL) (IN) ASUS_I01WD
Asus PadFone S (PF500KL) ASUS_T00N
Asus ZenFone Go (T500) ASUS_X003
Asus ZenFone 5 (ZE620KL) ASUS_X00QD
Asus ZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN) ASUS_X00T_6
Asus ZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN) ASUS_X00T_8
Asus ZenFone 5 Lite (ZC600KL) ASUS_X017D_1
Asus ZenFone 5 Lite (ZC600KL) ASUS_X017D_2
Asus ZenFone Max Pro M2 (ZB631KL) (WW) / Max Pro M2 (ZB630KL) (IN) ASUS_X01BD_1
Asus 飛馬2 Plus (T550KLC) ASUS_X550
Asus ZenFone 3 Deluxe (ZS550KL) ASUS_Z01F_1
Asus ZenFone 4 Pro (ZS551KL) ASUS_Z01GD_1
Asus ZenFone 4 (ZE554KL) ASUS_Z01KDA
Asus ZenFone 4 (ZE554KL) ASUS_Z01KD_1
Asus ROG Phone ASUS_Z01QD_1
Asus ZenFone 5Z (ZS620KL) (WW) / 5Z (ZS621KL) (IN) ASUS_Z01R_1
Asus Transformer Pad (TF103CE) K010E
Asus Transformer Pad K010_1
Asus Transformer Pad (TF103C) K010_3
Asus MeMO Pad 7 (ME176CE) K013C
Asus MeMO Pad 8 (ME581CL) K015
Asus ZenFone 2 (ZE551ML) Z00A
Asus ZenFone 2 (ZE551ML) Z00A_1
Asus ZenFone 2 (ZE551ML) Z00A_3
Asus ZenFone Zoom (ZX551ML) Z00X
Asus ZenFone Zoom (ZX551ML) Z00X_1
Asus ZenFone Zoom (ZX551ML) Z00X_2
Asus ZenFone 3 Deluxe (ZS570KL) Z016
Asus ZenFone 3 Deluxe (ZS570KL) Z016_1
Asus Nexus 7 (2013) deb
Asus Nexus 7 (2013) flo
Asus Nexus 7 (2012) grouper
Asus Nexus 7 (2012) tilapia
Athesi  AP5701 AP5701
Athesi Athesi professional AP5705S AP5705S
Athesi AP5801 AP5801
Athesi AP6301 AP6301
Audi AG SDIS1 sdis1
BARTEC Pixavi Phone PixaviPhone
BARTEC Pixavi Thermal PixaviThermal
BLUEWORLD TM12 TM12
BQru BQ-5001L Contact BQru-5001L
BQru BQ-5045L BQru-5045L
BQru BQ-5530L BQru-5530L
BQru BQ-5535L BQru-5535L
BQru BQ-5540L BQru-5540L
BQru BQ-5541L BQru-5541L
BQru BQ-5730L BQru-5730L
BQru BQ-5731L Magic S BQru-5731L
BQru BQ-6015L Universe BQru-6015L
BQru BQ-6035L BQru-6035L
BQru BQ-6040L BQru-6040L
BQru BQ-6042 BQru-6042L
BQru BQ-6424L BQru-6424L
BQru BQ-6630L BQru-6630L
BenQ Agora 4G Agora_4G
BenQ Agora_4G_Pro Agora_4G_Pro
BenQ F5 BENQ_F5
BenQ F5_16 F5
BenQ F52_09 F52
BenQ F55 F55
BenQ F55J F55J
BenQ Harrier Harrier
BenQ T3 T3
Bentley SDIS1 sdis1
Bittium Bittium Tough Mobile 2 craton
Bittium granite granite
BlackBerry DTEK60 argon
BlackBerry KEYone bbb100
BlackBerry BlackBerry MOTION bbd100
BlackBerry BlackBerry KEY2 LE bbe100
BlackBerry BlackBerry KEY2 bbf100
BlackBerry DTEK50 hamburg
BlackBerry PRIV by BlackBerry venice
Blackfox BMM441A BMM441A
Blackfox BMM441B BMM441B
Blackfox BMM441S  BMM441S
Blackfox BMM442D BMM442D
Blackfox BMM442S BMM442S
Blackfox BMM443D BMM443D
Blackfox BMM541B BMM541B
Blackfox BMM541W BMM541W
Blackfox BMM543D BMM543D
Blackfox BMM543S BMM543S
Blackshark SHARK KSR-A0 kaiser
Blackshark SHARK PRS-A0 penrose
Blackview A80Plus A80Plus
Blackview BL6000Pro BL6000Pro
Blackview BV4900 BV4900
Blackview BV4900Pro BV4900Pro
Blackview BV5100 BV5100
Blackview BV5100Pro BV5100Pro
Blackview BV5500Plus BV5500Plus
Blackview BV5500Pro BV5500Pro
Blackview BV5800 BV5800
Blackview BV5800PRO_RU BV5800Pro_RU
Blackview BV5800PRO BV5800_PRO
Blackview BV5800_RU BV5800_RU
Blackview BV5900 BV5900
Blackview BV6000s BV6000S
Blackview BV6000S_RU BV6000S_RU
Blackview BV6000_RU BV6000_RU
Blackview BV6100 BV6100
Blackview BV6300 BV6300
Blackview BV6300Pro BV6300Pro
Blackview BV6600 BV6600
Blackview BV6800Pro BV6800Pro
Blackview BV6800Pro-RU BV6800Pro_RU
Blackview BV6900 BV6900
Blackview BV7000 BV7000
Blackview BV8000 Pro BV8000Pro
Blackview BV8000Pro_RU BV8000Pro_RU
Blackview BV9000 BV9000
Blackview BV9000-F BV9000-F
Blackview BV9000-RU BV9000-RU
Blackview BV9000 Pro BV9000Pro
Blackview BV9000 Pro-F BV9000Pro-F
Blackview BV9000-RU BV9000Pro-RU
Blackview BV9100 BV9100
Blackview Blackview BV9500 BV9500
Blackview Blackview BV9500-RU BV9500-RU
Blackview Blackview BV9500Plus BV9500Plus
Blackview Blackview BV9500Pro BV9500Pro
Blackview BV9600 BV9600
Blackview BV9600E BV9600E
Blackview Blackview BV9700Pro BV9700Pro
Blackview BV9800 BV9800
Blackview BV9800Pro BV9800Pro
Blackview Blackview BV9900 BV9900
Blackview Blackview BV9900E BV9900E
Blackview Blackview BV9900Pro BV9900Pro
Blackview BV9600Pro Blackview
Blackview MAX1 MAX1
Blackview BV6000 SOLID_4G1
Blu PURE XL BLU_PURE_XL
Bluboo S2 S2
Bluboo S3 S3
Bluebird BM180 BM180
Bluebird EF400 EF400
Bluebird EF401 EF401
Bluebird EF500 EF500
Bluebird EF501R EF501
Bluebird EF550 EF550
Bluebird EF550R EF550R
Bluebird EK430 EK430
Bluebird HF450 HF450
Bluebird HF550 HF550
Bluebird RT080 RT080
Bluebird RT103 RT103
Bluebird ST103 ST103
Bluebird VF550 VF550
Bluebird VX500 VX500
Brandt BPRIMES BPRIMES
Bravva Impress_Aero Impress_Aero
Bullitt Group Cat S60 CatS60
C5 Mobile noa X2 Plus noa_x2_Plus
CHAINWAY C6000 C6000
CHAINWAY C71 C71
CHAINWAY P80 P80
CHCNAV HCE600 HCE600
CHCNAV LT700 LT700
CILICO C6 C6
CILICO F880 F880
CONKER ST60 ST_60
CONKER SX50 SX50
Carbon Mobile Carbon 1 Mark II C1M2BD_R2
Casio ET-L10 ET-L10
Casio DT-X400 dtx400
Casio IT-G400 itg400
Casio itg600 itg600
Casio IT-G650 itg650
Cat S40 CatS40
Cat Cat S41 CatS41
Cat Cat S48c CatS48c
Cat S50 CatS50
Cat CatS50c CatS50c
Cat Cat S52 CatS52
Cat Cat S61 CatS61
Cat Cat S42 S42
Cat Cat S42 S42G
Cat Cat S62 S62
Cat Cat S62 Pro S62Pro
Cedar Cedar CT8X2 CT8X2
Cedar Cedar CT8X2 CT8XEU
Chameleon Chameleon-H Chameleon-H
Cherry Mobile Flare X Flare_X
China Mobile n1 max m823_cmcc
Cipherlab Hera51 Hera51
Cipherlab RK25 RK25
Cipherlab RK25WO RK25WO
Cipherlab RK95 RK95
Cipherlab RS31 RS31
Cipherlab RS35 RS35
Cipherlab RS51_HS RS51_HS
Cisco CP-860 860
CloudMinds A1-901 A1-901
Code CR4900 cr4900
Concord Concord M15 Concord_M15
Condor PGN607 PGN607
Conquest CONQUEST S12Pro S12Pro
Conquest S11 conquest-S11
Conquest conquest_S16 conquest_S16
Coolpad 8971 8971
Coolpad A8-931 A8-931
Coolpad Y803-8 CPY803_8
Coolpad Y803-9 CPY803_9
Coolpad CPT1 CoolpadT1
Coolpad VodafoneSmart4 VodafoneSmart4
Coolpad VodafoneSmart4turbo VodafoneSmart4turbo
Coolpad Y92-9 Y92-9
Coppernic C-eight C-eight
Coppernic C-five C-five
Covia CP-K19 CP-K19
Cricket U705AC U705AC
Crosscall CORE-M4 CORE-M4
Crosscall TREKKER-M1 CORE HS8909QC
Crosscall Trekker- M1 HS8916QC
Crosscall Core- X3 HS8917QC
Crosscall Action-X3 HS8937QC
Crosscall Action-X3 HS8937QCs
Crosscall TREKKER- X3 HS8952QC
Crosscall Trekker- X4 HSSDM660QC
Crosscall Core-X4 L762
Crosscall Core-T4 L810
Cubot C20 C20
Cubot C30 C30
Cubot KINGKONG 5 Pro KINGKONG_5_Pro
Cubot KING_KONG_3 KING_KONG_3
Cubot NOTE 20 NOTE_20
Cubot NOTE 20 PRO NOTE_20_PRO
Cubot P40 P40
Cubot QUEST QUEST
Cubot X30 X30
Custom K-Ranger K-Ranger
Custom P-Ranger P-Ranger
Cyrus CM17 CM17
Cyrus CM17XA_EEA CM17XA
Cyrus CS22 CS22
Cyrus CS22XA CS22XA
Cyrus CS22XA_EEA CS22XA_EEA
Cyrus CS40 CS40
Cyrus CS45XA CS45XA
Cyrus CS45XA_EEA CS45XA_EEA
DEXP AS260 AS260
DEXP DEXP B145 B145
DEXP B260 B260
DEXP G355 G355
DEXP GL255 GL255
DEXP GL355 GL355
DEXP GS150 GS150
DEXP GS153 GS153
DEXP GS155 GS155
DEXP T155 T155
DSIC RD86QE RD86QE
DSIC Mobilebase DS6 ds6
Datalogic Memor 20 Q10
Datalogic Memor 20 Q10A
Datalogic Datalogic MEMOR 10 dl35
Datalogic Skorpio X5 sx5
Datamini TPOS74G-IGF720 TPOS74G-IGF720
Dell Venue 10 SO
Denso Wave BHT-1700QWB-2-A7 BHT-1700QWB-2-A7
Denso Wave BHT-1700QWBG-2-A7 BHT-1700QWBG-2-A7
Denso Wave BHT-1800QWB-3-A7 BHT-1800QWB-3-A7
Denso Wave BHT-1800QWBG-3-A7 BHT-1800QWBG-3-A7
Denso Wave BHT-M60-QW-A10 BHT-M60-QW-A10
Denso Wave BHT-M60-QWG-A10 BHT-M60-QWG-A10
Denso Wave BHT-M70-QWG-A10 BHT-M70-QWG-A10
Denso Wave BHT-M80-QW-A10 BHT-M80-QW-A10
Denso Wave BHT-M80-QWG-A10 BHT-M80-QWG-A10
Denso Wave BHT-1600 BHT1600
DiMora Mobile Adrenalin Pro Adrenalin_Pro
Digi Digi R2 Digi_R2
DigiLand DL1031 mid1031
Digicel Digi K1 Digi_K1
Digma CITI 609 CS6063ML
Digma DIGMA LINX PAY 4G LS5053ML LS5053ML
Ditecma M1092R M1092R
Ditecma M1092RV5 M1092RV5
Ditecma M1092Rv4 M1092Rv4
Doogee N100 N100
Doogee S40 S40
Doogee S40Pro S40Pro
Doogee S58Pro S58Pro
Doogee S59Pro S59Pro
Doogee S60 S60
Doogee S60Lite S60Lite
Doogee S68Pro S68Pro
Doogee S70 S70
Doogee S70Lite S70Lite
Doogee S80 S80
Doogee S80Lite S80Lite
Doogee S86 S86
Doogee S86Pro S86Pro
Doogee S88Plus S88Plus
Doogee S88Pro S88Pro
Doogee S90C S90C
Doogee S90pro S90Pro
Doogee S95 S95
Doogee S95Pro  S95Pro
Doogee S96Pro S96Pro
Doogee Y8plus Y8Plus
Doro Doro 824 825A
Doro Doro 8042 DSB0110
Doro DSB-0220 DSB0220
EACRUGGED EP500 EP500
EACRUGGED RG80  RG80
EACRUGGED Wolf10R Wolf10R
ECS TF10EA2 TF10EA2_4
ECS TF10EA2 TF10EA2_P8_1
ECS TF10MK1 TF10MK1_3
ELO Touch M50 M50
ELO Touch M50C M50C
EPIKONE RS550 RS550
Elephone A6_Max A6_Max
Elephone E10 E10
Elephone E10_Pro E10_Pro
Elephone PX_Pro PX_Pro
Elephone Soldier Soldier
Elephone U3H U3H
Elephone U5 U5
Elephone U_Pro U_Pro
Elevate V55C V55C
Emporia emporiaSMART.4 S4
Emporia S5_EEA S5
Emporia SE SE
Energizer Hardcase H620S H620SEU
Energizer H550S HARDCASEH550S
Energizer Ultimate U710S Ultimate_U710S
Essential Products PH-1 mata
Evolveo EVOLVEO StrongPhone G8 EVOLVEOG8
Evolveo GM6 DS StrongPhoneG5
Evolveo EVOLVEO StrongPhone G9 StrongPhone_G9
Extrem Rock_X11 ROCK_X11
F150 B2021 B2021
F150 Bison2021_EEA Bison2021
Fairphone Fairphone3 FP3
Famous Fones Fonos-O1 Fonos-O1
Firehawk ToughDroid ToughDroid
Freebit TONE m15 TONE_m15
Fujitsu BZ01 BZ01
Fujitsu F-01F F01F
Fujitsu F-01H F01H
Fujitsu F-01J F01J
Fujitsu F-01K F01K
Fujitsu F-01L F01L
Fujitsu F-02F F02F
Fujitsu F-02G F02G
Fujitsu F-02H F02H
Fujitsu F-02K F02K
Fujitsu F-02L F02L
Fujitsu F-03G F03G
Fujitsu F-03H F03H
Fujitsu F-03K F03K
Fujitsu F-04G F04G
Fujitsu F-04H F04H
Fujitsu F-04J F04J
Fujitsu F-04K F04K
Fujitsu F-05F F05F
Fujitsu F-05J F05J
Fujitsu arrows Be4 F-41A F41A
Fujitsu F-42A F42A
Fujitsu F-51A F51A
Fujitsu arrows NX9 F-52A F52A
Fujitsu FARTMB611Y FARTMB611Y
Fujitsu ARROWS M01 M01
Fujitsu arrows M02 M02
Fujitsu arrows M03 M03
Fujitsu arrows M04 M04
Fujitsu arrows M04 PREMIUM M04P
Fujitsu M305 M305
Fujitsu ARROWS M357 M357
Fujitsu M359 M359
Fujitsu ARROWS M555 M555
Fujitsu Patio600 Patio600
Fujitsu Patio730 Patio730
Fujitsu 801FJ SBM801FJ
Fujitsu TONE m17 TONEm17
Fujitsu 901FJ YM901FJ
Fujitsu arrows M05 arrowsM05
Fujitsu arrows RX arrowsRX
Fxtec Fxtec QX1000 QX1000
GRID Communications (SG) GS6100 GRID_GS6100
GSmart GX2 GBC_ares
Gen2Wave RP70A RP70A
General Mobile GM 9 Plus GM9PLUS_s
Gesellschaft für SMK mBH Tough Mobile granite
Geshem GS81TE GS81TE
Getnord LYNX LYNX
Gigaset GS290 GS290
Gigaset Gigaset GS3 GS3
Gigaset GX290 GX290
Gigaset Gigaset GS4 Gigaset_GS4
Ginzzu RS9602 RS9602
Gionee M7Plus GIONEE_BJ17G08A
Gionee GN3002 GIONEE_GBL7356
Gionee GN3002L GIONEE_GBL7356L
Gionee M2017 GIONEE_GBL8918
Gionee F106L GIONEE_SW17G03
Gionee GIONEE F109 GIONEE_SW17G09
Gionee E8 GiONEE_GN9008
Glocalme S20i S20iQ19
Google Pixel 3 blueline
Google Pixel 3a XL bonito
Google Pixel 4a (5G) bramble
Google Pixel 4 XL coral
Google Pixel 3 XL crosshatch
Google Pixel 4 flame
Google Pixel XL marlin
Google Pixel 5 redfin
Google Pixel sailfish
Google Pixel 3a sargo
Google Pixel 4a sunfish
Google Pixel 2 XL taimen
Google Pixel 2 walleye
Google Project Tango Tablet Development Kit yellowstone
Gtel Infinity 7 Plus Infinity7Plus
Gtel Infinity 7 Pro Infinity7Pro
HOMTOM HT80 HT80
HP Pro Slate 10 EE G1 bulldog
HP Pro Slate 12 dane
HP Slate 8 Pro dogwood
HP Pro Slate 8 malamute
HP Pro Slate 10 EE G1 poodle
HTC HTC6435LVW dlx
HTC Butterfly S dlxpul
HTC Nexus 9 flounder
HTC Nexus 9 LTE flounder_lte
HTC Desire 530 htc_a16ul
HTC Desire 650 htc_a17uhl
HTC Desire 620 htc_a31ul
HTC Desire 626 htc_a32dcgl
HTC Desire 626 htc_a32ewl
HTC Desire 626 htc_a32ewlpp
HTC Desire 626 htc_a32ul
HTC Desire 626 htc_a32ul_emea
HTC Desire 612 htc_a3qhdcl
HTC Desire 610 htc_a3qhdul
HTC  HTC Desire 610 htc_a3ul
HTC 0PFJ50 htc_a51tuhl
HTC Desire 820 htc_a51ul
HTC Desire 826 dual sim htc_a52dwgl
HTC Desire 826 htc_a52tuhl
HTC E9pw htc_a55ml_dtul
HTC Desire 10 pro htc_a56dj_pro_dugl
HTC Desire 10 lifestyle htc_a56djuhl
HTC Desire 10 lifestyle htc_a56djul
HTC Desire 825 dual sim htc_a56dugl
HTC Desire 825 htc_a56uhl
HTC 710C htc_a5chl
HTC D816e htc_a5dugl
HTC D816v htc_a5dwgl
HTC Desire 816 htc_a5ul
HTC 10 evo htc_acauhl
HTC U Play htc_alpine_dugl
HTC U Play htc_alpine_uhl
HTC Butterfly 2 htc_b2ul
HTC HTL23 htc_b2wlj
HTC Butterfly 3 htc_b3tuhl
