Category Archives: Technical News

Technical News: Your Source for the Latest Tech News and Trends

Stay ahead of the curve with Freemindtronic’s Technical News. We keep you up-to-date on the latest developments in the tech world, so you can make informed decisions about your business and personal life.

Our team of experienced journalists and analysts scours the web for the latest tech news, so you don’t have to. We provide in-depth coverage of a wide range of topics, including:

  • Electronics
  • Embedded Systems
  • Artificial intelligence
  • Cloud computing
  • Cybersecurity
  • Data science
  • Emerging technologies
  • FinTech
  • Gadgets and gear
  • Green technology
  • Healthcare technology
  • Internet of Things (IoT)
  • Mobile technology
  • Robotics
  • Software development
  • Telecom
  • Wearables
  • And more!

Why Read Technical News from Freemindtronic?

There are many reasons why designers, developers, and manufacturers of technological solutions should subscribe to Freemindtronic’s Technical News. Here are just a few:

  • Unique Industry Perspective: Our articles are written from the combined viewpoints of a designer, developer, and manufacturer, providing practical insights into the latest advancements in electronics, embedded systems, cybersecurity, and specialized security solutions (including counter-espionage).

  • Actionable Insights: We go beyond just reporting the news. We analyze how these developments can be applied to solve real-world problems in your field.

  • Stay Ahead of the Curve: Get in-depth coverage of a wide range of tech trends, allowing you to identify new opportunities and threats within the ever-evolving tech landscape.

  • Informed Tech Decisions: Make strategic choices about your technology purchases with unbiased reviews and analyses of the latest tech products and services.

  • Expert Industry Knowledge: Gain valuable insights from leading industry experts through exclusive interviews featured in our Technical News articles.

By subscribing to Freemindtronic’s Technical News, you’ll gain a vital edge in the competitive tech industry.

How to Get Technical News

There are several ways to get Technical informations. You can:

  • Subscribe to our email newsletter.
  • Follow us on social media.
  • Visit our website regularly.

Conclusion

Technical News is your essential resource for the latest tech news and trends. Subscribe to our email newsletter today to stay ahead of the curve.

In addition to the benefits listed above, subscribing to our newsletter gives you access to exclusive content, such as:

We also offer a variety of other resources, including:

No matter how you choose to stay up-to-date on the latest tech news, Freemindtronic has you covered.

Subscribe to our email newsletter today and start getting the information you need to succeed in the tech industry.

 

Remote activation of phones by the police: an analysis of its technical, legal and social aspects

Remote activation of phones by the police

Remote activation of phones by the police by Jacques Gascuel This article will be updated with any new information on the topic, and readers are encouraged to leave comments or contact the author with any suggestions or additions.

How does remote activation of phones by the police work?

An article of the bill on justice 2023-2027 raises controversy. It allows remote activation of mobile phones and capture of images or sound without the owner’s consent, for cases of organized crime or terrorism. How does this intelligence technique work? What are the conditions to use it? What are its advantages and disadvantages? What is the situation in other countries? We explain everything in this article.

Discover our other articles on digital security

What is the new bill on justice and why is it raising concerns about privacy?

The bill on justice is a legislative project. It aims to modernize and simplify justice in France. It covers civil, criminal, administrative and digital justice. It also strengthens the investigation and prosecution of serious offenses, such as terrorism and organized crime.

One measure authorizes remote activation of phones by the police for some investigations. Article 3 “An unfailing commitment to better prevent radicalization and fight against terrorism” of the bill includes this measure. It modifies article 706-102-1 of the code of criminal procedure. This article defines how to activate remotely any electronic device that can emit, transmit, receive or store data.

This measure raises privacy concerns because it lets the police access personal or professional data in phones without the owners’ or possessors’ consent or knowledge. It also lets the police locate, record or capture sounds and images from phones without notification or justification. This measure may violate fundamental rights and freedoms, such as privacy, confidentiality, dignity, presumption of innocence and right to a fair trial.

What is remote activation of phones and how does it work?

Remote activation of phones by the police is an intelligence technique that allows law enforcement agencies to access data or record sounds and images from phones without the consent or knowledge of the phone users. This technique can be used for criminal investigations or national security purposes.

To remotely activate phones, law enforcement agencies need three factors: compatibility, connectivity, and security of the phones. They need to be compatible with the software or hardware that enables remote activation. They need to be connected to a network or a device that allows remote access. They need to have security flaws or vulnerabilities that can be exploited or bypassed.

Law enforcement agencies can remotely activate phones by three methods: exploiting vulnerabilities, installing malware, or using spyware on phones. Exploiting vulnerabilities means taking advantage of security flaws or weaknesses in the phone’s operating system, applications, or protocols. Installing malware means putting malicious software on the phone that can perform unauthorized actions or functions. Using spyware means employing software or hardware that can monitor or control the phone’s activity or data.

By remotely activating phones, law enforcement agencies can access data such as contacts, messages, photos, videos, location, browsing history, or passwords. They can also record sounds and images such as conversations, ambient noises, or camera shots. They can do this in real time or later by retrieving the data from the phone’s memory or storage.

What is the French bill on remote activation of phones by the police and what are its implications?

The French bill on remote activation of phones by the police is a legislative text that was promulgated on 25 May 2021. It is part of the justice orientation and programming bill for 2023-2027, which aims to modernize the justice system and reinforce its efficiency and independence.

The bill introduces a new article in the code of criminal procedure, which allows the judge of liberties and detention (at the request of the prosecutor) or the examining magistrate to order the remote activation of an electronic device without the knowledge or consent of its owner or possessor for the sole purpose of locating it in real time. This measure can be applied for crimes or misdemeanors punishable by at least five years’ imprisonment, a fairly broad criterion.

The bill also allows the judge of liberties and detention (at the request of the prosecutor) or the examining magistrate to order the remote activation of an electronic device without the knowledge or consent of its owner or possessor for the purpose of recording sounds and images from it. This measure can be applied only for crimes relating to organized crime and terrorism.

These measures cannot concern parliamentarians, journalists, lawyers, magistrates and doctors, nor the defendants when they are in the judge’s office or with their lawyer.

The bill also specifies that the remote activation of an electronic device must be done in a way that does not alter its functioning or data, and that the data collected must be destroyed within six months after their use.

The bill aims to provide law enforcement agencies with more tools and information to prevent, investigate and prosecute crimes, especially in cases where phones are encrypted, hidden or destroyed. It also aims to harmonize the French legislation with other countries that have used or considered this technique, such as the United States, Germany, Italy, Israel, Canada, China, France, and the United Kingdom.

However, the bill also raises ethical and social challenges, as it involves a trade-off between security and privacy, as well as between effectiveness and legitimacy. It may undermine the right to respect for private life and the right to a fair trial, which are guaranteed by the European Convention on Human Rights and the French Constitution. It may also expose law enforcement agencies to legal or technical challenges or dangers, such as encryption technologies that can prevent or hinder remote activation. It may also create distrust or resistance among phone users or providers, who may use encryption technologies or legal remedies to protect their data or communications.

The bill has been criticized by several actors, such as lawyers, human rights defenders, digital rights activists, journalists and academics. They have denounced its lack of proportionality, necessity and oversight. They have also questioned its effectiveness and legitimacy. They have called for its withdrawal or amendment.

The bill is still subject to constitutional review by the Constitutional Council before its final promulgation.

How did the Senate vote on the bill and where to find the official sources?

The Senate adopted this measure on October 20, 2021, with some amendments. The Senate voted in favor of this measure by 214 votes against 121. The Senate also added some safeguards to this measure, such as limiting its duration to four months renewable once and requiring prior authorization from an independent judge.

The National Assembly still has to examine the bill before adopting it definitively. The National Assembly may approve, reject or modify this measure. The final text may differ from the one that the Senate voted.

The examination of the bill by the National Assembly will start on December 6, 2021. You can follow the progress of the bill on the website of the National Assembly. You can also find the official text of the bill and the report of the Senate on their respective websites. You can also consult the website of the Ministry of Justice for more information on the bill and its objectives.

What are the benefits and risks of remote activation of phones?

This technique can affect citizens’ and suspects’ behavior in different ways.

On one hand, it can deter people from serious offenses. It exposes them to a higher risk of detection and identification. It reduces their incentives for criminal activities.

On the other hand, it can also make people more cautious or paranoid. It increases their uncertainty and fear. It leads them to avoid electronic devices, encrypt their communications, or use countermeasures such as jamming devices.

This technique can also impact public safety and security positively and negatively.

On one hand, it can improve the efficiency and effectiveness of law enforcement agencies. It provides them with more information and evidence. It helps them prevent, investigate and prosecute crimes.