HTC HTV31 htc_b3uhl
HTC Desire 12s htc_bre2dugl
HTC Desire 12s htc_bre2exdugl
HTC HTC Desire19+ htc_bre2pdugl
HTC HTC Desire 20 Pro htc_bymdugl
HTC One A9s htc_e36_ml_uhl
HTC One A9s htc_e36_ml_ul
HTC HTC One X9 dual sim htc_e56ml_dtul
HTC One X9 htc_e56ml_tuhl
HTC One X10 htc_e66_dtwl
HTC One X10 htc_e66_dugl
HTC One X10 htc_e66_uhl
HTC EXODUS 1 htc_exodugl
HTC EXODUS 1 htc_exouhl
HTC Desire EYE htc_eyetuhl
HTC Desire EYE htc_eyeul
HTC Desire EYE htc_eyeul_att
HTC U20 5G htc_flhdugl
HTC HTC U11 EYEs htc_haydtwl
HTC HTC U11 EYEs htc_haydugl
HTC One A9 htc_hiaeuhl
HTC One A9 htc_hiaeul
HTC One A9 htc_hiaewhl
HTC M9pw htc_hiau_ml_tuhl
HTC One M9+ (Prime Camera Edition) htc_hiaur2_ml_tuhl
HTC M9px htc_hiaur_ml_tuhl
HTC One ME dual sim htc_hima_ace_ml_dtul
HTC One S9 htc_himar2uhl
HTC M9e htc_himaruhl
HTC One M9 htc_himauhl
HTC One M9 htc_himaul
HTC One M9 htc_himaulatt
HTC One M9 htc_himawhl
HTC One M9 htc_himawl
HTC U12 + htc_imedtwl
HTC U12+ htc_imedugl
HTC U12+ htc_imeuhl
HTC U12+ htc_imeuhljp
HTC U12 Life htc_imldugl
HTC One (M8) htc_m8
HTC One (M8) (4G LTE 双卡双待 联通版) htc_m8dug
HTC One (M8) htc_m8dwg
HTC ONE M8s htc_m8qlul
HTC M8t htc_m8tl
HTC One (M8) htc_m8whl
HTC One (M8) htc_m8wl
HTC One (E8) dual sim htc_mecdug
HTC One (E8) htc_mecdwg
HTC One (E8) htc_mectl
HTC One (E8) htc_mecul
HTC One_E8 htc_mecul_emea
HTC One (E8) htc_mecwhl
HTC One mini 2 htc_memul
HTC One remix htc_memwl
HTC U Ultra htc_ocedtwl
HTC U Ultra htc_ocedugl
HTC U Ultra htc_oceuhl
HTC HTC U11 life htc_ocla1_sprout
HTC U11 Life htc_ocluhljapan
HTC HTC U11 life htc_oclul
HTC HTC U11+ htc_ocmdtwl
HTC HTC U11+ htc_ocmdugl
HTC U11 htc_ocndtwl
HTC U11 htc_ocndugl
HTC U11 htc_ocnuhl
HTC U11 htc_ocnuhljapan
HTC U11 htc_ocnwhl
HTC 10 htc_pmec2tuhl
HTC M10 htc_pmeuhl
HTC 10 htc_pmeuhljapan
HTC 10 htc_pmewhl
HTC 10 htc_pmewl
HTC HTC Desire 20+ htc_srcdugl
HTC HTC U19e htc_tetdugl
HTC HTC Desire 21 pro 5G htc_thudugl
HTC HTC Desire 19s htc_zddugl
HTC One Google Play edition m7
HTC One m7cdtu
HTC 9060 m7cdug
HTC One Dual Sim m7cdwg
HTC J One m7wlj
HTC One m7wls
HTC One m7wlv
HTC One max t6ul
HTC One max t6whl
HTC HTCOneMaxVZW t6wl
HTC Desire 601 zara
HTC Desire 601 zaracl
Hafury G20 G20
Hafury GT20 GT20
Hafury K30 K30
Hafury K30 PRO K30_PRO
Haier I6_Infinity I6_Infinity
Haier Power P10 P10
Haier Titan_T3 Titan_T3
Haier Haier Titan T5 Titan_T5
Handheld Group ALGIZ RT8 ALGIZ_RT8
Handheld Group Nautiz_X2 NAUTIZ_X2
Handheld Group NAUTIZ_X6 NAUTIZ_X6
Handheld Group NAUTIZ X6 NAUTIZ_X6P
Handheld Group Nautiz X41 albatross_EEA
Handheld Group Nautiz X41 albatross_GL
Handheld Group Algiz RT7 algizRT7
Handheld Group Nautiz X2 alta_EEA
Handheld Group Nautiz X2 alta_GL
Handheld-Wireless X6 X6
Hatch 101S 101S
Hero HERO 4ALL HERO_4ALL
HighScreen Max3 Max3
HighScreen PowerFiveMax2 PowerFiveMax2
HighScreen PowerFiveMaxLite PowerFiveMaxLite
Hiking A23 A23
Hisense E621T E621T
Hisense A5 Pro HLTE203T
Hisense F22 HS6737MT
Hisense Hisense M36 HS8909QC
Hisense L678 HS8916QC
Hisense Hisense E77 HS8937QC
Hisense A2M HS8953QC
Hisense AGM  X2 HS8976QC
Hisense AGM X3 HSSDM845QC
Hisense STARTRAIL 6 4G L681
Hisense CMB510 L696
Hisense l691 msm8226
Honeywell D75E 75E-L0N
Honeywell CK65 CK65-L0-C
Honeywell CK65 CK65-L0-N
Honeywell CN80 CN80-L0-C
Honeywell CN80 CN80-L0-N
Honeywell CN80 CN80-L1-C
Honeywell CN80 CN80-L1-N
Honeywell CN85 CN85-L1-C
Honeywell CT40 CT40-L0-C
Honeywell CT40 CT40-L0-CA
Honeywell CT40 CT40-L1-C
Honeywell CT40P-L0-D CT40P-L0-D
Honeywell CT40P CT40P-L1-D
Honeywell CT50 CT50L0N-CS15S
Honeywell CT50 CT50L0N-CS16S
Honeywell CT50 CT50LFN-CS16S
Honeywell CT50 CT50LUN-CS15S
Honeywell CT50 CT50LUN-CS16S
Honeywell CT60-L0-C CT60-L0-C
Honeywell CT60 CT60-L0N-ASC
Honeywell CT60-L1N-C CT60-L1-C
Honeywell EDA40 EDA40-0
Honeywell EDA40 EDA40-1
Honeywell EDA51 EDA51-0
Honeywell EDA51 EDA51-1
Honeywell EDA51K EDA51K-0
Honeywell EDA51K EDA51K-1
Honeywell EDA71 EDA71-0
Honeywell EDA71 EDA71-1
Honeywell TA60A TA60A-L0-C
Honeywell TA60A TA60A-L1-C
Honeywell VM1A VM1A-L0-N
Honeywell VM1A VM1A-L0-P
Honeywell VM3A VM3A-L0-N
Honeywell VM3A VM3A-L0-P
Honeywell EDA50 eda50-011
Honeywell EDA50 eda50-111
Honeywell EdA50 eda50-211
Honeywell EDA50K eda50k-0
Honeywell EDA50K eda50k-1
Honeywell EDA70 eda70-0
Honeywell EDA70 eda70-3
Huawei Che1-L04 Che1
Huawei 荣耀畅玩5C HNNEM-H
Huawei P20 Pro HW-01K
Huawei P30 Pro HW-02L
Huawei Mate 10 HWALP
Huawei HUAWEI Y5 2019 HWAMN-M
Huawei HUAWEI P20 Lite HWANE
Huawei HUAWEI Y6 Prime 2018 HWATU-QG
Huawei Honor 7A HWAUM-Q
Huawei nova 2 Plus HWBAC
Huawei Honor V10 HWBKL
Huawei Mate 10 Pro HWBLA
Huawei 荣耀畅玩 6X HWBLN-H
Huawei Y6II HWCAM-H
Huawei 荣耀畅玩5A HWCAM-Q
Huawei nova HWCAN
Huawei P20 Pro HWCLT
Huawei Honor 10 HWCOL
Huawei Honor Play HWCOR
Huawei Mate S HWCRR
Huawei Honor V9 HWDUK
Huawei HUAWEI P30 HWELE
Huawei P20 HWEML
Huawei P9 HWEVA
Huawei Huawei Mate 20 X HWEVR
Huawei 华为畅享7S HWFIG-H
Huawei Honor 8 HWFRD
Huawei P8 HWGRA
Huawei Mate 20 HWHMA
Huawei honor 10 Lite HWHRY-H
Huawei HONOR 10i HWHRY-HF
Huawei nova 2s HWHWI
Huawei Honor 8A HWJAT-M
Huawei HUAWEI Y9 2019 HWJKM-H
Huawei 荣耀 8X HWJSN-H
Huawei Honor V8 HWKNT
Huawei 华为畅享8 HWLDN-Q
Huawei 荣耀9青春版 HWLLD-H
Huawei Mate 9 Pro HWLON
Huawei Mate 20 RS HWLYA
Huawei HUAWEI P30 lite HWMAR
Huawei Mate 9 HWMHA
Huawei nova plus HWMLA
Huawei HUAWEI Y6 Pro 2019 HWMRD-M1
Huawei Y6 2017 HWMYA-L6737
Huawei PORSCHE DESIGN HUAWEI Mate RS HWNEO
Huawei GT3 HWNMO-H
Huawei Honor Magic HWNTS
Huawei Mate 8 HWNXT
Huawei nova 3 HWPAR
Huawei HONOR V20 HWPCT
Huawei HUAWEI P smart+ 2019 HWPOT-H
Huawei nova lite HWPRA-H
Huawei G7 Plus HWRIO
Huawei Mate 10 lite HWRNE
Huawei Honor Note10 HWRVL
Huawei SC-CL00 HWSC-CL00
Huawei HUAWEI Mate 20 lite HWSNE
Huawei Honor 9 HWSTF
Huawei Y9 Prime 2019 HWSTK-HF
Huawei Honor Magic 2 HWTNY
Huawei P9 Plus HWVIE
Huawei P10 Plus HWVKY
Huawei Honor 8 Smart HWVNS-H
Huawei P30 Pro HWVOG
Huawei P10 HWVTR
Huawei P10 lite HWWAS-H
Huawei HUAWEI nova 5T HWYAL
Huawei Nexus 6P angler
Huawei P8 青春版 hwALE-H
Huawei P8 Lite hwALE-Q
Huawei C199 hwC199
Huawei C199s hwC199s
Huawei C8817D hwC8817D
Huawei C8817E hwC8817E
Huawei C8818 hwC8818
Huawei CHM-CL00 hwCHM-Q
Huawei G6-L11 hwG6-L11
Huawei G620S-L01 hwG620S-L01
Huawei G7-L01 hwG7-L01
Huawei G7-L11 hwG7-L11
Huawei H60-L04 hwH60
Huawei P7 mini hwP7Mini
Huawei PE-CL00 hwPE
Huawei GX8 hwRIO-L01
Huawei Y635-L02 hwY635
Huawei Mate2 hwmt2-c00
Huawei MT2-L01 hwmt2-l01
Huawei MT2-L02 hwmt2-l02
Huawei MT2-L05 hwmt2-l05
Huawei Mate 7 hwmt7
Huawei P7 hwp7
Hytera PDC550 PDC550
Hytera PDM680 PDM680
Hytera PNC550_P_TU PNC550
Hyundai HY1-5085 HY1_5085
Hyve Buzz BU01 buzz_bu01
IDEMIA ID Screen ID_Screen
INOI INOI_7_4_64_2021 INOI_7_4_64_2021
ITOS IC-51 IC_51
ITOS IC_55 IC_55
ITOS IC_61 IC_61
ITOS IT_51 IT_51
IWRIST IWRIST_M8 IWRIST_M8
Inco Rouge1 Rouge1
Infinix Infinix HOT 10S NFC Infinix-X689D
Infinix NOTE 10 Pro Infinix-X695C
Infocus M330 D77
Infocus Big Tab IF195a
Infocus Big Tab IF236a
Infocus M320 M320
Infocus M518 MC2_APT
Infocus M512 MC2_CN
Infocus M510t TID
Infocus M511 TID_CHT
Infocus M511 TID_TWN
Infocus IN815 VK3
Infocus IN810 VKY
Infocus M812A VN2
Infocus M810 VNA
Infocus VZH VZH
Isafe IS330 IS330
Isafe IS520 IS520
Isafe IS520.1 IS520_1
Isafe IS530 IS530
Isafe IS655 IS655
Isafe IS910.1 IS910_1
Isafe IS930 IS930
Janam HT1 HT1
Janam XG4 XG4
Janam XT75 XM75
Janam XT100 XT100
Janam XT2 XT2
Janam XT200 XT200
Janam XT3 XT3
Janam XT30 XT30
Jesy J9S J9S
Jinga Pass3G JI50AG1_189HP
Jinga Jinga Pass4G JI50AG2_189HP
Jinga Pass Plus JI55AG_189ID
Jinga JoyPRO JI55B_189BW
Jinga Pass Pass
Jinga Picasso Note PicassoNote
Juniper Systems Cedar CT8 CT8
Juniper Systems Mesa3 MS3A
KIRISUN KIRISUN T650 T650
Kaicom H702 H702
Kaicom K901 K901
Kapsys SmartVision2 r889
Kenwood KWSA80K XP8800
Kodak Ektra KodakEktra
Kogan Kogan Agora XI AGORA_XI
Kogan Kogan Agora 8 Plus Agora_8_Plus
Kogan Agora 6 Plus Kogan_Agora_6Plus
Kogan Kogan Agora XS Kogan_Agora_XS
Kruger&Matz DRIVE9 DRIVE9
Kruger&Matz DRIVE_6 DRIVE_6
Kruger&Matz DRIVE_6SS DRIVE_6S
Kruger&Matz DRIVE 8 DRIVE_8
Kruger&Matz Live 8 EEA Live_8
Kyocera Hydro VIBE C6725
Kyocera Hydro ICON C6730
Kyocera DuraForce E6560
Kyocera DuraForce E6560C
Kyocera DuraForce E6560L
Kyocera DuraForce E6560T
Kyocera TorqueXT E6715
Kyocera DuraForce E6762
Kyocera Brigadier E6782
Kyocera DuraScout E6782L
Kyocera DuraForce XD E6790
Kyocera DuraForce PRO with Sapphire Shield E6810
Kyocera DuraForce PRO with Sapphire Shield E6810_3GB
Kyocera DuraForce PRO E6820
Kyocera DuraForce PRO E6820TM_3GB
Kyocera DuraForce PRO E6820_3GB
Kyocera DuraForce PRO E6830
Kyocera DuraForce PRO E6833
Kyocera DuraForce PRO 2 with Sapphire shield E6910
Kyocera DuraForce Pro 2 E6920
Kyocera DuraForce Ultra 5G E7110
Kyocera TORQUE KC-100S
Kyocera TORQUE(KC-S701) KC-S701
Kyocera DURA FORCE PRO KC-S702
Kyocera TORQUE(R) 5G KYG01
Kyocera URBANO V01 KYV31
Kyocera INFOBAR A03 KYV33
Kyocera URBANO V02 KYV34
Kyocera TORQUE G02 KYV35
Kyocera DIGNO rafre KYV36
Kyocera Qua phone (KYV37) KYV37
Kyocera TORQUE G03 KYV41
Kyocera BASIO 3 KYV43
Kyocera URBANO V04 KYV45
Kyocera TORQUE G04 KYV46
Kyocera URBANO L03 KYY23
Kyocera TORQUE G01 KYY24
Kyocera S6 S6-KC_sprout
Kyocera S8 S8-KC_sprout
Kyocera X3 X3-KC_sprout
LAMINA LTT8A4G_EEA LTT8A4G_EEA
LEOMO LEM-TS1  LMS
LGE DM-01G DM-01G
LGE DM-01K DM-01K
LGE DM-02H DM-02H
LGE Qua phone PX JSG
LGE V20 PRO L-01J
LGE V30+ L-01K
LGE LG style2 L-01L
LGE JOJO L-02K
LGE L-03K L-03K
LGE LG style3 L-41A
LGE LG V60 ThinQ 5G L-51A
LGE LG VELVET L-52A
LGE Q92 acelm
LGE K92 acexlm
LGE AKA aka
LGE LG G5 SE alicee
LGE LG G8 ThinQâ„¢ alphaamz
LGE LG G8 ThinQâ„¢ alphalm
LGE LG G8 ThinQâ„¢ alphaplus
LGE Q8 anna
LGE G Pro2 b1
LGE G Pro2 b1w
LGE LG G Vista b2l
LGE G3 Stylus b2ldsn
LGE Gx2 b2ln
LGE G3 Stylus b2lssn
LGE LG U bbg
LGE G8S ThinQ betalm
LGE Nexus 5X bullhead
LGE LG Class c100n
LGE LG Leon 4G LTE c50n
LGE LG Spirit 4G LTE c70n
LGE LG Volt LTE c70w
LGE LG G4c c90n
LGE VELVET caymanlm
LGE VELVET caymanslm
LGE LG Premier Pro cv3
LGE X4+ cv3n
LGE LG Q7+ cv5a
LGE LG Q7+ cv5an
LGE Q8 cv7an
LGE LG Stylo 5 cv7as
LGE LG Stylo 5+ cv7as-pr
LGE K22 dh0lm
LGE Spray e2jps
LGE F60 e2n
LGE G Pad 10.1 e9wifin
LGE V20 elsa
LGE Optimus F6 f6
LGE LG F70 f70n
LGE LG Q9 falcon
LGE V50 ThinQ flashlm
LGE V50 ThinQ flashlmdd
LGE Signature flashsignaturelm
LGE LG Optimus LTE3 fx1sk
LGE LG G2 g2
LGE G2 MINI g2m
LGE G2 mini 4G LTE g2mv
LGE LG G3 g3
LGE LG G Stylo g4stylusdsn
LGE LG G Stylo g4stylusn
LGE G Stylo g4stylusw
LGE LG Optimus G Pro geefhd
LGE LG Optimus G Pro geefhd4g
LGE LG Optimus G geehrc
LGE LG Optimus G geehrc4g
LGE Optimus GK gvfhd
LGE LG G5 h1
LGE Nexus 5 hammerhead
LGE G3 Beat jagdsnm
LGE G3 Beat jagn
LGE G3 Vigor jagnm
LGE V30 joan
LGE LG G7 ThinQ judyln
LGE LG V35 ThinQ judyp
LGE V40 ThinQ judypn
LGE LG X screen k5
LGE LG X screen k5n
LGE LG X Style k6b
LGE LG X cam k7
LGE LG X cam k7n
LGE L5000 l5000
LGE L Fino l70pn
LGE LG Optimus L9 II l9ii
LGE G3 Screen liger
LGE LG G6 lucye
LGE L50 Sporty luv50ssn
LGE G Pro Lite luv90nfc
LGE LG X300 lv3n
LGE LG K20 lv517n
LGE LG X Venture lv9n
LGE LG Phoenix 2 m1v
LGE LG K10 m209n
LGE LG K10 m216n
LGE LG K10 LTE m253n
LGE Nexus 4 mako
LGE VELVET mcaymanlm
LGE LG Q7 mcv5a
LGE QStylus mcv7a
LGE LG-K41S mdh15lm
LGE LG Reflect mdh30lm
LGE K51S mdh35lm
LGE Q61 mdh40lm
LGE Stylo 6 mdh50lm
LGE LG K31 mdh5lm
LGE LM-K420 meh15lm
LGE Q52 meh35lm
LGE V50S ThinQ mh2lm
LGE LG Q70 mh3
LGE LG Q70 mh3-pl
LGE LG K40 mh4x
LGE MY LG Mobile mh5lm
LGE LG K30 mh5lm-8m
LGE LG Q6 mhn
LGE LG X max mk6m
LGE LG X power  mk6p
LGE LG X power mk6pn
LGE LG X400 mlv5n
LGE LG X5 mlv7n
LGE LG K8 LTE mm1vn
LGE LG K3 LTE mme0n
LGE LM-X420 mmh4
LGE K50S mmh45lm
LGE LG Q60 mmh4p
LGE LM-X520 mmh4p-pr
LGE LG K40 mmh4x
LGE LG K40S mmh55lm
LGE LG Stylus3 msf3n
LGE LG Gx omega
LGE LG Gx omegar
LGE LG G4 p1
LGE LG G4 Beat p1bdsn
LGE LG G4 Beat p1bssn
LGE LG G Vista 2 p1v
LGE LG Stylo 2 ph1
LGE LG Stylus2 ph1n
LGE LG Stylo 2 Plus ph2n
LGE LG G7 One phoenix_sprout
LGE V10 pplus
LGE LG Stylo 3 Plus sf340n
LGE X Mach sjr
LGE LG G Pad II 10.1 FHD t1wifin
LGE LG G3 Cat.6 tiger6
LGE LG G3 A tigers