On the other hand, it can also pose risks for human rights and civil liberties. It allows intrusive and covert surveillance. It violates privacy, confidentiality and dignity. It can also be subject to abuse, misuse or error by law enforcement agents or hackers.

Finally, it can create a feeling of insecurity and mistrust towards institutions, which can access personal or professional data in phones. It can also harm respect for presumption of innocence by placing permanent suspicion on people targeted by this technique. It can also infringe on protection of journalistic sources or right to information by discouraging whistleblowers or witnesses from speaking freely. It can finally encourage people concerned to adopt avoidance or circumvention strategies, such as changing phones regularly, using encrypted applications or switching to airplane mode.

These strategies can reduce the actual effectiveness of this technique for preventing terrorism and organized crime.

What are the arguments in favor of remote activation of phones?

Some people support this technique because they think it has several advantages for law enforcement and public security.

How can remote activation of phones violate privacy and data protection?

One of the main arguments against this technique is that it can violate privacy and data protection for individuals and groups. Privacy and data protection are fundamental rights recognized by international standards and laws. They ensure human dignity and autonomy.

Remote activation of phones violates privacy and data protection by letting law enforcement agencies access personal or professional data without the owners’ or possessors’ consent or knowledge. It also lets law enforcement agencies access sensitive or confidential data without notification or justification. It also lets law enforcement agencies access excessive or irrelevant data without limitation or proportionality.

For example, remote activation of phones could let the police access medical records, financial transactions, political opinions, religious beliefs, sexual preferences, or other intimate information on a device or a communication. It could also let the police access information that is not related to the investigation or that is out of scope on a device or a communication. It could also let the police access information that is not necessary or appropriate for the investigation or that is disproportionate to the seriousness of the offense on a device or a communication.

How can remote activation of phones improve access to justice and evidence?

Another argument in favor of this technique is that it can improve access to justice and evidence for law enforcement agencies and victims of crimes. Justice and evidence ensure the rule of law and the protection of rights.

Remote activation of phones improves access to justice and evidence by letting law enforcement agencies obtain information that is otherwise inaccessible or difficult to obtain. It also lets law enforcement agencies obtain information that is more reliable and accurate than other sources. It also lets law enforcement agencies obtain information that is timelier and more relevant than other sources.

For example, remote activation of phones could help the police access data that is encrypted or password-protected on a device or a communication. It could also help the police access data that is authentic and verifiable on a device or a communication. It could also help the police access data that is up-to-date and pertinent on a device or a communication.

What are the arguments against remote activation of phones?

Some people oppose this technique because they think it has several disadvantages for human rights and civil liberties.

How can remote activation of phones violate privacy and data protection?

One of the main arguments against this technique is that it can violate privacy and data protection for individuals and groups. Privacy and data protection are fundamental rights recognized by international standards and laws. They ensure human dignity and autonomy.

Remote activation of phones violates privacy and data protection by letting law enforcement agencies access personal or professional data without the owners’ or possessors’ consent or knowledge. It also lets law enforcement agencies access sensitive or confidential data without notification or justification. It also lets law enforcement agencies access excessive or irrelevant data without limitation or proportionality.

For example, remote activation of phones could let the police access medical records, financial transactions, political opinions, religious beliefs, sexual preferences, or other intimate information on a device or a communication. It could also let the police access information that is not related to the investigation or that is out of scope on a device or a communication. It could also let the police access information that is not necessary or appropriate for the investigation or that is disproportionate to the seriousness of the offense on a device or a communication.

How can remote activation of phones undermine the presumption of innocence and the right to a fair trial?

Another argument against this technique is that it can undermine the presumption of innocence and the right to a fair trial for individuals and groups. The presumption of innocence and the right to a fair trial are fundamental rights recognized by international standards and laws. They ensure justice and accountability.

Remote activation of phones undermines the presumption of innocence and the right to a fair trial by letting law enforcement agencies access data that they can use against individuals or groups without any legal basis or due process. It also lets law enforcement agencies access data that they can manipulate or falsify by law enforcement agents or hackers. It also lets law enforcement agencies access data that individuals or groups can challenge or contest.

For example, remote activation of phones could let the police access data that they can incriminate individuals or groups without any warrant or authorization from a judge. It could also let the police access data that they can alter or corrupt by law enforcement agents or hackers. It could also let the police access data that individuals or groups can dispute or refute.