LGE LG V60 ThinQ timelm
LGE LG Optimus L7 II vee7e
LGE Optimus Vu2 vu2kt
LGE Optimus Vu2 vu2sk
LGE Optimus Vu2 vu2u
LGE VU3 vu3
LGE L65 w55n
LGE L70 w5n
LGE L90 Dual w7dsn
LGE L90 w7n
LGE LG WING winglm
LGE G Vista x10
LGE LG Volt x5
LGE LG F570S yg
LGE LG G Flex2 z2
LGE LG G Flex zee
LUMUS NEOSC600 NEOSC600
Land Rover Explore LRExplore
Land Rover Land Rover Explore R LRExploreR
LeTV Le Max max1_in
Leagoo XRover XRover
Leagoo XRover C XRover_C
Leeco Le Pro3 le_zl1
Lenovo A380t A380t
Lenovo A5500 A5500
Lenovo VIBE X3 Lite A7010a48
Lenovo K80M K80M
Lenovo P1 P1a42
Lenovo P2 P2a42
Lenovo Lenovo TAB3 10 Plus TB3-X70F
Lenovo TB3-X70I TB3-X70I
Lenovo Lenovo TAB3 10 Plus TB3-X70L
Lenovo X3c50 X3c50
Lenovo X3c70 X3c70
Lenovo A805e airplayep
Lenovo Lenovo Z5 Pro heart
Lenovo VIBE X3 Lite k5fp
Lenovo VIBE X3 Lite k5fp_m
Lenovo K920/VIBE Z2 kingdom_row
Lenovo K920/VIBE Z2 Pro kingdomt
Lenovo P2 kuntao
Lenovo 拯救者电竞手机 moba
Lenovo P1 passion
Lenovo S860e shelle
Lenovo X3a40 x3_row
Lenovo Z2 z2r
Lenovo Z2 z2t
Lenovo Z2w z2w
Lenovo Lenovo-9 zap
Logic Instrument Logic Instrument Fieldbook 57 lifb57
Logic Instrument Fieldbook F1 lifbf1
Logic Instrument Fieldbook F53 lifbf53
Logic Instrument Fieldbook K80 lifbk80
Logic Instrument Logic Instrument Fieldbook KS80 lifbks80
Logic Instrument Logic Instrument Fieldbook N101 lifbn101
Logic Instrument Logic Instrument Fieldbook N80 lifbn80
Logitec LZ-AA10 LZ-AA10
Lumigon T3 Lumigon_T3
Lumigon T2 HD T2HD
Lyf LS-4511 LS-4511
Lyf LS-5027 LS-5027
M3 Mobile M3-SL10 M3-SL10
M3 Mobile M3SL10 M3SL10
M3 Mobile M3SM15N_EEA M3SM15N
M3 Mobile M3SM15X_EEA M3SM15X
M3 Mobile M3UL20F_EEA M3UL20F
M3 Mobile M3UL20W_EEA M3UL20W
M3 Mobile M3UL20X_EEA M3UL20X
M3 Mobile M3 US20W M3US20W
M3 Mobile M3 US20X M3US20X
MDC Store Prime_S Prime_S
MLS Innovation IQS805 iQS805
MTR (MY) MT9 MT9
Malata UV350 UV350
Mantra MFSTABII MFSTABII
Mantra MFSTABIV MFSTABIV
Mantra MOXA71 MOXA71
Mara Phones Mara Phones R MaraPhones_R
Mara Phones Mara X1 Mara_X1
Mara Phones Mara X1 d Mara_X1_d
Mara Phones Mara  Z1 Mara_Z1
Mara Phones Mara Z1 MT Mara_Z1_MT
Mara Phones Mara Z1 d Mara_Z1_d
Maxcom MS507_STRONG MS507_STRONG
Maxcom MS515 MS515
Maxcom MS571 MS571_plus
Maxis NeXT M2 VFD610
Maxis NeXT X1 VFD710
Mecer MK7000Pro MK7000PRO
Medion S5504 B5531
Meitu V4 V4
Meitu V4s V4s
Meitu Meitu V6 Vivian
Meitu MI CC 9 Meitu Edition vela
Meizu 16s 16s
Meizu 16s pro meizu16sPro
Meizu meizu 17 meizu17
Meizu meizu 17 Pro meizu17Pro
Meizu MEIZU 18 meizu18
Meizu meizu 18 Pro meizu18Pro
MiTAC N651 centaur
MiTAC N635 chiron_pro
MiTAC N672 hera_pro
MiTAC N630 surfing_pro
Mintt ULTRAMINTT Y3 ULTRAMINTT_Y3
Mintt ULTRAMINTT Y5 ULTRAMINTT_Y5
MobiIoT Hotah HotahOTG_N
MobiIoT Hotah HotahOTG_V
MobiIoT Mobigo2 MobiGo2
Mobiwire Hawk from EE Hawk_from_EE
Mobiwire Hotah Hotah
Mode1 MD-04P MD-04P
Motorola Moto Z Play Droid addison
Motorola Moto Z (2) Play albus
Motorola moto g(6) ali_n
Motorola moto g(6) play aljeter_n
Motorola Motorola Defy bathena
Motorola moto z3 play beckham
Motorola motorola edge plus burton
Motorola moto g(10) capri
Motorola moto g(30) caprip
Motorola moto g(9) power cebu
Motorola Moto X Style clark
Motorola Moto X Style clark_ds
Motorola Motorola one deen_sprout
Motorola motorola one hyper def
Motorola moto g(8) plus doha_n
Motorola moto g(6) plus evert_n
Motorola moto g(6) plus evert_nt
Motorola moto z4 foles
Motorola Moto X (1st Gen) ghost
Motorola Moto Z Droid griffin
Motorola moto g(9) play guamp
Motorola moto g40 fusion hanoip
Motorola Moto G (4) Play harpia_n
Motorola RAZR D3 hawk40_umts
Motorola moto g50 ibiza
Motorola motorola p50 kane
Motorola motorola one vision kane_sprout
Motorola moto g 5G kiev
Motorola DROID Turbo 2 kinzie
Motorola Moto X Force kinzie_uds
Motorola Moto X Play lux
Motorola Moto X Play lux_uds
Motorola Moto Z(3) messi
Motorola Moto G (5S) montana_n
Motorola motorola one 5G UW nairo
Motorola Moto Z (2) Force nash
Motorola Moto E (4) Plus nicklaus_fn
Motorola motorola edge s nio
Motorola moto e5 nora_8917_n
Motorola Droid Ultra obake
Motorola Droid MAXX obake-maxx
Motorola Droid Mini obakem
Motorola moto g(7) power ocean_n
Motorola moto g(9) plus odessa
Motorola motorola razr olson
Motorola motorola one zoom parker
Motorola Moto X (4) payton
Motorola Moto X (4) payton_sprout
Motorola Moto G (5) Plus potter_n
Motorola Moto G Plus (5th Gen) potter_nt
Motorola Droid Turbo quark
Motorola Moto MAXX quark_umts
Motorola motorola edge racer
Motorola moto g(7) river_n
Motorola Moto G (5S) Plus sanders_n
Motorola Moto G (5S) Plus sanders_nt
Motorola DROID RAZR M scorpion_mini
Motorola Nexus 6 shamu
Motorola Moto X Pro (China) shamu_t
Motorola DROID RAZR i smi
Motorola motorola razr 5G smith
Motorola RAZR M smq
Motorola XT905 smq_u
Motorola moto g pro sofiap_sprout
Motorola Electrify M solstice
Motorola motorola one action troika
Motorola motorola one action troika_sprout
Motorola RAZR HD vanquish
Motorola DROID RAZR HD vanquish_u
Motorola Moto X (2nd Gen) victara
Motorola Moto E (4) woods_fn
Motorola Solutions LEX F10 LEXF10
Motorola Solutions LEX L11 lexl11g_64
MyPhone (PL) Hammer AXE PRO Hammer_AXE_Pro_OPM
MyPhone (PL) Hammer Blade 2 Pro Hammer_Blade2_PRO
MyPhone (PL) Hammer_Explorer Hammer_Explorer
MyPhone (PL) Hammer IRON 3 LTE Hammer_IRON_3_LTE
MyPhone (PL) Hammer_IRON_3_LTE Hammer_IRON_3_LTEv2
MyPhone (PL) myPhone Prime 3 myPhone_Prime_3
Myphone Hammer AXE M LTE AXE_M_LTE_OPM
Myphone Hammer Active 2 LTE Hammer_Active2_LTE
Myphone Hammer Energy 18×9 Hammer_Energy_18x9
Myphone Hammer Energy 2 Hammer_Energy_2
Myphone Hammer Explorer Pro Hammer_Expl_Pro
Myphone myPhone Now eSIM myPhone_Now_eSIM
NOA Mobile Hummer Hummer
NOA Mobile Hummer_2019_R Hummer_2019_R
Nabi DreamTab HD8 Tablet DMTAB
Nabi Big Tab HDâ„¢ 20″ DMTAB-NV20A
Nabi Big Tab HDâ„¢ 24″ DMTAB-NV24A
Nabi 2S Tablet nabi2S
Nabi DreamTab HD8 Tablet t8400n
Newland NLS-MT6550-AM NLS-MT6550-AM
Newland NLS-MT6552-EEA NLS-MT6552-EEA
Newland NLS-MT6552-GL NLS-MT6552-GL
Newland NLS-MT6552-RU NLS-MT6552-RU
Newland Newland NLS-MT90 NLS-MT90-GL
Newland Newland NLS-N7 NLS-N7-GL
Newland NLS-NFT10 NLS-NFT10-GL
Newland NLS-NFT10 NLS-NFT10-RU
Nextbit Robin ether
Nextgear Nextgear n1 Nextgear_n1
Noblex N601 N601
Nokia Nokia 8 Sirocco A1N
Nokia Nokia 8 Sirocco A1N_sprout
Nokia Nokia 9 AOP
Nokia Nokia 9 AOP_sprout
Nokia Nokia 7 plus B2N
Nokia Nokia 7 plus B2N_sprout
Nokia Nokia 8.3 5G BGT
Nokia Nokia 8.3 5G BGT_sprout
Nokia Nokia 7 C1N
Nokia Nokia 5.3 CAP
Nokia Nokia 5.3 CAP_sprout
Nokia Nokia 5.1 CO2N_sprout
Nokia Nokia 7.1 CTL_sprout
Nokia Nokia 7.2 DDV_sprout
Nokia Nokia 5.4 DRD
Nokia Nokia 5.4 DRD_sprout
Nokia Nokia 3.4 DRS
Nokia Nokia 3.4 DRS_sprout
Nokia Nokia 3.1 ES2N_sprout
Nokia Nokia 8 NB1
Nokia Nokia 5 ND1
Nokia Nokia 3 NE1
Nokia Nokia 4.2 PAN_sprout
Nokia Nokia 6 PL2
Nokia Nokia 6.1 PL2_sprout
Nokia Nokia 6 PLE
Nokia Nokia 8.1 PNXN
Nokia Nokia 8.1 PNX_sprout
Nokia Nokia 4.2 Panther_00EEE
Nokia Nokia X20 QKS
Nokia Nokia X20 QKS_sprout
Nokia Nokia 8 V 5G UW RAV_VZW
Nokia Nokia 3.1 Plus RHD
Nokia Nokia G20 RNN
Nokia Nokia G20 RNN_sprout
Nokia Nokia 3.1 Plus ROON_sprout
Nokia Nokia X10 SCW
Nokia Nokia X10 SCW_sprout
Nokia Nokia 6.2 SLD_sprout
Nomu M8 M8
Nomu S50 Pro S50_Pro
Nomu V31 V31
Nomu V31E V31E
Novinsun N11 N11
NuAns NEO [Reloaded] NEO2
Nuu A5L+ N5501LE
Nuu NUU G3 N5702L
Nuu G4 N6201L
OASYS TEG9300-5 TEG9300-5
OnePlus One A0001
OnePlus OnePlus Nord Nord
OnePlus OnePlus 7 Pro OP7ProNRSpr
OnePlus OnePlus3 OnePlus3
OnePlus OnePlus3T OnePlus3T
OnePlus OnePlus5 OnePlus5
OnePlus OnePlus5T OnePlus5T
OnePlus OnePlus 6 OnePlus6
OnePlus OnePlus6T OnePlus6T
OnePlus OnePlus6T OnePlus6TSingle
OnePlus OnePlus 7 OnePlus7
OnePlus OnePlus 7 Pro OnePlus7Pro
OnePlus OnePlus 7 Pro 5G OnePlus7ProNR
OnePlus OnePlus 7 Pro OnePlus7ProTMO
OnePlus OnePlus 7T OnePlus7T
OnePlus OnePlus 7T Pro OnePlus7TPro
OnePlus OnePlus 7T Pro 5G OnePlus7TProNR
OnePlus OnePlus 7T OnePlus7TTMO
OnePlus OnePlus 8 OnePlus8
OnePlus OnePlus 8 Pro OnePlus8Pro
OnePlus OnePlus 8T OnePlus8T
OnePlus OnePlus 8 5G  OnePlus8TMO
OnePlus OnePlus 8T+ 5G OnePlus8TTMO
OnePlus OnePlus 8 5G UW OnePlus8VZW
OnePlus OnePlus 8 OnePlus8Visible
OnePlus OnePlus 9 5G OnePlus9
OnePlus OnePlus 9 Pro OnePlus9Pro
OnePlus OnePlus 9 Pro 5G OnePlus9ProTMO
OnePlus OnePlus 9 5G OnePlus9TMO
OnePlus OnePlus Nord N10 5G OnePlusN10
OnePlus OnePlus Nord N10 5G OnePlusN10METRO
OnePlus OnePlus Nord N10 5G OnePlusN10TMO
Oppo 3000 3000
Oppo 3007 3007
Oppo A37t A37
Oppo R15 Pro CPH1831
Oppo R15 Pro CPH1833
Oppo R15 Pro CPH1833L1
Oppo R17 Pro CPH1877
Oppo X9077 FIND7
Oppo N1 N1
Oppo N3 N3
Oppo Reno Z 中国版 OP4699
Oppo Reno 标准版 OP46B1
Oppo Reno 10倍变焦版 OP46C3
Oppo Reno A OP47CFL1
Oppo Reno OP47DD
Oppo Reno OP47DDL1
Oppo Reno 10x Zoom OP4845
Oppo Reno 10x Zoom OP4845L1
Oppo Reno 10x room OP4847
Oppo Reno 10x Room OP4847L1
Oppo Reno Z OP48A1
Oppo Reno Z OP48A1L1
Oppo Reno2 Z 中国版 OP4A43
Oppo Reno4 中国版 OP4A47
Oppo A11x 中国版 OP4A54
Oppo Reno 2 中国版 OP4A57
Oppo Find X2 中国版 OP4A77
Oppo Find X2 Pro 中国版 OP4A7A
Oppo Reno Ace OP4A89
Oppo Reno3 Pro 5G中国版 OP4A9D
Oppo K5 OP4AA7
Oppo Reno3 元气版 5G OP4AB5
Oppo Reno Ace2 OP4AD9
Oppo Reno3 5G 中国版 OP4ADD
Oppo Reno4 Pro 中国版 OP4AF7
Oppo Reno2 Z OP4B65L1
Oppo A5 2020 OP4B79L1
Oppo A9 2020 OP4B80L1
Oppo Reno 2 OP4B83L1
Oppo Reno3 OP4B9EL1
Oppo Find X2 OP4BA1L1
Oppo Find X2 Pro OP4BA2L1
Oppo Reno3 A OP4BAFL1
Oppo Reno 4Z 5G OP4BDCL1
Oppo Find X2 Neo/Reno3 Pro  OP4C2DL1
Oppo Find X2 Lite OP4C41L1
Oppo Reno4 5G OP4C45L1
Oppo A93 OP4C51L1
Oppo A72 OP4C72L1
Oppo A52 OP4C7BL1
Oppo Reno4 Pro 5G OP4C87L1
Oppo Find X3 Pro 中国版 OP4E3F
Oppo Find X3 中国版 OP4E5D
Oppo Reno5 Pro 5G OP4EA3
Oppo OPPO Reno5 Pro+ 5G OP4EA7
Oppo A53 OP4EFDL1
Oppo Reno5 pro 5G OP4F0BL1
Oppo A74 OP4F11L1
Oppo OPPO Reno5 5G OP4F1BL1
Oppo Reno5 OP4F25L1
Oppo A94 OP4F43L1
Oppo Find X3 Pro OP4F57L1
Oppo R17 Pro PBDM00
Oppo R17 Pro PBDT00
Oppo A7n PCDT00
Oppo realme X50 5G RMX2051CN
Oppo X9000 X9000
Oppo X9006 X9006
Oppo X9007 X9007
Oppo X9070 X9070
Oppo X9076 X9076
Oppo X9077 X9077
Opticon H-31 h31
Opticon H-33 h33
Orange Rise52 BUZZ6T4G
Orange Nura M812
Orange Neva Rise S1 Neva_Rise_S1
Orange Orange Neva leaf Neva_leaf
Orange Orange Neva play Neva_play
Orange Neva start Neva_start
Orange Orange Neva zen Neva_zen
Orange Dive 71 Orange_Dive_71
Orange Neva 80 Orange_Neva_80
Orange Rise51 PIXI4_5_4G
Orange Rise_54 Rise_54
Orange Nura2 m823_orange
Ordissimo Ordissimo LeNumero2 LeNumero2
Oukitel C12 Plus C12_Plus
Oukitel K10 K10
Oukitel K12 K12
Oukitel K13 Pro K13_Pro
Oukitel K15 Plus K15_Plus
Oukitel K6 K6
Oukitel WP10 WP10
Oukitel WP2 WP2
Oukitel WP7 WP7
Oukitel WP8_Pro WP8_Pro
POCO POCO X3 karna
POCO POCO F2 Pro lmi
POCO POCO X3 NFC surya
POCO POCO X3 Pro vayu
POPTEL POPTEL P10 P10
POPTEL P60 P60
POPTEL P8 P8
POPTEL P9000 MAX P9000_MAX
Panasonic LUMIX CM1 DMC-CM1
Panasonic FZ-A3 FZ-A3
Panasonic FZ-L1 FZ-L1AN
Panasonic FZ-L1 FZ-L1AUN_A
Panasonic FZ-L1 FZ-L1UN
Panasonic FZ-N1 FZ-N1
Panasonic FZ-N1 FZ-N1E
Panasonic FZ-N1 FZ-N1EVU
Panasonic FZ-N1F FZ-N1F
Panasonic FZ-N1 FZ-N1VU
Panasonic FZ-N1 FZ-N1VUC
Panasonic FZ-N1 FZ-N1VUF
Panasonic FZ-T1 FZ-T1AN
Panasonic FZ-T1 FZ-T1EUN
Panasonic FZ-T1 FZ-T1VUN
Panasonic FZ-X1 FZ-X1
Panasonic FZ-X1 FZ-X1VU
Panasonic FZ-X1 FZ-X1VUC
Panasonic P-01K P-01K
Pantech IM-A880S EF56S
Pantech VEGA Secret Note EF59K
Pantech VEGA Secret Note EF59L
Pantech VEGA Secret Note EF59S
Pantech IM-A850S ef48s
Pantech IM-A850K ef49k
Pantech IM-A850L ef50l
Pantech IM-A860K ef51k
Pantech IM-A860L ef51l
Pantech IM-A860S ef51s
Pantech IM-A870K ef52k
Pantech IM-A870L ef52l
Pantech IM-A870S ef52s
Pantech VEGA Secret UP ef60s
Pantech VEGA Secret UP ef61k
Pantech VEGA Secret UP ef62l
Pantech IM-A910K ef63k
Pantech IM-A910L ef63l
Pantech IM-A910S ef63s
Pantech IM-A920S ef65s
Pantech IM-100GN ef71g
Pantech IM-100K ef71k
Pantech IM-100S ef71s
Phone Max Rocky_1 Rocky_1
Phone Max S4G S4G
Phone Max X1 X1
Planet Computers Cosmo_Communicator Cosmo_Communicator
Plusone Kiwami FTJ152D
Point Mobile PM451 PM451
Point Mobile PM30 pm30
Point Mobile PM45 pm45
Point Mobile PM45E pm45e
Point Mobile PM66 pm66
Point Mobile PM70 pm70
Point Mobile PM80 pm80
Point Mobile PM85 pm85
Point Mobile PM90 pm90
Pokini K6 K6
Polytron P500 P500
Posiflex MK_1000 MK_1000
QMobile E8 GBL5805QM
Quantum QSPT-1952 QF3A
Rakuten C330 C330
Rakuten Rakuten Hand P710
Ratel Cell Cell
Razer Phone 2 aura
Razer Phone 2 bolt
Razer Razer Phone cheryl
Razer Razer phone cheryl_ckh
Razer Phone 2 linus
Realme realme 7i RE50C1
Realme realme 7i RE50C1L1
Realme realme 8 5G RE513CL1
Realme realme 5 RMX1915
Realme realme XT RMX1921
Realme realme XT RMX1921L1
Realme realme 5 RMX1927
Realme realme X2Pro RMX1931CN
Realme realme X2Pro RMX1931L1
Realme realme X2 RMX1991CN
Realme realme X2 RMX1993L1
Realme realme 6 RMX2001L1
Realme realme 6 RMX2002L1
Realme realme C3 RMX2020
Realme realme X50 5G 移动版 RMX2025CN
Realme realme 6i RMX2040
Realme realme X50t 5G RMX2052CN
Realme realme 6Pro RMX2063L1
Realme realme X50 Pro RMX2071CN
Realme realme X50 Pro Play RMX2072CN
Realme realme X50 Pro RMX2075L1
Realme realme X50 Pro RMX2076L1
Realme realme X3 RMX2083L1
Realme realme X3 RMX2086L1
Realme realme 7 5G RMX2111L1
Realme realme  X7 Pro  RMX2121CN
Realme realme X50m 5G RMX2142CN
Realme realme X50 5G RMX2144L1
Realme realme 7 Pro RMX2170L1
Realme realme C15 RMX2180
Realme 真我GT RMX2202CN
Realme 真我GT Neo RMX3031CN
Realme realme 8 Pro RMX3081L1
Realme realme 8 RMX3085L1
Realme 真我X7Pro 至尊版 RMX3115CN
Redmi Redmi K40 alioth
Redmi Redmi 9C NFC angelican
Redmi Redmi K30S Ultra apollo
Redmi Redmi K40 Gaming ares
Redmi Redmi Note 8 Pro begonia
Redmi Redmi 10X pro bomb
Redmi Redmi Note 10 5G camellian
Redmi Redmi Note 9T cannong
Redmi Redmi K30 Ultra cezanne
Redmi Redmi K20 davinci
Redmi Redmi 9 galahad
Redmi Redmi Note 9 pro gauguinpro
Redmi Redmi K40 Pro + haydn
Redmi Redmi Note 9 Pro joyeuse
Redmi Redmi 9T lemon
Redmi K30 PRO lmi
Redmi Redmi Note 9 merlinnfc
Redmi Redmi K30 phoenix
Redmi Redmi K30 5G picasso
Redmi Redmi K20 Pro raphael
Redmi Redmi Note 10 Pro sweet
Redmi Redmi Note 8T willow
Reeder P13 Max Blue P13_Max_Blue
Remdun RD15PQE RD15PQE
Remdun RD-52 RD52
Remdun RD52E RD52E
Remdun RD86E RD86E
Rhino C10 Rhino_C10
Rhino T8 Rhino_T8
Royaltek FGAD FGAD
RuggON MT7030 MT7030
RuggON PA501 PA501BG
RuggON PA501 PA501BW
Ruggear PSM01E PSM01E
Ruggear RG655 RG655
Ruggear RG720 RG720
Ruggear RG725_Q_EEA RG725
Ruggear RG760 RG760
Ruggear RG910 RG910
Ruggear DEWALT MD501 md501
Ruggear RugGear rg730 rg730
Runbo F1Plus F1Plus
S&T Global C20 C20
SEWOO NBP_65 NBP_65
SFR STARADDICT 4 staraddict4
SHIFT SHIFT6m SHIFT6m
SHIFT SHIFT6mq axolotl
SUPOIN S66 S66
Samsung Galaxy S6 Edge 404SC
Samsung Galaxy Note3 SC-01F
Samsung Galaxy Note Edge SC-01G
Samsung Galaxy Active neo SC-01H
Samsung Galaxy Note7 SC-01J
Samsung Galaxy Note8 SC-01K
Samsung Galaxy Note9 SC-01L
Samsung Galaxy Note10+ SC-01M
Samsung Galaxy Note3 SC-02F
Samsung Galaxy S5 Active SC-02G
Samsung Galaxy S7 Edge SC-02H
Samsung Galaxy S8 SC-02J
Samsung Galaxy S9 SC-02K
Samsung Galaxy Feel2 SC-02L
Samsung Galaxy A20 SC-02M
Samsung Galaxy S8+ SC-03J
Samsung Galaxy S9+ SC-03K
Samsung Galaxy S10 SC-03L
Samsung Galaxy S4 SC-04E
Samsung Galaxy S5 SC-04F
Samsung Galaxy S6 Edge SC-04G
Samsung Galaxy Feel SC-04J
Samsung Galaxy S10+ SC-04L
Samsung Galaxy S6 SC-05G
Samsung Galaxy S10+ Olympic Games Edition SC-05L
Samsung Galaxy A41 SC-41A
Samsung Galaxy A21 SC-42A
Samsung Galaxy S20 5G SC-51A
Samsung Galaxy S21 5G SC-51B
Samsung Galaxy S20+ 5G SC-52A
Samsung Galaxy S21 Ultra 5G SC-52B
Samsung Galaxy Note20 Ultra 5G SC-53A
Samsung Galaxy A51 5G SC-54A
Samsung Galaxy S20 5G SC51Aa
Samsung Galaxy S20 5G SCG01
Samsung Galaxy S20+ 5G SCG02
Samsung Galaxy S20 Ultra 5G SCG03
Samsung Galaxy Z Flip 5G SCG04
Samsung Galaxy Note20 Ultra 5G SCG06
Samsung Galaxy A51 5G SCG07
Samsung Galaxy A32 5G SCG08
Samsung Galaxy S21 5G SCG09
Samsung Galaxy S21+ 5G SCG10
Samsung Galaxy Note3 SCL22
Samsung Galaxy S5 SCL23
Samsung Galaxy Note Edge SCL24
Samsung Galaxy TabS 10.5 SCT21
Samsung Galaxy S6 Edge SCV31
Samsung Galaxy A8 SCV32
Samsung Galaxy S7 Edge SCV33
Samsung Galaxy Note7 SCV34
Samsung Galaxy S8+ SCV35
Samsung Galaxy S8 SCV36
Samsung Galaxy Note8 SCV37
Samsung Galaxy S9 SCV38
Samsung Galaxy S9+ SCV39
Samsung Galaxy Note9 SCV40
Samsung Galaxy S10 SCV41
Samsung Galaxy S10+ SCV42
Samsung Galaxy A30 SCV43
Samsung Galaxy A30 SCV43-j
Samsung Galaxy A30 SCV43-u
Samsung Galaxy Fold SCV44
Samsung Galaxy Note10+ SCV45
Samsung Galaxy A20 SCV46
Samsung Galaxy Z Flip SCV47
Samsung Galaxy A41 SCV48
Samsung Galaxy A21 SCV49
Samsung Galaxy A02s a02q
Samsung Galaxy A10 a10
Samsung Galaxy A10e a10ekx
Samsung Galaxy A11 a11q
Samsung Galaxy A12 a12
Samsung Galaxy A12 a12u
Samsung Galaxy A20 a20
Samsung Galaxy A20e a20e
Samsung Galaxy A20 a20p
Samsung Galaxy A21 a21
Samsung Galaxy A21s a21s
Samsung Galaxy A30 a30
Samsung Galaxy A30s a30s
Samsung Galaxy A31 a31
Samsung Galaxy A32 a32
Samsung Galaxy A32 5G a32x
Samsung Galaxy A3 a3lte
Samsung Galaxy A3 a3ltectc
Samsung Galaxy A3 a3ltedd
Samsung Galaxy A3 a3lteslk
Samsung Galaxy A3 a3ulte
Samsung Galaxy A3(2016) a3xelte
Samsung Galaxy A3(2016) a3xeltekx
Samsung Galaxy A3(2017) a3y17lte
Samsung Galaxy A40 a40
Samsung Galaxy A41 a41
Samsung Galaxy M42 5G a42xq
Samsung Galaxy A42 5G a42xuq
Samsung Galaxy A50 a50
Samsung Galaxy A50s a50s
Samsung Galaxy A51 a51
Samsung Galaxy A51 5G a51x
Samsung Galaxy A51 5G a51xq
Samsung Galaxy A52 a52q
Samsung Galaxy A52 5G a52xq
Samsung Galaxy A5 a5lte
Samsung Galaxy A5 a5ltectc
Samsung Galaxy A5 a5ulte
Samsung Galaxy A5 a5ultebmc
Samsung Galaxy A5 a5ultektt
Samsung Galaxy A5 a5ultelgt
Samsung Galaxy A5 a5ulteskt
Samsung Galaxy A5(2016) a5xelte
Samsung Galaxy A5(2016) a5xeltecmcc
Samsung Galaxy A5(2016) a5xeltektt
Samsung Galaxy A5(2016) a5xeltelgt
Samsung Galaxy A5(2016) a5xelteskt
Samsung Galaxy A5(2016) a5xeltextc
Samsung Galaxy A5(2016) a5xltechn
Samsung Galaxy A5(2017) a5y17lte
Samsung Galaxy A5(2017) a5y17ltecan
Samsung Galaxy A5(2017) a5y17ltektt
Samsung Galaxy A5(2017) a5y17ltelgt
Samsung Galaxy A5(2017) a5y17lteskt
Samsung Galaxy A60 a60q
Samsung Galaxy A6 a6elteaio
Samsung Galaxy A6 a6elteatt
Samsung Galaxy A6 a6eltemtr
Samsung Galaxy A6 a6eltespr
Samsung Galaxy A6 a6eltetmo
Samsung Galaxy A6 a6elteue
Samsung Galaxy A6 a6lte
Samsung Galaxy A6 a6lteks
Samsung Galaxy A6+ a6plte
Samsung Galaxy A9 Star Lite a6pltechn
Samsung Galaxy A9 Star Lite a6pltecmcc
Samsung Galaxy Jean a6pltektt
Samsung Galaxy A70 a70q
Samsung Galaxy A70s a70s
Samsung Galaxy A71 a71
Samsung Galaxy A Quantum a71x
Samsung Galaxy A71 5G a71xq
Samsung Galaxy A72 a72q
Samsung Galaxy A7 a7alte
Samsung Galaxy A7 a7lte
Samsung Galaxy A7 a7ltechn
Samsung Galaxy A7 a7ltectc
Samsung Galaxy A7 a7ltektt
Samsung Galaxy A7 a7ltelgt
Samsung Galaxy A7 a7lteskt
Samsung Galaxy A7(2016) a7xelte
Samsung Galaxy A7(2016) a7xeltecmcc
Samsung Galaxy A7(2016) a7xeltektt
Samsung Galaxy A7(2016) a7xeltelgt
Samsung Galaxy A7(2016) a7xelteskt
Samsung Galaxy A7(2016) a7xeltextc
Samsung Galaxy A7(2016) a7xltechn
Samsung Galaxy A7(2017) a7y17lte
Samsung Galaxy A7(2017) a7y17lteskt
Samsung Galaxy A7 (2018) a7y18lte
Samsung Galaxy A7 (2018) a7y18lteks
Samsung Galaxy A7 a7y18ve
Samsung Galaxy Quantum2 a82xq
Samsung Galaxy A8 a8elteskt
Samsung Galaxy A8 a8ltechn
Samsung Galaxy A8s a8sqlte
Samsung Galaxy A8s a8sqltechn
Samsung Galaxy A9 Pro a8sqlteks
Samsung Galaxy A8(2016) a8xelte
Samsung Galaxy A8(2016) a8xelteskt
Samsung Galaxy A9(2016) a9xltechn
Samsung Galaxy A9 Pro a9xproltechn
Samsung Galaxy A9 Pro a9xproltesea
Samsung Galaxy A9 (2018) a9y18qlte
Samsung Galaxy A9 2018 a9y18qltechn
Samsung Galaxy A9 (2018) a9y18qltekx
Samsung Galaxy Core afyonlteMetroPCS
Samsung Galaxy Core afyonltecan
Samsung Galaxy Avant afyonltetmo
Samsung Galaxy A8 Star astarqlte
Samsung Galaxy A8 Star astarqltechn
Samsung Galaxy A9 Star astarqltecmcc
Samsung Galaxy A8 Star astarqlteskt
Samsung Galaxy S10e beyond0
Samsung Galaxy S10e beyond0q
Samsung Galaxy S10 beyond1
Samsung Galaxy S10 beyond1q
Samsung Galaxy S10+ beyond2
Samsung Galaxy S10+ beyond2q
Samsung Galaxy S10 5G beyondx
Samsung Galaxy S10 5G beyondxq
Samsung Galaxy Z Flip bloomq
Samsung Galaxy Z Flip 5G bloomxq
Samsung Galaxy S3 c1ktt
Samsung Galaxy S3 c1lgt
Samsung Galaxy Note20 5G c1q
Samsung Galaxy Note20 c1s
Samsung Galaxy S3 c1skt
Samsung Galaxy Note20 Ultra 5G c2q
Samsung Galaxy Note20 Ultra c2s
Samsung Galaxy C5 c5ltechn
Samsung Galaxy C5 c5pltechn
Samsung Galaxy C5 Pro c5proltechn
Samsung Galaxy C7 c7ltechn
Samsung Galaxy C7 Pro c7prolte
Samsung Galaxy C7 Pro c7proltechn
Samsung Galaxy C9 Pro c9lte
Samsung Galaxy C9 Pro c9ltechn
Samsung Galaxy Core Prime coreprimelte
Samsung Galaxy Core Prime coreprimevelte
Samsung Galaxy Note9 crownlte
Samsung Galaxy Note9 crownlteks
Samsung Galaxy Note9 crownqltechn
Samsung Galaxy Note9 crownqltecs
Samsung Galaxy Note9 crownqltesq
Samsung Galaxy Note9 crownqlteue
Samsung Galaxy S8 Active cruiserlteatt
Samsung Galaxy S8 Active cruiserltesq
Samsung Galaxy Note10 d1
Samsung Galaxy Note10 d1q
Samsung Galaxy Note10 5G d1x
Samsung Galaxy Pocket Neo d2aio
Samsung Galaxy S3 d2att
Samsung Galaxy S3 d2can
Samsung Galaxy S3 d2cri
Samsung Galaxy S3 d2lterefreshspr
Samsung Galaxy Note10+ d2q
Samsung Galaxy Note10+ d2s
Samsung Galaxy S3 d2spi
Samsung Galaxy S3 d2spr
Samsung Galaxy S3 d2usc
Samsung Galaxy S3 d2vmu
Samsung Galaxy S3 d2vzw
Samsung Galaxy Note10+ 5G d2x
Samsung Galaxy Note10+ 5G d2xq
Samsung Galaxy Note10+ 5G d2xq2
Samsung Galaxy S8+ dream2lte
Samsung Galaxy S8+ dream2lteks
Samsung Galaxy S8+ dream2qltecan
Samsung Galaxy S8+ dream2qltechn
Samsung Galaxy S8+ dream2qltesq
Samsung Galaxy S8+ dream2qlteue
Samsung Galaxy S 轻奢版 dreamliteqltechn
Samsung Galaxy S8 dreamlte
Samsung Galaxy S8 dreamlteks
Samsung Galaxy S8 dreamqltecan
Samsung Galaxy S8 dreamqltechn
Samsung Galaxy S8 dreamqltecmcc
Samsung Galaxy S8 dreamqltesq
Samsung Galaxy S8 dreamqlteue
Samsung Galaxy E5 e5lte
Samsung Galaxy E5 e5ltetfnvzw
Samsung Galaxy E5 e5ltetw
Samsung Galaxy E7 e7lte
Samsung Galaxy E7 e7ltechn
Samsung Galaxy E7 e7ltectc
Samsung Galaxy E7 e7ltehktw
Samsung Galaxy Z Fold2 5G f2q
Samsung Galaxy F62 f62
Samsung Galaxy Round flteskt
Samsung Galaxy Grand Prime fortunalte
Samsung Galaxy Grand Prime fortunaltectc
Samsung Galaxy Grand Prime fortunaltezh
Samsung Galaxy Grand Prime fortunaltezt
Samsung Galaxy Note3 Neo frescoltektt
Samsung Galaxy Note3 Neo frescoltelgt
Samsung Galaxy Note3 Neo frescolteskt
Samsung Garda gardalteMetroPCS
Samsung Galaxy S3 Mini goldenlteatt
Samsung Galaxy S3 Mini goldenltebmc
Samsung Galaxy S3 Mini goldenltevzw
Samsung Galaxy Grand Prime gprimelteacg
Samsung Galaxy Grand Prime gprimeltecan
Samsung Galaxy Grand Prime gprimeltemtr
Samsung Galaxy Grand Prime gprimeltespr
Samsung Galaxy Grand Prime gprimeltetfnvzw
Samsung Galaxy Grand Prime gprimeltetmo
Samsung Galaxy Grand Prime gprimelteusc
Samsung Galaxy Note7  gracelte
Samsung Galaxy Note7 graceltektt
Samsung Galaxy Note7 graceltelgt
Samsung Galaxy Note7 gracelteskt
Samsung Galaxy Note7 graceqlteacg
Samsung Galaxy Note7 graceqlteatt
Samsung Galaxy Note7 graceqltebmc
Samsung Galaxy Note7 graceqltechn
Samsung Galaxy Note7 graceqltespr
Samsung Galaxy Note7 graceqltetmo
Samsung Galaxy Note7 graceqlteusc
Samsung Galaxy Note7 graceqltevzw
Samsung Galaxy Note Fan Edition gracerlte
Samsung Galaxy Note Fan Edition gracerltektt
Samsung Galaxy Note Fan Edition gracerltelgt
Samsung Galaxy Note Fan Edition gracerlteskt
Samsung Galaxy Grand Prime grandprimelte
Samsung Galaxy Grand Prime grandprimelteaio
Samsung Galaxy Go Prime grandprimelteatt
Samsung Galaxy Grand Prime grandprimevelte
Samsung Galaxy Grand Prime grandprimeveltezt
Samsung Galaxy Note8 greatlte
Samsung Galaxy Note8 greatlteks
Samsung Galaxy Note8 greatqlte
Samsung Galaxy Note8 greatqltechn
Samsung Galaxy Note8 greatqltecmcc
Samsung Galaxy Note8 greatqltecs
Samsung Galaxy Note8 greatqlteue
Samsung Galaxy Tab Active2 gtactive2lte
Samsung Galaxy Tab Active2 gtactive2ltechn
Samsung Galaxy Tab Active2 gtactive2ltekx
Samsung Galaxy Tab Active2 gtactive2lteue
Samsung Galaxy Tab Active2 gtactive2wifi