How can remote activation of phones create a risk of abuse and misuse by the authorities?

Another argument against this technique is that it can create a risk of abuse and misuse by the authorities for individuals and groups. Abuse and misuse are illegal or unethical actions that violate rights and obligations. They damage trust and legitimacy.

Remote activation of phones creates a risk of abuse and misuse by the authorities by letting law enforcement agencies access data that they can use for purposes other than those authorized or intended. It also lets law enforcement agencies access data that they can share or disclose to third parties without any oversight or control. It also lets law enforcement agencies access data that they can retain or store for longer than necessary or permitted.

For example, remote activation of phones could let the police access data that they can use for political, personal, commercial, or other interests on a device or a communication. It could also let the police access data that they can transfer or leak to other agencies, organizations, media, or individuals on a device or a communication. It could also let the police access data that they can keep or archive for indefinite periods on a device or a communication.

What are the alternatives and safeguards for remote activation of phones?

Some people suggest that there are alternatives and safeguards for remote activation of phones that can balance security and privacy.

What are the existing legal tools to access phone data with judicial authorization?

One of the alternatives for remote activation of phones is to use existing legal tools to access phone data with judicial authorization. Judicial authorization is a legal requirement that ensures respect for rights and obligations. An independent and impartial judge grants it after evaluating the necessity and proportionality of the request.

Existing legal tools to access phone data with judicial authorization include search warrants, wiretaps, geolocation orders, data requisitions, and international cooperation agreements. These tools let law enforcement agencies obtain information from phones in a lawful and transparent manner. They also provide legal protection and recourse for individuals and groups.

For example, search warrants let law enforcement agencies physically seize phones and extract data from them with judicial authorization. Wiretaps let law enforcement agencies intercept calls and messages from phones with judicial authorization. Geolocation orders let law enforcement agencies track the location of phones with judicial authorization. Data requisitions let law enforcement agencies request data from phone operators or service providers with judicial authorization. International cooperation agreements let law enforcement agencies exchange data with foreign authorities with judicial authorization.

What are the principles and conditions for remote activation of phones according to the bill?

One of the safeguards for remote activation of phones is to follow the principles and conditions for remote activation of phones according to the bill. The bill on justice sets some rules and limits for this technique to prevent abuse and misuse.

The principles and conditions for remote activation of phones according to the bill include:

  • The technique can only be used for terrorism and organized crime investigations.
  • An independent judge who authorizes it must supervise the technique. The technique can only last for four months renewable once.
  • The technique must respect necessity, proportionality, subsidiarity, and legality.
  • Parliament and independent authorities must oversee and control the technique.
  • Experts and stakeholders must evaluate and review the technique.

These principles and conditions aim to ensure a reasonable and accountable use of this technique. They also aim to protect the rights and interests of individuals and groups.

What are the possible ways to limit or challenge remote activation of phones?

Another safeguard for remote activation of phones is to use possible ways to limit or challenge remote activation of phones by individuals or groups. These ways can help protect rights and interests, as well as ensure accountability and transparency.

Some of the possible ways to limit or challenge remote activation of phones are:

  • Using encryption technologies:

    Encryption technologies can make data on phones unreadable or inaccessible to law enforcement agencies, even if they remotely activate them. Encryption technologies can also protect communications from law enforcement agencies’ interception or recording. For example, using end-to-end encryption apps, such as Signal or WhatsApp, can prevent law enforcement agencies from accessing messages or calls on phones.

  • Using security features:

    Security features can prevent law enforcement agencies from installing or activating software or applications on phones that enable remote activation. Security features can also detect or remove software or applications that enable remote activation. For example, using antivirus software, firewalls, passwords, biometrics, or VPNs can prevent law enforcement agencies from accessing phones.

  • Using legal remedies:

    Legal remedies can let individuals or groups contest or oppose remote activation of phones by law enforcement agencies. Legal remedies can also let individuals or groups seek compensation or redress for damages caused by remote activation of phones. For example, using judicial review, administrative appeals, complaints, lawsuits, or human rights mechanisms can challenge law enforcement agencies’ actions or decisions regarding remote activation of phones.

How does this technique compare with other countries?

Law enforcement agencies in other countries, such as the United States, Germany, Italy, Israel, Canada, China, France, and the United Kingdom, have used or considered remote activation of phones by the police. This technique is not new or unique. However, the legal framework, the technical methods, and the ethical and social implications of this technique vary from country to country..