Samsung Galaxy Tab Active3 gtactive3
Samsung Galaxy Tab Active3 gtactive3wifi
Samsung Galaxy Tab Active Pro gtactivexl
Samsung Galaxy Tab Active Pro gtactivexlwifi
Samsung Galaxy Note3 ha3g
Samsung Galaxy XCover Field Pro haechiy19
Samsung Galaxy XCover FieldPro haechiy19lteatt
Samsung Galaxy Ace Style heatnfc3g
Samsung Galaxy Ace Style heatqlte
Samsung Galaxy S7 edge hero2lte
Samsung Galaxy S7 Edge hero2ltebmc
Samsung Galaxy S7 Edge hero2ltektt
Samsung Galaxy S7 edge hero2ltelgt
Samsung Galaxy S7 Edge hero2lteskt
Samsung Galaxy S7 Edge hero2qlteatt
Samsung Galaxy S7 Edge hero2qltecctvzw
Samsung Galaxy S7 edge hero2qltechn
Samsung Galaxy S7 Edge hero2qltespr
Samsung Galaxy S7 Edge hero2qltetmo
Samsung Galaxy S7 edge hero2qlteue
Samsung Galaxy S7 Edge hero2qlteusc
Samsung Galaxy S7 Edge hero2qltevzw
Samsung Galaxy S7  herolte
Samsung Galaxy S7  heroltebmc
Samsung Galaxy S7  heroltektt
Samsung Galaxy S7  heroltelgt
Samsung Galaxy S7  herolteskt
Samsung Galaxy S7 heroqlteacg
Samsung Galaxy S7 heroqlteaio
Samsung Galaxy S7  heroqlteatt
Samsung Galaxy S7 heroqltecctvzw
Samsung Galaxy S7 heroqltechn
Samsung Galaxy S7 heroqltelra
Samsung Galaxy S7 heroqltemtr
Samsung Galaxy S7  heroqltespr
Samsung Galaxy S7 heroqltetfnvzw
Samsung Galaxy S7  heroqltetmo
Samsung Galaxy S7 heroqlteue
Samsung Galaxy S7 heroqlteusc
Samsung Galaxy S7 heroqltevzw
Samsung Galaxy Note3 Neo hl3g
Samsung Galaxy Note3 Neo hllte
Samsung Galaxy Note3 hlte
Samsung Galaxy Note3 hlteatt
Samsung Galaxy Note3 hltecan
Samsung Galaxy J hltejs01tw
Samsung Galaxy Note3 hltektt
Samsung Galaxy Note3 hltelgt
Samsung Galaxy Note3 hlteskt
Samsung Galaxy Note3 hltespr
Samsung Galaxy Note3 hltetmo
Samsung Galaxy Note3 hlteusc
Samsung Galaxy Note3 hltevzw
Samsung Galaxy Note3 htdlte
Samsung Galaxy J1 j1nlte
Samsung Galaxy J1(2016) j1xlte
Samsung Galaxy J2 j2lte
Samsung Galaxy J3 j3ltectc
Samsung Galaxy J3(2016) j3ltekx
Samsung Galaxy J3(2016) j3ltetw
Samsung Galaxy J3(2016) j3ltexsa
Samsung Galaxy J3(2016) j3xlte
Samsung Galaxy J3(2016) j3xnlte
Samsung Galaxy J3 Pro 增强版 j3xpro6mltechn
Samsung Galaxy J3 Pro j3xproltechn
Samsung Galaxy J3 Pro j3xproltectc
Samsung Galaxy J3 Pro j3y17lte
Samsung Galaxy J3(2017) j3y17ltekx
Samsung Galaxy J3(2017) j3y17ltelgt
Samsung Galaxy J3 j3y17qltecmcc
Samsung Galaxy J4+ j4primelte
Samsung Galaxy J4+ j4primeltekx
Samsung Galaxy J5 j5ltechn
Samsung Galaxy J5 j5ltekx
Samsung Galaxy J5 j5nlte
Samsung Galaxy J5(2016) j5xltecmcc
Samsung Galaxy J5(2016) j5xnlte
Samsung Galaxy J5(2016) j5xnltektt
Samsung Galaxy J5(2016) j5xnltelgt
Samsung Galaxy J5(2016) j5xnlteskt
Samsung Galaxy J5 Pro j5y17lte
Samsung Galaxy J5 Pro j5y17ltedx
Samsung Galaxy J5 j5y17ltektt
Samsung Galaxy J5 j5y17ltelgt
Samsung Galaxy J5 j5y17lteskt
Samsung Galaxy J5 Pro j5y17ltextc
Samsung Galaxy J5 j5ylte
Samsung Galaxy J6 j6lte
Samsung Galaxy J6 j6ltekx
Samsung Galaxy J6 j6ltelgt
Samsung Galaxy J6+ j6primelte
Samsung Galaxy J7 j75ltektt
Samsung Galaxy J7(2016) j7eltemtr
Samsung Galaxy J7(2016) j7eltetmo
Samsung Galaxy J7 j7ltechn
Samsung Galaxy J7(2015) j7ltespr
Samsung Galaxy Wide2 j7popelteskt
Samsung Galaxy J7 Star j7topltemtr
Samsung Galaxy Wide3 j7toplteskt
Samsung Galaxy J7 Crown j7topltetfntmo
Samsung Galaxy J7 Star j7topltetmo
Samsung Galaxy J7 j7toplteue
Samsung Galaxy J7(2016) j7xelte
Samsung Galaxy J7(2016) j7xeltecmcc
Samsung Galaxy J7(2016) j7xeltektt
Samsung Galaxy On8 j7xlte
Samsung Galaxy J7(2016) j7xltectc
Samsung Galaxy J7 Pro j7y17lte
Samsung Galaxy J7(2017) j7y17ltektt
Samsung Galaxy S4 ja3g
Samsung Galaxy S4 Duos ja3gchnduos
Samsung Galaxy S4 ja3gduosctc
Samsung Galaxy A8+(2018) jackpot2lte
Samsung Galaxy A8(2018) jackpotlte
Samsung Galaxy A8(2018) jackpotltecan
Samsung Galaxy A8(2018) jackpotlteks
Samsung Galaxy S4 Active jactivelte
Samsung Galaxy S4 Active jactivelteatt
Samsung Galaxy S4 Active jactivelteskt
Samsung Galaxy S4 jaltektt
Samsung Galaxy S4 jaltelgt
Samsung Galaxy S4 jalteskt
Samsung Galaxy S4 jflte
Samsung Galaxy S4 jflteMetroPCS
Samsung Galaxy S4 jflteaio
Samsung Galaxy S4 jflteatt
Samsung Galaxy S4 jfltecan
Samsung Galaxy S4 jfltecri
Samsung Galaxy S4 jfltecsp
Samsung Galaxy S4 jfltelra
Samsung Galaxy S4 jflterefreshspr
Samsung Galaxy S4 jfltespr
Samsung Galaxy S4 jfltetmo
Samsung Galaxy S4 jflteusc
Samsung Galaxy S4 jfltevzw
Samsung Galaxy S4 jfltevzwpp
Samsung Galaxy S4 jftdd
Samsung Galaxy S4 jfvelte
Samsung Galaxy S4 Google Play Edition jgedlte
Samsung Galaxy S4 jsglte
Samsung Galaxy S5 k3g
Samsung Galaxy Core2 kanas3gcmcc
Samsung Galaxy Core2 kanas3gnfc
Samsung Galaxy S5 LTE-A kccat6
Samsung SM-W2018 kellyltechn
Samsung Galaxy S5 Google Play Edition kgedlte
Samsung Galaxy S5  klte
Samsung Galaxy S5 klteMetroPCS
Samsung Galaxy S5 klteacg
Samsung Galaxy S5 Active klteactive
Samsung Galaxy S5 klteaio
Samsung Galaxy S5 klteatt
Samsung Galaxy S5 Active klteattactive
Samsung Galaxy S5 kltecan
Samsung Galaxy S5 Active kltecanactive
Samsung Galaxy S5 klteduoszn
Samsung Galaxy S5 kltektt
Samsung Galaxy S5 kltelgt
Samsung Galaxy S5 kltelra
Samsung Galaxy S5 klteskt
Samsung Galaxy S5 kltespr
Samsung Galaxy S5 K Sport kltesprsports
Samsung Galaxy S5 kltetfnvzw
Samsung Galaxy S5 kltetmo
Samsung Galaxy S5 klteusc
Samsung Galaxy S5 kltevzw
Samsung Galaxy S5 mini kminilte
Samsung Galaxy S5 mini kminilteatt
Samsung Galaxy S5 Mini kminilteusc
Samsung Galaxy S5 mini kminiwifi
Samsung Galaxy S4 ks01lte
Samsung Galaxy S4 ks01ltektt
Samsung Galaxy S4 ks01ltelgt
Samsung Galaxy S4 LTE-A ks01lteskt
Samsung Galaxy S5 kwifi
Samsung Galaxy S5 lentisltektt
Samsung Galaxy S5 lentisltelgt
Samsung Galaxy S5 lentislteskt
Samsung Galaxy M11 m11q
Samsung Galaxy M12 m12
Samsung Galaxy M20 m20
Samsung Galaxy M20 m20lte
Samsung Galaxy M21 m21
Samsung Galaxy K Zoom m2a3g
Samsung Galaxy K Zoom m2alte
Samsung Galaxy K Zoom m2altecan
Samsung Galaxy K Zoom m2altelgt
Samsung Galaxy S3 m3
Samsung Galaxy M30s m30s
Samsung Galaxy M31 m31
Samsung Galaxy M31s m31s
Samsung Galaxy M40 m40
Samsung Galaxy M51 m51
Samsung Galaxy M62 m62
Samsung Nexus 10 manta
Samsung Galaxy S6 Active marinelteatt
Samsung Galaxy Tab4  matissewifigoogle
Samsung Galaxy Mega2 mega2lte
Samsung Galaxy Mega2 mega2lteatt
Samsung Galaxy Mega 6.3 melius3g
Samsung Galaxy Mega 6.3 meliuslte
Samsung Galaxy Mega 6.3 meliuslteMetroPCS
Samsung Galaxy Mega 6.3 meliuslteatt
Samsung Galaxy Mega 6.3 meliusltecan
Samsung Galaxy Mega 6.3 meliusltektt
Samsung Galaxy Mega 6.3 meliusltelgt
Samsung Galaxy Mega 6.3 meliuslteskt
Samsung Galaxy Mega 6.3 meliusltespr
Samsung Galaxy Mega 6.3 meliuslteusc
Samsung Galaxy S4 Zoom mproject3g
Samsung Galaxy S4 Zoom mprojectlteatt
Samsung Galaxy S4 Zoom mprojectqlte
Samsung Galaxy Grand2 ms01lte
Samsung Galaxy Grand2 ms01ltektt
Samsung Galaxy Grand2 ms01ltelgt
Samsung Galaxy Grand2 ms01lteskt
Samsung Galaxy Note5 noblelte
Samsung Galaxy Note5 noblelteacg
Samsung Galaxy Note5 noblelteatt
Samsung Galaxy Note5 nobleltebmc
Samsung Galaxy Note5 nobleltechn
Samsung Galaxy Note5 nobleltehk
Samsung Galaxy Note5 nobleltektt
Samsung Galaxy Note5 nobleltelgt
Samsung Galaxy Note5 nobleltelra
Samsung Galaxy Note5 noblelteskt
Samsung Galaxy Note5 nobleltespr
Samsung Galaxy Note5 nobleltetmo
Samsung Galaxy Note5 noblelteusc
Samsung Galaxy Note5 nobleltevzw
Samsung Galaxy S21 5G o1q
Samsung Galaxy S21 5G o1s
Samsung Galaxy Wide on7nlteskt
Samsung Galaxy On7(2016) on7xeltektt
Samsung Galaxy On7(2016) on7xeltelgt
Samsung Galaxy On7(2016) on7xelteskt
Samsung Galaxy On7 Prime on7xrefltektt
Samsung Galaxy On7 Prime on7xrefltelgt
Samsung Galaxy On7 Prime on7xreflteskt
Samsung Galaxy S21 Ultra 5G p3q
Samsung Galaxy S21 Ultra 5G p3s
Samsung Galaxy S7 Active poseidonlteatt
Samsung Galaxy A80 r1q
Samsung Galaxy A90 5G r3q
Samsung Galaxy S10 Lite r5q
Samsung Galaxy Note10 Lite r7
Samsung Galaxy S20 FE 5G r8q
Samsung Galaxy S20 FE r8s
Samsung W2016 royceltectc
Samsung Galaxy Tab Active rubenslte
Samsung Galaxy Tab4 Active rubensltekx
Samsung Galaxy Tab4 Active rubenswifi
Samsung Galaxy S3 Neo s3ve3g
Samsung Galaxy S3 Neo s3ve3gds
Samsung Galaxy S5 Neo s5neolte
Samsung Galaxy S5 Neo s5neoltecan
Samsung Galaxy S4 Mini serranolte
Samsung Galaxy S4 Mini serranoltebmc
Samsung Galaxy S4 Mini  serranoltektt
Samsung Galaxy S4 Mini serranoltelra
Samsung Galaxy S4 Mini serranoltespr
Samsung Galaxy S4 Mini serranolteusc
Samsung Galaxy S4 Mini serranoltevzw
Samsung Galaxy S4 Mini serranovelte
Samsung Galaxy S4 Mini  serranovolteatt
Samsung Galaxy Alpha slte
Samsung Galaxy Alpha slteatt
Samsung Galaxy Alpha sltecan
Samsung Galaxy Alpha sltechn
Samsung Galaxy Alpha sltektt
Samsung Galaxy Alpha sltelgt
Samsung Galaxy Alpha slteskt
Samsung Galaxy S9+ star2lte
Samsung Galaxy S9+ star2lteks
Samsung Galaxy S9+ star2qltechn
Samsung Galaxy S9+ star2qltecs
Samsung Galaxy S9+ star2qltesq
Samsung Galaxy S9+ star2qlteue
Samsung Galaxy S9 starlte
Samsung Galaxy S9 starlteks
Samsung Galaxy S9 starqltechn
Samsung Galaxy S9 starqltecmcc
Samsung Galaxy S9 starqltecs
Samsung Galaxy S9 starqltesq
Samsung Galaxy S9 starqlteue
Samsung Galaxy Pop superiorlteskt
Samsung Galaxy Note2 t03g
Samsung Galaxy Note2 t0lte
Samsung Galaxy Note II t0lteatt
Samsung Galaxy Note2 t0ltecan
Samsung Galaxy Note2 t0ltektt
Samsung Galaxy Note2 t0ltelgt
Samsung Galaxy Note2 t0lteskt
Samsung Galaxy Note2 t0ltespr
Samsung Galaxy Note2 t0lteusc
Samsung Galaxy Note2 t0ltevzw
Samsung Galaxy S21+ 5G t2q
Samsung Galaxy S21+ 5G t2s
Samsung Galaxy Note Edge tbeltektt
Samsung Galaxy Note Edge tbeltelgt
Samsung Galaxy Note Edge tbelteskt
Samsung Galaxy Note Edge tblte
Samsung Galaxy Note Edge tblteatt
Samsung Galaxy Note Edge tbltecan
Samsung Galaxy Note Edge tbltechn
Samsung Galaxy Note Edge tbltespr
Samsung Galaxy Note Edge tbltetmo
Samsung Galaxy Note Edge tblteusc
Samsung Galaxy Note Edge tbltevzw
Samsung Galaxy Note4 tre3caltektt
Samsung Galaxy Note4 S-LTE tre3caltelgt
Samsung Galaxy Note4 S-LTE tre3calteskt
Samsung Galaxy Note4 tre3g
Samsung Galaxy Note4 trelte
Samsung Galaxy Note4 treltektt
Samsung Galaxy Note4 treltelgt
Samsung Galaxy Note4 trelteskt
Samsung Galaxy Note4 trhplte
Samsung Galaxy Note4 trlte
Samsung Galaxy Note4 trlteatt
Samsung Galaxy Note4 trltecan
Samsung Galaxy Note4 trltechn
Samsung Galaxy Note4 trltechnzh
Samsung Galaxy Note4 trltespr
Samsung Galaxy Note4 trltetmo
Samsung Galaxy Note4 trlteusc
Samsung Galaxy Note4 trltevzw
Samsung Galaxy Mega2 vastalte
Samsung Galaxy Mega2 vastaltezh
Samsung 领世旗舰8 venenoltechn
Samsung W2017 veyronltectc
Samsung Galaxy Core Lite victorlte
Samsung 三星 W21 5G victory
Samsung Galaxy Ace4 vivaltolte
Samsung Galaxy Ace4 vivaltonfc3g
Samsung Galaxy Express2 wilcoxlte
Samsung Galaxy Fold 5G winner
Samsung Galaxy S20 5G x1q
Samsung Galaxy S20 5G x1s
Samsung Galaxy Xcover3 xcover3lte
Samsung Galaxy Xcover3 xcover3velte
Samsung Galaxy XCover4 xcover4lte
Samsung Galaxy Xcover4 xcover4ltecan
Samsung Galaxy XCover 4s xcover4s
Samsung Galaxy XCover 5  xcover5
Samsung Galaxy XCover Pro xcoverpro
Samsung Galaxy S20+ 5G y2q
Samsung Galaxy S20+ 5G y2s
Samsung Galaxy Young2 young2nfc3g
Samsung Galaxy S20 Ultra 5G z3q
Samsung Galaxy S20 Ultra 5G z3s
Samsung Galaxy S6 Edge+ zenlte
Samsung Galaxy S6 Edge+ zenlteatt
Samsung Galaxy S6 Edge+ zenltebmc
Samsung Galaxy S6 Edge+ zenltechn
Samsung Galaxy S6 Edge+ zenltektt
Samsung Galaxy S6 Edge+ zenltekx
Samsung Galaxy S6 Edge+ zenltelgt
Samsung Galaxy S6 Edge+ zenlteskt
Samsung Galaxy S6 Edge+ zenltespr
Samsung Galaxy S6 Edge+ zenltetmo
Samsung Galaxy S6 Edge+ zenlteusc
Samsung Galaxy S6 Edge+ zenltevzw
Samsung Galaxy S6 zeroflte
Samsung Galaxy S6 zeroflteacg
Samsung Galaxy S6 zeroflteaio
Samsung Galaxy S6 zeroflteatt
Samsung Galaxy S6 zerofltebmc
Samsung Galaxy S6 zerofltechn
Samsung Galaxy S6 zerofltectc
Samsung Galaxy S6 zerofltektt
Samsung Galaxy S6 zerofltelgt
Samsung Galaxy S6 zerofltelra
Samsung Galaxy S6 zerofltemtr
Samsung Galaxy S6 zeroflteskt
Samsung Galaxy S6 zerofltespr
Samsung Galaxy S6 zerofltetfnvzw
Samsung Galaxy S6 zerofltetmo
Samsung Galaxy S6 zeroflteusc
Samsung Galaxy S6 zerofltevzw
Samsung Galaxy S6 edge zerolte
Samsung Galaxy S6 Edge zerolteacg
Samsung Galaxy S6 Edge zerolteatt
Samsung Galaxy S6 Edge zeroltebmc
Samsung Galaxy S6 Edge zeroltechn
Samsung Galaxy S6 Edge zeroltektt
Samsung Galaxy S6 edge zeroltelgt
Samsung Galaxy S6 Edge zeroltelra
Samsung Galaxy S6 Edge zerolteskt
Samsung Galaxy S6 Edge zeroltespr
Samsung Galaxy S6 Edge zeroltetmo
Samsung Galaxy S6 Edge zerolteusc
Samsung Galaxy S6 Edge zeroltevzw
Samsung 三星W20 zodiac
Schok freedom turbo XL freedom_turbo_XL
Senseit Senseit N151 SENSEIT_N151
Senter S917V9 S917V9
Seuic AUTOID9N d500b
Seuic AUTOID Pad Air d520
Seuic AUTOID Q9 d550
Seuic CRUISE1 d700s
Sharp AQUOS R5G SH-RM14 Banagher
Sharp Disney Mobile on docomo DM-01H DM-01H
Sharp Disney Mobile on docomo DM-01J DM-01J
Sharp Media Tablet EB-L76G-B
Sharp AQUOS U SHV37 FSP
Sharp AQUOS L SHV37 FSP_u
Sharp AQUOS SERIE mini SHV38 GTQ
Sharp SHARP AQUOS S3 HH1
Sharp Sharp HH6 HH6_sprout
Sharp AQUOS R SHV39 HUR
Sharp AQUOS R compact SHV41 JWT
Sharp AQUOS sense4 SH-41A Jerid
Sharp AQUOS sense4 SH-M15 JeridA
Sharp AQUOS sense4 basic A003SH JeridB
Sharp AQUOS sense4 lite SH-RM15 JeridL
Sharp AQUOS sense SHV40 KXU
Sharp AQUOS sense KXU_u
Sharp AQUOS R2 SHV42 LYV
Sharp AQUOS sense2 SHV43 MZW
Sharp AQUOS sense2 MZW-u
Sharp AQUOS R3 SHV44 NAX
Sharp AQUOS sense3 plus サウンド SHV46 OBY
Sharp AQUOS zero5G basic DX OJ6
Sharp AQUOS P1 P1X
Sharp AQUOS sense3 SHV45 PCZ
Sharp AQUOS sense3 PCZ-u
Sharp AQUOS zero2 SHV47 QDA
Sharp SHARP AQUOS S2 Plus SAT
Sharp SHARP AQUOS S3 SD1
Sharp AQUOS Xx 304SH SG304SH
Sharp AQUOS CRYSTAL X SG402SH
Sharp AQUOS CRYSTAL 2 SG403SH
Sharp AQUOS Xx SG404SH
Sharp AQUOS Xx2 SG502SH
Sharp AQUOS Xx2 mini SG503SH
Sharp AQUOS Xx 3 SG506SH
Sharp AQUOS Xx3 mini SG603SH
Sharp AQUOS R SG605SH
Sharp AQUOS ea SG606SH
Sharp AQUOS R compact 701SH SG701SH
Sharp AQUOS R2 SG706SH
Sharp AQUOS zero SG801SH
Sharp AQUOS R2 compact 803SH SG803SH
Sharp AQUOS R3 808SH SG808SH
Sharp AQUOS sense3 plus (901SH) SG901SH
Sharp AQUOS zero2 906SH SG906SH
Sharp AQUOS R5G 908SH SG908SH
Sharp AQUOS zero5G basic SGA002SH
Sharp AQUOS PHONE ZETA  SH-01F SH-01F
Sharp AQUOS ZETA SH-01G SH-01G
Sharp AQUOS ZETA SH-01H SH-01H
Sharp AQUOS sense SH-01K SH-01K
Sharp AQUOS sense2 SH-01L SH-01L
Sharp AQUOS zero2 SH-01M SH-01M
Sharp Disney Mobile on docomo SH-02G SH-02G
Sharp AQUOS Compact SH-02H SH-02H
Sharp AQUOS EVER SH-02J SH-02J
Sharp AQUOS sense3 SH-02M SH-02M
Sharp AQUOS ZETA SH-03G SH-03G
Sharp AQUOS R SH-03J SH-03J
Sharp AQUOS R2 SH-03K SH-03K
Sharp AQUOS ZETA SH-04F SH-04F
Sharp AQUOS EVER SH-04G SH-04G
Sharp AQUOS ZETA SH-04H SH-04H
Sharp AQUOS R3 SH-04L SH-04L
Sharp AQUOS PAD SH-05G SH-05G
Sharp AQUOS PAD SH-06F SH-06F
Sharp AQUOS R5G SH-51A SH-51A
Sharp AQUOS sense5G SH-53A
Sharp SHARP AQUOS D10 SH-D01
Sharp AQUOS L2 SH-L02
Sharp AQUOS SH-M02 SH-M02
Sharp AQUOS SH-M02-EVA20 SH-M02-EVA20
Sharp AQUOS mini SH-M03 SH-M03
Sharp SH-M04 SH-M04
Sharp AQUOS sense lite (SH-M05) SH-M05
Sharp AQUOS R compact SH-M06 SH-M06
Sharp AQUOS sense plus (SH-M07) SH-M07
Sharp AQUOS sense2 (SH-M08) SH-M08
Sharp AQUOS R2 compact (SH-M09) SH-M09
Sharp AQUOS zero (SH-M10) SH-M10
Sharp AQUOS sense3 plus SH-M11 SH-M11
Sharp AQUOS sense3 SH-M12 SH-M12
Sharp AQUOS zero2 SH-M13 SH-M13
Sharp AQUOS R3 SH-R10A SH-R10
Sharp AQUOS SH-RM02 SH-RM02
Sharp AQUOS sense3 plus SH-RM11 SH-RM11
Sharp AQUOS sense3 lite SH-RM12
Sharp SHARP AQUOS C10 SH-Z01
Sharp AQUOS zero SH-Z10
Sharp AQUOS zero SH-Z10A
Sharp AQUOS zero2 SH-Z20 SH-Z20
Sharp AQUOS SERIE SHL25 SHL25
Sharp AQUOS SERIE mini SHV31 SHV31
Sharp AQUOS SERIE SHV32 SHV32
Sharp AQUOS SERIE mini SHV33 SHV33
Sharp AQUOS SERIE SHV34 SHV34
Sharp AQUOS U SHV35 SHV35
Sharp SHARP AQUOS S2 SS2
Sharp Star Wars mobile SW001SH
Sharp AQUOS sense5G Sarah
Sharp AQUOS sense5G SH-S50 SarahH
Sharp AQUOS R5G SHG01 TGD
Sharp AQUOS sense4 plus VG2
Sharp SH-H01 VZJ
Sharp AQUOS sense5G WJG
Sharp 507SH eve_sprout
Sharp X1 nasa_sprout
Sharp S7 vespa_sprout
Sigma Mobile X-TREME PQ37 X-TREME_PQ37
Sigma Mobile X-treme PQ36 X-treme_PQ36
Sigma Mobile X-treme PQ53 X-treme_PQ53
Sigma Mobile X-treme_PQ54 MAX X-treme_PQ54_MAX
Sigma Mobile X-TREME PQ39 X_TREME_PQ39
Sirin FINNEY PHONE SR00300-W
Sirin LABS SOLARIN solarin
Smile A955Z A955Z
Snopow M10 M10
Sonimtech RS60 RS60
Sonimtech RS80 RS80
Sonimtech XP7 XP7700
Sonimtech Smart-Ex 01 XP7700Z1
Sonimtech XP7705 XP7705
Sonimtech XP8 XP8800
Sony Xperia Z3 401SO
Sony Xperia Z4 402SO
Sony Xperia Z5 501SO
Sony Xperia X Performance 502SO
Sony Xperia XZ 601SO
Sony Xperia XZs 602SO
Sony Xperia XZ1 701SO
Sony Xperia XZ2 702SO
Sony Xperia XZ3 801SO
Sony Xperia 1 802SO
Sony Xperia 5 901SO
Sony Xperia 8 902SO
Sony Xperia 10 II A001SO
Sony Xperia 5 II A002SO
Sony Xperia ZR C5502
Sony Xperia ZR C5503
Sony Xperia ZL C6502
Sony Xperia ZL C6503
Sony Xperia ZL C6506
Sony Xperia Z C6602
Sony Xperia Z C6603
Sony Xperia Z C6616
Sony Xperia Z Ultra C6802
Sony Smartphone Z Ultra Google Play edition C6806
Sony Xperia Z Ultra C6833
Sony Xperia Z Ultra C6843
Sony Xperia Z1 C6902
Sony Xperia Z1 C6903
Sony Xperia Z1 C6906
Sony Xperia Z1 C6916
Sony Xperia Z1 C6943
Sony Xperia E3 D2202
Sony Xperia E3 D2203
Sony Xperia E3 D2206
Sony Xperia E3 Dual D2212
Sony Xperia E3 D2243
Sony Xperia M2 Dual D2302
Sony Xperia M2 D2303
Sony Xperia M2 D2305
Sony Xperia M2 D2306
Sony Xperia M2 Aqua D2403
Sony Xperia M2 Aqua D2406
Sony Xperia C3 Dual D2502
Sony Xperia C3 D2533
Sony Xperia T3 D5102
Sony Xperia T3 D5103
Sony Xperia T3 D5106
Sony Xperia T2 Ultra D5303
Sony Xperia T2 Ultra D5306
Sony Xperia T2 Ultra D5316
Sony Xperia T2 Ultra D5316N
Sony Xperia T2 Ultra dual D5322
Sony Xperia Z1 Compact D5503
Sony Xperia J1 Compact D5788
Sony Xperia Z3 Compact D5803
Sony Xperia Z3 Compact D5833
Sony Xperia Z2 D6502
Sony Xperia Z2 D6503
Sony Xperia Z2 D6543
Sony Xperia Z2a D6563
Sony Xperia Z3 D6603
Sony Xperia Z3 D6616
Sony Xperia Z3 Dual D6633
Sony Xperia Z3 D6643
Sony Xperia Z3 D6646
Sony Xperia Z3 D6653
Sony Xperia Z3 Dual D6683
Sony Xperia Z3v D6708
Sony Xperiaâ„¢ E4g E2003
Sony Xperia E4g E2053
Sony Xperiaâ„¢ M4 Aqua E2303
Sony Xperiaâ„¢ M4 Aqua E2306
Sony Xperiaâ„¢ M4 Aqua Dual E2312
Sony Xperiaâ„¢ M4 Aqua Dual E2333
Sony Xperiaâ„¢ M4 Aqua E2353
Sony Xperiaâ„¢ M4 Aqua Dual E2363
Sony Xperiaâ„¢ C4 E5303
Sony Xperiaâ„¢ C4 E5306
Sony Xperiaâ„¢ C4 Dual E5333
Sony Xperiaâ„¢ C4 Dual E5343
Sony Xperiaâ„¢ C4 E5353
Sony Xperiaâ„¢ C4 Dual E5363
Sony Xperia C5 Ultra E5506
Sony Xperia C5 Ultra Dual E5533
Sony Xperia C5 Ultra E5553
Sony Xperia C5 Ultra Dual E5563
Sony Xperia M5 E5603
Sony Xperia M5 E5606
Sony Xperia M5 Dual E5633
Sony Xperia M5 Dual E5643
Sony Xperia M5 E5653
Sony Xperia M5 Dual E5663
Sony Xperia Z5 Compact E5803
Sony Xperia Z5 Compact E5823
Sony Xperia Z4v E6508
Sony Xperia Z3+ Dual  E6533
Sony Xperia Z3+    E6553
Sony Xperia Z5 E6603
Sony Xperia Z5 dual E6633
Sony Xperia Z5 E6653
Sony Xperia Z5 dual E6683
Sony Xperia Z5 Premium Dual E6833
Sony Xperia Z5 Premium E6853
Sony Xperia Z5 Premium E6883
Sony Xperia XA F3111
Sony Xperia XA F3112
Sony Xperia XA F3113
Sony Xperia XA F3115
Sony Xperia XA F3116
Sony Xperia XA Ultra F3211
Sony Xperia XA Ultra F3212
Sony Xperia XA Ultra F3213
Sony Xperia XA Ultra F3215
Sony Xperia XA Ultra F3216
Sony Xperia E5 F3311
Sony Xperia E5 F3313
Sony Xperia X F5121
Sony Xperia X F5122
Sony Xperia X Compact F5321
Sony Xperia X Performance F8131
Sony Xperia X Performance F8132
Sony Xperia XZ F8331
Sony Xperia XZ F8332
Sony Xperia Touch G1109
Sony Xperia Hello G1209
Sony Xperia XA1 G3112
Sony Xperia XA1 G3116
Sony Xperia XA1 G3121
Sony Xperia XA1 G3123
Sony Xperia XA1 G3125
Sony Xperia XA1 Ultra G3212
Sony Xperia XA1 Ultra G3221
Sony Xperia XA1 Ultra G3223
Sony Xperia XA1 Ultra G3226
Sony Xperia L1 G3311
Sony Xperia L1 G3312
Sony Xperia L1 G3313
Sony Xperia XA1 Plus G3412
Sony Xperia XA1 Plus G3416
Sony Xperia XA1 Plus G3421
Sony Xperia XA1 Plus G3423
Sony Xperia XA1 Plus G3426
Sony Xperia XZ Premium G8141
Sony Xperia XZ Premium G8142
Sony Xperia XZ Premium G8188
Sony Xperia XZs G8231
Sony Xperia XZs G8232
Sony Xperia XZ1 G8341
Sony Xperia XZ1 G8342
Sony Xperia XZ1 G8343
Sony Xperia XZ1 Compact G8441
Sony Xperia XA2 H3113
Sony Xperia XA2 H3123
Sony Xperia XA2 H3133
Sony Xperia XA2 Ultra H3213
Sony Xperia XA2 Ultra H3223
Sony Xperia L2 H3311
Sony Xperia L2 H3321
Sony Xperia XA2 Plus H3413
Sony Xperia XA2 H4113
Sony Xperia XA2 H4133
Sony Xperia XA2 Ultra H4213
Sony Xperia XA2 Ultra H4233
Sony Xperia L2 H4311
Sony Xperia L2 H4331
Sony Xperia XA2 Plus H4413
Sony Xperia XA2 Plus H4493
Sony Xperia XZ2 Premium H8116
Sony Xperia XZ2 Premium H8166
Sony Xperia XZ2 H8216
Sony Xperia XZ2 H8266
Sony Xperia XZ2 H8276
Sony Xperia XZ2 H8296
Sony Xperia XZ2 Compact H8314
Sony Xperia XZ2 Compact H8324
Sony Xperia XZ3 H8416
Sony Xperia XZ3 H9436
Sony Xperia XZ3 H9493
Sony Xperia 10 I3113
Sony Xperia 10 I3123
Sony Xperia 10 Plus I3213
Sony Xperia 10 Plus I3223
Sony Xperia L3 I3312
Sony Xperia 10 I4113
Sony Xperia 10 I4193
Sony Xperia 10 Plus I4213
Sony Xperia 10 Plus I4293
Sony Xperia L3 I4312
Sony Xperia L3 I4332
Sony Xperia Ace J3173
Sony Xperia 8 Lite J3273
Sony Xperia 1 J8110
Sony Xperia 1 J8170
Sony Xperia 5 J8210
Sony Xperia 5 J8270
Sony Xperia 1 J9110
Sony Xperia 1 Professional Edition J9150
Sony Xperia 1 J9180
Sony Xperia 5 J9210
Sony Xperia 5 J9260
Sony Xperia Tablet Z SGP311
Sony Xperia Tablet Z SGP312
Sony Xperia Tablet Z SGP321
Sony Xperia Tablet Z SGP351
Sony Xperia Z Ultra SGP412
Sony Xperia Z2 Tablet SGP511
Sony Xperia Z2 Tablet SGP512
Sony Xperia Z2 Tablet SGP521
Sony Xperia Z2 Tablet SGP551
Sony Xperia Z2 Tablet SGP561
Sony Xperia Z3 Tablet Compact SGP611
Sony Xperia Z3 Tablet Compact SGP612
Sony Xperia Z3 Tablet Compact SGP621
Sony Xperia Z3 Tablet Compact SGP641
Sony Xperia Z4 Tablet SGP712
Sony Xperia Z4 Tablet SGP771
Sony Xperia Z1 SO-01F
Sony Xperia Z3 SO-01G
Sony Xperia Z5 SO-01H
Sony Xperia XZ SO-01J
Sony Xperia XZ1 SO-01K
Sony Xperia XZ3 SO-01L
Sony Xperia 5 SO-01M
Sony Xperia Z SO-02E
Sony Xperia Z1f SO-02F
Sony Xperia Z3 Compact SO-02G
Sony Xperia Z5 Compact SO-02H
Sony Xperia X Compact SO-02J
Sony Xperia XZ1 Compact SO-02K
Sony Xperia Ace SO-02L
Sony Xperia Z2 SO-03F
Sony Xperia Z4 SO-03G
Sony Xperia Z5 Premium SO-03H
Sony Xperia XZs SO-03J
Sony Xperia XZ2 SO-03K
Sony Xperia 1 SO-03L
Sony Xperia A2 SO-04F
Sony Xperia A4 SO-04G
Sony Xperia X Performance SO-04H
Sony Xperia XZ Premium SO-04J
Sony Xperia XZ2 Premium SO-04K
Sony Xperia Z2 Tablet SO-05F
Sony Xperia Z4 Tablet SO-05G
Sony Xperia XZ2 Compact SO-05K
Sony Xperia 10 II SO-41A
Sony Xperia 1 II SO-51A
Sony Xperia 5 II SO-52A
Sony Xperia 1 II SOG01
Sony Xperia 5 II SOG02
Sony Xperia Z1 SOL23
Sony Xperia Z Ultra SOL24
Sony Xperia ZL2 SOL25
Sony Xperia Z3 SOL26
Sony Xperia Z2 Tablet SOT21
Sony Xperia Z4 Tablet SOT31
Sony Xperia Z4 SOV31
Sony Xperia Z5 SOV32
Sony Xperia X Performance SOV33
Sony Xperia XZ SOV34
Sony Xperia XZs SOV35
Sony Xperia XZ1 SOV36
Sony Xperia XZ2 SOV37
Sony Xperia XZ2 Premium SOV38
Sony Xperia XZ3 SOV39
Sony Xperia 1 SOV40
Sony Xperia 5 SOV41
Sony Xperia 8 SOV42
Sony Xperia 8 SOV42-u
Sony Xperia 10 II SOV43
Sony Xperia L4 XQ-AD51
Sony Xperia L4 XQ-AD52
Sony Xperia PRO XQ-AQ52
Sony Xperia PRO XQ-AQ62
Sony Xperia 5 II XQ-AS42
Sony Xperia 5 II XQ-AS52
Sony Xperia 5 II XQ-AS62
Sony Xperia 5 II XQ-AS72
Sony Xperia 1 II XQ-AT42
Sony Xperia 1 II XQ-AT51
Sony Xperia 1 II XQ-AT52
Sony Xperia 1 II XQ-AT72
Sony Xperia 10 II XQ-AU42
Sony Xperia 10 II XQ-AU51
Sony Xperia 10 II XQ-AU52
Sony Xperia Z3 Compact aries
Sony Xperia Z3 leo
Sony Xperia X suzu
SonyAudio NW-A100 icx1293
SonyAudio NW-ZX500 icx1295
Sosh SoshPhone SoshPhone
Spectralink Versity 92-Series  VC92
Spectralink Versity Versity
Sprint HTC Bolt htc_acawhl
Sugar SUGAR S50 SUGAR_S50
Sugar SUGAR S55 SUGAR_S55
Sugar SUGAR C13 p210cn
Sugar Sugar T50 p611bn
Swissvoice G50 G50
T-Mobile REVVL 4+ Porto
T-Mobile REVVL 5G Seattle_5G
T-Mobile REVVLRY+ lake_n
TASKPHONE T20 T20P
TCL Smartphone A5A_INFINI
TCL TCL 20 SE Austin
TCL TCL 10 Plus Boston
TCL TCL 20E HONG_KONG
TCL TCL 20Y Hong_Kong_Pro