How does remote activation of phones by the police work in different countries?

Remote activation of phones by the police is an intelligence technique that varies from country to country. It depends on the legal framework, the technical methods and the ethical issues of each country. Here are some examples of how it works in different countries.

  • In the United States, this technique is known as “roving bugs” or “mobile device tracking”. The Foreign Intelligence Surveillance Act (FISA) authorizes it for national security purposes and Title III of the Omnibus Crime Control and Safe Streets Act for criminal investigations. It requires a court order based on probable cause and limited in scope and duration. It can locate or record sounds and images from phones. It can be done by installing malware or exploiting vulnerabilities on phones.
  • In Germany, this technique is known as “Quellen-TKÜ” or “source telecommunications surveillance”. The Code of Criminal Procedure and the Telecommunications Act regulate it for criminal investigations and the Federal Intelligence Service Act for national security purposes. It requires a court order based on reasonable suspicion and proportionality. It can intercept communications from phones. To do so, it installs software or uses spyware on phones.
  • In Italy, this technique is known as “Trojan horse” or “spyware”. The Code of Criminal Procedure and the Data Protection Code regulate it for criminal investigations. It requires a court order based on serious indications of guilt and necessity. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.
  • In Israel, this technique is known as “IMSI catchers” or “stingrays”. The Wiretapping Law and the Privacy Protection Law regulate it for criminal investigations and the Security Service Law for national security purposes. It requires a court order based on reasonable grounds and proportionality. It can locate or intercept communications from phones. To do so, it uses devices that mimic cell towers and trick phones into connecting to them.
  • In Canada, this technique is known as “cell site simulators” or “IMSI catchers”. The Criminal Code and the Charter of Rights and Freedoms regulate it for criminal investigations. It requires a court order based on reasonable grounds and proportionality. It can locate or intercept communications from phones. To do so, it uses devices that mimic cell towers and trick phones into connecting to them.
  • In China, this technique is known as “network interception” or “remote control”. The Criminal Procedure Law and the Cybersecurity Law regulate it for criminal investigations and national security purposes. It does not require a court order but only an approval from a higher authority. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.
  • In France, real-time geolocation is regulated by the Criminal Procedure Code and the Intelligence Law for criminal and national security investigations. Article 706-102-1 of the Criminal Procedure Code allows police officers and agents to use a technical device to access, record, store and transmit computer data without the consent of the persons concerned. This requires a court order based on serious reasons and proportionality. Article 230-32 of the Criminal Procedure Code states that “Any technical means for real-time location, throughout the national territory, of a person, without his consent, a vehicle or any other object, without the consent of its owner or possessor, may be used if this operation is required by necessity: “. This also requires a court order based on serious reasons and proportionality.
  • In the United Kingdom, this technique is known as “equipment interference” or “hacking”. The Investigatory Powers Act regulates it for criminal investigations and national security purposes. It requires a warrant based on necessity and proportionality. It can access data or record sounds and images from phones. To do so, it installs software or uses spyware on phones.

How does remote activation of phones by the police raise ethical and social challenges?

Remote activation of phones by the police raises ethical and social challenges in different contexts and situations because it involves a trade-off between security and privacy, as well as between effectiveness and legitimacy.

Security versus privacy

On one hand, remote activation of phones by the police can enhance security by providing law enforcement agencies with more information and evidence to prevent, investigate, and prosecute crimes. It can also deter criminals from using phones to plan or commit crimes.

On the other hand, remote activation of phones by the police can undermine privacy by letting law enforcement agencies access personal or professional data without consent or knowledge. It can also violate human rights and civil liberties by letting law enforcement agencies monitor or record sounds and images without notification or justification.

Effectiveness versus legitimacy

On one hand, remote activation of phones by the police can be effective by increasing the chances of finding relevant information or evidence on phones that may be encrypted, hidden, or destroyed. It can also be efficient by reducing the costs and risks of physical surveillance or interception.

On the other hand, remote activation of phones by the police can be illegitimate by violating the legal framework, the technical methods, or the oversight and control mechanisms that regulate this technique in each country. It can also be counterproductive by creating distrust or resistance among phone users or providers, who may use encryption technologies or legal remedies to protect their data or communications.

The ethical and social challenges of remote activation of phones by the police depend on the legal framework, the technical methods, and the oversight and control mechanisms that regulate this technique in each country. They also depend on the cultural and political values, the public opinion, and the media coverage that shape the perception and acceptance of this technique in each country.

Some of the ethical and social challenges of remote activation of phones by the police are how to :

  • balance security and privacy in the use of this technique?
  • ensure compliance with fundamental rights and freedoms in the use of this technique?
  • prevent abuse, misuse, or error in the use of this technique?
  • provide legal protection and recourse for individuals or groups affected by this technique?
  • ensure accountability and transparency in the use of this technique?
  • evaluate the effectiveness and legitimacy of this technique?
  • foster trust and cooperation between law enforcement agencies and phone users in the use of this technique?

What is the impact of encryption technologies on this technique?

Encryption technologies are methods or systems that make data unreadable or inaccessible to unauthorized parties. Encryption technologies can have a significant impact on remote activation of phones by the police, as they can make this technique more difficult, risky, or controversial.

How can encryption technologies make remote activation of phones by the police more difficult or impossible?

Encryption technologies can make remote activation of phones by the police more difficult or impossible by preventing law enforcement agencies from accessing data or communications on phones, even if they remotely activate them. Encryption technologies can also protect phones from malware or spyware that enable remote activation.

For example, end-to-end encryption, which some apps such as Signal or WhatsApp use, can prevent law enforcement agencies from intercepting or reading messages or calls on phones, as only the sender and the receiver have the keys to decrypt them. Device encryption, which some operating systems such as iOS or Android use, can prevent law enforcement agencies from extracting or viewing data on phones, as they require a password or a biometric authentication to unlock them.

How can encryption technologies make remote activation of phones by the police more risky or harmful?

Encryption technologies can make remote activation of phones by the police more risky or harmful by exposing law enforcement agencies to legal or technical challenges or dangers. Encryption technologies can also harm phone users by compromising their security or privacy.

For example, breaking encryption, which law enforcement agencies sometimes do to access data or communications on phones, can expose them to legal challenges, as it may violate laws or regulations that protect encryption or privacy. It can also expose them to technical dangers, as it may weaken the security of phones or networks and create vulnerabilities for hackers or criminals. Hacking encryption, which law enforcement agencies sometimes do to install malware or spyware on phones, can harm phone users by compromising their security or privacy, as it may allow unauthorized access to their data or functions.

How can encryption technologies make remote activation of phones by the police more controversial or unacceptable?

Encryption technologies can make remote activation of phones by the police more controversial or unacceptable by raising ethical and social issues or debates. Encryption technologies can also create conflicts or tensions between law enforcement agencies and phone users or providers.

For example, undermining encryption, which law enforcement agencies sometimes request to facilitate remote activation of phones, can raise ethical and social issues or debates, as it may affect human rights and civil liberties, such as privacy, confidentiality, dignity, presumption of innocence, and right to a fair trial. It can also create conflicts or tensions between law enforcement agencies and phone users or providers. They may have different interests or values regarding encryption and security.

How does EviCore NFC HSM technology developed by Freemindtronic offer a high level of protection for phone users?

Remote activation of phones by the police can be facilitated by exploiting security flaws, installing malware, or requesting backdoors in encryption technologies. However, some encryption technologies may be resistant to these measures and offer a higher level of protection for phone users. One of them is the EviCore NFC HSM technology developed by Freemindtronic.

This technology lets users create their own encryption keys in a random way and store them in a physical device that communicates with the phone via NFC (Near Field Communication). The device also lets users define their own trust criteria that must be met to use the keys or their segments. The encryption is done in post-quantum AES-256 mode from either a device compatible with the EviCore NFC HSM technology or from an encrypted enclave in the phone created in the Key chain (Apple) or the Key store (Android) via the EviCore HSM OpenPGP technology. The encryption keys are segmented and superior to 256 bits. Moreover, they are physically externalized from computer systems. Everything is designed by Freemindtronic to effectively fight against espionage and corruption of telephone, computer, communication and information systems. Finally, without a server, without a database, even in air gap and airplane mode works EviCore NFC HSM or EviCore HSM OpenPGP technology. Everything is designed to work in volatile memory to leave no trace in telephone and computer systems.

This technology offers a high level of security and privacy for phone users who want to protect their data from unauthorized access, including by the police. It also offers a high level of performance and usability for phone users who want to encrypt or over-encrypt all types of messaging in the world, including SMS and MMS. It also works with other applications that use encryption, such as email, cloud storage or blockchain.