TCL TCL 20 5G Irvine
TCL TCL 20S Miami_Pro
TCL TCL 10 SE Oakland
TCL TCL 10 5G Seattle
TCL TCL PLEX T1
TCL A1 T1_LE
TCL TCL 10L T1_LITE
TCL TCL 10 Pro T1_PRO
TCT (Alcatel) Alcatel 3 A3A
TCT (Alcatel) Alcatel 3X A3A_PLUS
TCT (Alcatel) Alcatel 3V A3A_XL_4G
TCT (Alcatel) Alcatel 5X A5X
TCT (Alcatel) U5 HD BUZZ6E
TCT (Alcatel) U5 BUZZ6T4G
TCT (Alcatel) Alcatel 3 Dive_73
TCT (Alcatel) A5 ELSA6
TCT (Alcatel) A7 ELSA6P
TCT (Alcatel) IDOL 2 S EOS_lte
TCT (Alcatel) 6037K Eclipse
TCT (Alcatel) alcatel 1X Edison
TCT (Alcatel) Alcatel 3 Gauss
TCT (Alcatel) T2 HANDYT2
TCT (Alcatel) TCL H900M HERO2
TCT (Alcatel) 8030B HERO2PLUS
TCT (Alcatel) Alcatel 1S HONG_KONG
TCT (Alcatel) Alcatel 3L Hong_Kong_Pro
TCT (Alcatel) M812C M812
TCT (Alcatel) Idol2 MINI S MIATA_lte
TCT (Alcatel) Alcatel 3X Milan
TCT (Alcatel) ALCATEL PIXI 4 (5) PIXI4_5_4G
TCT (Alcatel) 7045Y RIO5
TCT (Alcatel) Soul 4 SOUL4
TCT (Alcatel) TCL 10 5G UW Seattle_VZW
TCT (Alcatel) Alcatel 1S Tokyo
TCT (Alcatel) Alcatel 3X Plus TokyoPro
TCT (Alcatel) Alcatel 1 U3A_PLUS_4G
TCT (Alcatel) Alcatel 1X U5A_PLUS_4G
TCT (Alcatel) NeXT by Maxis (M1) VFD700
TCT (Alcatel) Alcatel 3X Venice
TCT (Alcatel) Vodafone 985N Vodafone985N
TCT (Alcatel) ALCATEL ONETOUCH IDOL 3 (5.5) idol3
TCT (Alcatel) 6039Y idol347
TCT (Alcatel) Alcatel_6055U idol4
TCT (Alcatel) SOL PRIME idol4s
TCT (Alcatel) SOL PRIME idol4s_skt
TCT (Alcatel) A3 mickey6
TCT (Alcatel) Flash Plus 2 shine_plus
TCT (Alcatel) Alcatel_6060C simba6_cricket
TESPRO Mayumi U1 Mayumi_U1
TG&Co. TG-L900S JGR
TG&Co. TG-L800S PHX
TONE TONE_e21 TONE_e21
Tabletop Tabletop_T2 Tabletop_T2
Tecno TECNO SPARK 7 TECNO-KF6m
Tecno TECNO SPARK 7 TECNO-KF6n
Tecno TECNO POVA 2 TECNO-LE7n
Tectoy TECTOY ON 128GB TokyoPro
TeloSystems TE590P TE590P_E
TeloSystems TE590P TE590P_O
TeloSystems TELO_TE610 TELO_TE610
TeloSystems TELO_TE610_O TELO_TE610_O
Teracube Teracube 2e Teracube_2e
Teracube Teracube_One Teracube_One
Tetratab TF10EA2 TF10EA2_Medical_1
Thuraya Thuraya X5-Touch X5-Touch
Tiwell AS_601L AS_601L
Trident A25 A25
Trident A53 PRO A53_PRO
Trimble Navigation TDC600/MM60 E7167
Trimble Navigation MM50 EE773X_4G
Trimble Navigation PeopleNet ConnectedTablet MS5
Turbonet ADR1776 ADR1776
Turbonet TN500A1 TN500A1
Turbonet TN502A1 TN502A1
Turbonet TurboTab E1 TN800A1
Turbonet TN502A1 access
Ulefone Armor 10 5G Armor_10_5G
Ulefone  Company Gotron – FIH Foxconn Marketing Name  Retail Branding Armor_11_5G
Ulefone Armor 2 Armor_2
Ulefone Armor 2S Armor_2S
Ulefone Armor_3 Armor_3
Ulefone Armor_3W Armor_3W
Ulefone Armor_3WT Armor_3WT
Ulefone Armor_5S Armor_5S
Ulefone Armor6 Armor_6
Ulefone Armor_6E Armor_6E
Ulefone Armor_6S Armor_6S
Ulefone Armor_7 Armor_7
Ulefone Armor_7E Armor_7E
Ulefone Armor_7E Armor_7E_Q
Ulefone Armor 7 Armor_7_Q
Ulefone Armor 8 Armor_8
Ulefone Armor 9 Armor_9
Ulefone Armor 9E Armor_9E
Ulefone Armor X Armor_X
Ulefone Armor_X2 Armor_X2
Ulefone Armor_X5 Armor_X5
Ulefone Armor X5 Pro Armor_X5_Pro
Ulefone Armor X5 Armor_X5_Q
Ulefone Armor X7 Pro Armor_X7_Pro
Ulefone Armor X7 Armor_X7_Q
Ulefone Power_3L Power_3L
Ulefone Power_3L_EEA Power_3L_EEA
Ulefone Power_6 Power_6
Ulefone T2 T2
Ulefone Armor_5 Ulefone_Armor_5
Umidigi BISON BISON
Umidigi BISON GT EEA BISON_GT
Umidigi BISON R EEA BISON_R
Umidigi F1 F1
Umidigi One Max E One_Max
Umidigi One Pro One_Pro
Umidigi Power Power
Umidigi Power_3_EEA Power_3
Umidigi S3_Pro S3_Pro
Umidigi S5_Pro_EEA S5_Pro
Umidigi Z2 Pro Z2_PRO
Unihertz Atom Atom
Unihertz Atom_L Atom_L
Unihertz Atom_XL Atom_XL
Unihertz Jelly2 Jelly2
Unihertz Jelly2_JP Jelly2_JP
Unihertz Titan Titan
Unihertz Titan pocket Titan_pocket
Unistrong UT10 UT10
Unistrong UT12 UT12
Unistrong UT12P UT12P
Unistrong UT30_EEA UT30
Unistrong UT32 UT32
Unistrong UT56 UT56
Unitech EA320 EA320
Unitech EA500Plus EA500Plus
Unitech EA510 EA510
Unitech EA630 EA630
Unitech HT730 HT730
Unitech PA760 PA760
Unitech TB85 TB85
Unitech WD200 wd200
Unnion Technologies HH25 HH25
Unnion Technologies UNSP7 UNSP7
Urovo DT40 DT40
Urovo DT50 DT50
Urovo P8100 P8100
Urovo RT40 SQ47
Urovo i6310 i6310
V2COM T2 ROCKY_T2
VALIFONE M790 M790
VALIFONE V200_EEA V200
VALIFONE V700 V700
VALIFONE V710 V710
Vernee M8 Pro M8_Pro
Vernee Active V1
Vernee V2 Pro V2_Pro
Vernee V3 V3
Vertex CS24 CS24
Vertex CS28 CS28
Vertex S1 GlocalMe_S1
Vertex Impress_Astra4G Impress_Astra4G
Vertex Impress Cube Impress_Cube
Vertex Impress Fire Impress_Fire
Vertex Impress_Flash Impress_Flash
Vertex Impress_Frost Impress_Frost
Vertex Impress_Luck4G_NFC Impress_Luck4G_NFC
Vertex Impress_Pluto Impress_Pluto
Vertex Impress_Rosso Impress_Rosso
Vertex Impress Stone Impress_Stone
Vertex Impress_Sunset4G Impress_Sunset4G
Vertex Impress Vega (4G) Impress_Vega
Vertex Impress_Vira Impress_Vira
Vertex Pro_P300_4G Pro_P300_4G
Vertex Pro_P300_4G Pro_P310_4G
Vertu ASTER  P ASTER_P
Vertu Aster T alexa
Vertu Signature Touch odin
Vertu Signature Touch titan
Vertu Constellation X tron
Vestel Venus Z40 Poyraz
Vestel VSP355g g55
Vestel VSP355s s55
Vivo vivo 1807 1807N
Vivo vivo 1818 1818N
Vivo vivo 1819 1819N
Vivo Y17 1902D
Vivo vivo 1907 1907
Vivo  vivo 1907 1907N
Vivo vivo 1910 1910N
Vivo vivo 1912 1912
Vivo vivo 1913 1913
Vivo vivo 1915 1915
Vivo vivo 1919 1919
Vivo vivo 1920 1920
Vivo V1930 1930
Vivo vivo 1933 1933
Vivo vivo 1935 1935
Vivo V1937 1937
Vivo vivo 1938 1938
Vivo X50 2004
Vivo vivo 2005 2005
Vivo X50 Pro 2006
Vivo I2009 2009
Vivo I2012 2012
Vivo V2022 2023
Vivo V2025 2025
Vivo V2027 2027
Vivo V2036 2036
Vivo V2040 2040
Vivo V2041 2041
Vivo V2046 2046
Vivo V2047 2047
Vivo V2061 2061
Vivo X5Pro V PD1421V
Vivo V1824A PD1824
Vivo V1836A PD1836
Vivo V1916A PD1916
Vivo V1922A PD1922
Vivo V1923A PD1923
Vivo V1924A PD1924
Vivo V1938CT PD1938
Vivo V1950A PD1950
Vivo V1955A PD1955
Vivo V1981A PD1981
Vivo V1986A PD1986
Vivo V2001A PD2001
Vivo V2005A PD2005
Vivo V2011A PD2011
Vivo V2020A PD2020
Vivo V2025A PD2024
Vivo V2046A PD2046
Vivo V2059A PD2047
Vivo V2049A PD2049
Vivo V2055A PD2055
Vivo V2056A PD2056
Vivo V2072A PD2072
Vivo V2080A PD2080
Vivo V2085A PD2085
Vivo V2118A PD2118
Vkworld S9 S9
Vodafone VDF 600 P809V50
Vodafone Smart ultra 6 P839V55
Vodafone 895 VF-895N
Vodafone Vodafone Smart E8 VFD511
Vodafone Smart N8 VFD610
Vodafone Smart_N9_Lite VFD620
Vodafone Smart ultra 7 VFD700
Vodafone Smart V8 VFD710
Vodafone Vodafone Smart N9 VFD720
Vodafone Vodafone Smart X9 VFD820
Vodafone Smart platinum 7 VFD900
Vsmart Joy 4 juniper
Walton Primo ZX2 GBL5805WA
Webfleet Solutions PRO 8475 triton
Wieppo Wieppo E1 Wieppo_E1
Wigor V5 V5
Wiko TOMMY2 T3931AC
Wiko WIM Lite T6901AC
Wiko WIM T9051AC
Wiko Tone E19 TONE_e19
Wiko TOMMY2 V3931AC
Wiko View3 Pro W-P611
Wiko WC300 WC300
Wiko WC300SN WC300SN
Wiko W_C200SN W_C200SN
Wiko W_C800 W_C800
Wiko C800 W_C800S
Wiko W_C860 W_C860
Wiko WIM i9051
Wiko WIM Lite p6901
Wiko Tommy2 Plus v3941
Wileyfox Swift 2 marmite
Wings W4 EEA W4
Wings W7 W7
Wings W7 Q W7_Q
Wings WX WX
Wiseasy WISENET5 WISENET5
Xiaomi Mi MIX 3 5G andromeda
Xiaomi Mi 10T apollo
Xiaomi MI 4LTE cancro
Xiaomi Mi 5s capricorn
Xiaomi Mi 10 Ultra cas
Xiaomi MI 9 cepheus
Xiaomi MIX 2 chiron
Xiaomi Mi 10 Pro cmi
Xiaomi Mi 11 Lite courbet
Xiaomi Mi9 Pro 5G crux
Xiaomi MI 8 dipper
Xiaomi MI  8  Pro equuleus
Xiaomi Mi 10T Lite gauguin
Xiaomi Mi 5 gemini
Xiaomi Mi 9 SE grus
Xiaomi MI Note 3 jason
Xiaomi MIX lithium
Xiaomi Redmi K30 Pro Zoom Edition lmipro
Xiaomi Mi 11 Pro mars
Xiaomi Mi 10 lite 5G monet
Xiaomi MI 5s Plus natrium
Xiaomi MIX 3 perseus
Xiaomi Mi 3 pisces
Xiaomi MIX 2S polaris
Xiaomi MI CC 9 pyxis
Xiaomi Mi 11 Lite 5G renoir
Xiaomi MI6 sagit
Xiaomi Mi Note2 scorpio
Xiaomi Mi 11 Ultra star
Xiaomi Mi 10S thyme
Xiaomi Mi Note 10 Lite toco
Xiaomi Mi Note 10 tucana
Xiaomi Mi 10 umi
Xiaomi MI  8  Explorer  Edition ursa
Xiaomi Mi 10 Lite zoom vangogh
Xiaomi Mi 11 venus
Xplore Technologies M6 M6
Yandex YNDX-000SB Amber
Yota Devices YotaPhone2 yotaphone2
Yumpingo YUMPINGO_1 YUMPINGO_1
ZMBIZI ZMBIZI ZMBIZI_Z1
ZOOMME M1 M1
ZOOMSMART LT600T LT600T
ZOOMSMART LT800 LT800
ZTE N940Sc N940Sc
ZTE NX505J NX505J
ZTE NX506J NX506J
ZTE NX508J NX508J
ZTE NX510J NX510J
ZTE NX512J NX512J
ZTE NX523J_V1 NX523J_V1
ZTE NX531J  NX531J
ZTE NX563J NX563J
ZTE NX569J NX569J
ZTE NX589J NX589J
ZTE NX591J NX591J
ZTE NX595J NX595J
ZTE NX601J NX601J
ZTE NX606J NX606J
ZTE Red Magic 5G lite NX651J-EEA
ZTE RED MAGIC 5G NX659J
ZTE Red Magic 5G NX659J-EEA
ZTE NX659J NX659J-RU
ZTE NX669J NX669J-EEA
ZTE NX669J NX669J-UN
ZTE Orange Neva jet Neva_jet
ZTE ZTE BLADE V9 P450F10
ZTE P609 P609
ZTE ZTE A2121E P618A01
ZTE BA602T P637T02
ZTE BA910 P653N31
ZTE ZTE Blade A7 2020 P662F02D
ZTE ZTE Blade A7 2020 P662F02_D1
ZTE ZTE Axon 11 P671A13
ZTE ZTE Blade V1000RU P671F20D
ZTE ZTE 2050 P671F50_D
ZTE ZTE Blade V 2020 P671F60
ZTE  ZTE A20 5G P725A02
ZTE ZTE Axon 11 5G  P725A11
ZTE ZTE Axon 11 5G P725A12
ZTE BLADE A506 P809F52
ZTE ZTE Blade A522 P817E53
ZTE BLADE V9 VITA P840F03
ZTE T85 P840F20
ZTE BV0850 P840S01
ZTE ZTE BV0870 P840V71
ZTE ZTE Blade V8 Arc P840V80
ZTE ZTE A2019G Pro P845A01
ZTE ZTE A2019 Pro P845A02
ZTE Blade V770 P852F52
ZTE ZTE Axon 10 Pro P855A01
ZTE ZTE Axon 10 Pro P855A02
ZTE ZTE Axon 10 Pro P855A03_NA
ZTE ZTE Axon 10 Pro P855A21
ZTE China Mobile Forerunner X1 P855A23
ZTE ZTE Axon 10s Pro 5G P865A02
ZTE ZTE Axon 30 5G P875A02
ZTE ZTE Blade A3 2020RU P932F50
ZTE A1 Alpha P963F01D
ZTE ZTE A7020 P963F03
ZTE ZTE 8010 P963F05
ZTE SoshPhone 3 SoshPhone_3
ZTE Telstra Tough Max 3 T86
ZTE BA910T T_P653N31
ZTE Vodafone Smart X9 VFD822
ZTE BA910 V_P653N31
ZTE S2010 V_P653S10
ZTE Blade A7S 2020-T Z6350T
ZTE P650 Pro Z6351O
ZTE P651 2021 Z6355O
ZTE Z6530M Z6530
ZTE A003ZT Z6650S
ZTE Blade X1 5G Z6750
ZTE ZR01 Z7750R
ZTE Z2020N3 Z8850K
ZTE 902ZT Z8851S
ZTE G718C ZTE-G718C
ZTE G719C ZTE-G719C
ZTE Q802C ZTE-Q802C
ZTE ZTE BLADE V0850 ZTE_BLADE_V0850
ZTE A1P ailsa
ZTE ZTE A2017U ailsa_ii
ZTE ZTE C2017 alice
ZTE A1R billy
ZTE ZTE A2018 candice
ZTE Zmax 3 dandelion
ZTE Z999 fujisan
ZTE Vodafone Smart ultra 6 msm8916_32
ZTE B2017G msm8952_64
ZTE A2015 msm8994
ZTE ZTE A2017 msm8996
ZTE Uhura noah
ZTE ZTE V890 sdm660_64
ZTE B2017G tulip
ZTE N9510 warplte
Zebra Customer Concierge 6000 CC610LC
Zebra Customer Concierge 600 CC610LN
Zebra Customer Concierge 6000 CC610PC
Zebra EC50 EC50
Zebra EC55 EC55
Zebra ET5X ET50E
Zebra ET5X ET50T
Zebra ET51 ET51L
Zebra ET51 ET51S
Zebra ET5X ET55E
Zebra ET5X ET55T
Zebra ET56 ET56L
Zebra ET56 ET56S
Zebra Zebra Technologies L10 L10AW
Zebra Zebra Technologies MC2200 MC2200
Zebra Zebra Technologies MC2700 MC2700
Zebra MC330K MC33
Zebra MC3300x MC3300x
Zebra MC3300x MC3300xC
Zebra MC330K MC33C
Zebra Zebra Technologies MC9300 MC93C
Zebra TC21 TC21
Zebra TC26 TC26
Zebra TC51 TC51
Zebra TC51 TC51HC
Zebra TC52 TC52
Zebra Zebra Technologies TC52x TC52X
Zebra TC55 TC55
Zebra TC56 TC56
Zebra TC57 TC57
Zebra Zebra Technologies TC57x TC57X
Zebra TC70x TC70x
Zebra TC72 TC72
Zebra Pollux TC75
Zebra TC75x TC75x
Zebra TC75xDF TC75xDF
Zebra TC77 TC77
Zebra TC8000 TC8000
Zebra Zebra Technologies TC8300 TC83BH
Zebra Zebra Technologies WT6300 WT63B0
Zebra MC36 cardhu
boxchip S900Plus S900Plus
bq Aquaris M5 Aquaris_M5
bq Aquaris M Aquaris_M55
bq Aquaris X5 Plus Aquaris_X5_Plus
bq Aquaris X bardock
bq Aquaris X Pro bardock-pro
bq Aquaris U chaozu
bq Aquaris C jeice
bq Aquaris V nappa
bq Aquaris Vs nappa_s
bq Aquaris V Plus raditz
bq Aquaris Vs Plus raditz_s
bq Aquaris U2 yamcha
bq Aquaris X2 zangya_sprout
bq Aquaris X2 PRO zangyapro_sprout
duraMOBI DK66 DK66
ecom Ex-Handy 10 Ex-Handy10
ecom Smart-Ex02 Smart-Ex02
fplus Life Tab Plus lifetabplus
iData iData T1 T1
iData iData_50 iData_50
iData iData 50 iData_50_EEA
iData iData_K1 iData_K1
iData iData K1 iData_K1_EEA
iDevice Uzbekistan Uzbekistan
iHunt S100ApeX S100ApeX
iHunt S60 Discovery Plus S60_Discovery_Plus
iHunt iHunt S90 Apex S90_Apex
iWaylink MC432 MC432A_GWL
iWaylink TC601A TC601A_GWL
iWaylink TC601B TC601B_GWL
iWaylink TC601 TC601_GWL
ioutdoor Polar3_EEA Polar3
kozen T5 T05
teXet TM-5081 TM-5081
teXet TM-5083 TM-5083
teXet TM-5084 TM-5084
teXet TM-5583 TM-5583
teXet Texet TM-5584 TM-5584
teXet TM-5702 TM-5702
teXet TM-5703 TM-5703


EviCypher Gold Medal 2021 of the Geneva International Inventions

EviCypher Gold Medal 2021 best invention worldwide gold medal Geneva International Inventions computer sciences software electronics electricity method communication Contactless Hardware Secrets Keeper

EviCypher Gold Medal 2021 best invention worldwide

With EviCypher, create your own encryption keys and exchange, contactless, in complete security with your correspondents.

 

Award 2021 EviCypher best invention worldwide with Gold medal of international inventions of Geneva [1].

 

Personal security should no longer be inAward 2021 EviCypher 200 Technology Gold Medal of the Geneva International Inventions Freemindtronic Andorra the hands of connected digital services, but in those of the individual. Indeed, it is because cybercriminals have access to digital systems that they can carry out their attacks. Freemindtronic’s EviCypher, invented by Jacques Gascuel, establishes an effective physical and digital barrier. It’s an “Air Gap” device that keeps secrets, but that’s not all.

 This individual encryption system gives the person back control of their digital data, from end to end, thanks to a secure NFC device. EviCypher is a physical vault of encryption keys unrelated to a computer system, it communicates with the latter on demand via a near field transmission protocol (NFC). EviCypher is backward compatible with Freemindtronic’s EviToken technology, allowing users of these products to maintain their usual digital services.

A Green tech technology that saves encrypted data for 40 years, without any source of electrical power. It is designed and manufactured without battery, connector, cloud and plastic. The device recovers energy through the NFC signal of the Android phone it is paired with. The latter serves only as an HMI & M2M terminal. Recyclable, the device is solid and waterproof. Extremely durable, it can be sold on the second-hand market after formatting back «factory configuration».

The NFC device works without error between -40° to + 85° C. It offers the user extreme portability of availability of their secrets anywhere, anytime and in any situation.

The solution is designed to preserve extreme anonymity, it leaves no trace of its use or of its user.

In 2019, 100 years after Hugo Alexander Koch’s invention of the first portable electromechanical encryption machine, Jacques Gascuel filed a patent on segmented key authentication. It is based on the principle of Kerckhoffs [2]  according to which the security of a crypto system must be based only on the secrecy of the key and not on that of the algorithm.

In March 2021, after 3 years of research and development, he innovated again by creating the first device dedicated to contactless encryption. The asymmetric and symmetric encryption key mechanism is secured by trust criteria defined at the discretion of an administrator and / or user.

The EviCypher solution allows end-to-end control of data transport, that is, from one EviCypher Card to another EviCypher Card. The encryption key is made up of multiple trust criteria, the origin of which is physical. It is possible to add up to 9 trust criteria to the 3 other criteria generated automatically during the pairing phase. For example, a trust criterion can be a configurable geographic area at the discretion of the person. To use the decryption or encryption key, you must be physically in the predefined zone and validate the 3 other initial trust criteria.

Advantageously, the system deprives cybercriminals of access to the encryption keys by a physical mechanism. Which also makes it a cybersecurity tool to fight identity theft. It can be used to prevent, for example, fraud attacks against the president and to protect against phishing attacks by email in a simple way.

EviCypher is designed to evolve and adapt to existing communication systems such as online or local email services via Thunderbird as well as all instant messaging including SMS & MMS. Unlike messaging systems around the world, messages remain encrypted by default and will be decrypted on demand.

EviCypher Card will be available early May 2021 for pre-order. It can store up to 200 keys for AES256 encryption and up to 4 RSA 2048 keys or 2 RSA 4096 keys.

It is also a password and PIN code manager for secure USB keys EviKey® and secure SSDs EviDisk® made in France by the Syselec Group. It is compatible with EviKeyboard, a virtual keyboard in NFC and Bluetooth version from Freemindtronic.

EviCypher Card is made in Andorra by Freemindtronic.

To download the press releases click HERE

[1] EviCypher dispositif NFC de chiffrement de données Médaille Or 2021 des inventions internationales – YouTube

[2] Auguste Kerckhoffs https://fr.wikipedia.org/wiki/Principe_de_Kerckhoffs

EviCypher Technology NFC hardware wallet encryption key manager password manager gold medal 2021 of the Geneva international inventions secret keeper management by Freemindtronic Andorra


Download press releases 

The following press releases are freely available for download click here


This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.