Furthermore, this technology is designed to be totally anonymous, autonomous, unconnected, without a database, without collecting any information of any kind on the identity of the user, nor on the hardware, nor on the terminals used. The technology is designed to be totally isolated and totally independent of the security of the terminal used whether it is connected or not. Freemindtronic does not keep the unique pairing keys for each NFC HSM device. And even if it did, the user at installation will automatically generate segmented complementary keys for encryption with administrator and user passwords. Each NFC device has a unique 128-bit signature dedicated to fighting against counterfeiting of NFC devices. It is also used as a key segment. The secret stored in eprom memories or in enclaves of the phone and/or computer can be individually secured by other segmented keys characterized by additional trust criteria such as a geozone, a random hexadecimal code via an existing or generated QR code or Bar Code via EviCore HSM. It is therefore physically impossible for Freemindtronic but under judicial assignment to decrypt data encrypted via EviCore HSM technologies even with a quantum computer.

Conclusion

Remote activation of phones by the police is an intelligence technique. It aims to fight terrorism and crime by accessing data or sounds and images from phones without consent or knowledge. Law enforcement agencies in various countries have used or considered this technique. For example, France, the United States, Germany, Italy, Israel, Canada, China, and the United Kingdom. However, this technique raises technical, legal, ethical, and social challenges. They need to be addressed.

On the technical side, remote activation of phones by the police depends on three factors: compatibility, connectivity, and security of the phones. It can be done by three methods: exploiting vulnerabilities, installing malware, or using spyware on phones.For example, EviCore NFC HSM technology developed by Freemindtronic protects data and communications on phones from remote activation by the police. Encryption technologies can make this technique more difficult or impossible by preventing law enforcement agencies from accessing data or communications on phones, even if they remotely activate them.

On the legal side, remote activation of phones by the police requires a legal framework that regulates its use and scope. Laws or regulations can authorize it and specify the conditions and criteria for its application. Legal remedies can also challenge it and contest or oppose its validity or legality.

On the ethical side, remote activation of phones by the police involves a trade-off between security and privacy, as well as between effectiveness and legitimacy. It can enhance security by providing more information and evidence to law enforcement agencies to prevent, investigate, and prosecute crimes. It can also undermine privacy by letting law enforcement agencies access personal or professional data without notification or justification.

On the social side, remote activation of phones by the police raises issues or debates that affect human rights and civil liberties. For example, privacy, confidentiality, dignity, presumption of innocence, and right to a fair trial. It can also create conflicts or tensions between law enforcement agencies and phone users or providers, as they may have different interests or values regarding encryption and security.

Therefore, remote activation of phones by the police is a complex and controversial technique that requires a careful and balanced approach that respects the rights and interests of all parties involved. The French bill on remote activation of phones by the police and the EviCore NFC HSM Open PGP technology developed by Freemindtronic illustrate the complex and evolving relationship between intelligence and encryption in the digital age. They raise questions about finding a balance. It is between security and privacy, between public interest and individual rights, between innovation and regulation.

: According to Okta, privacy is the right to control how your information is viewed and used, while security is protection from threats or dangers (https://www.okta.com/identity-101/privacy-vs-security/).

: According to Carnegie Endowment for International Peace, finding a balance between security and privacy requires addressing technical, legal, and social questions (https://carnegieendowment.org/2019/09/10/moving-encryption-policy-conversation-forward-pub-79573).

: According to Springboard, finding a balance between innovation and regulation requires cooperation among stakeholders and respect for human rights (https://www.springboard.com/blog/cybersecurity/privacy-vs-security-how-to-balance-both/).

Protect Meta Account Identity Theft with EviPass and EviOTP

A man holding a resident card of a person in Andorra, wearing a badge of an identity card of a Spanish woman and surrounded by other identity cards of different countries including France and on his left a hacker in front of his computer with a phone

Protect Meta Account identity theft by Jacques Gascuel This article will be updated with any new information on the topic, and readers are encouraged to leave comments or contact the author with any suggestions or additions.

How to Spot and Avoid Phishing Attacks on Meta

Have you ever wondered what would happen if someone hacked your Meta account and used it for malicious purposes? Identity theft is a serious threat that affects millions of internet users worldwide. It can harm your reputation, finances, privacy, and even your safety. That’s why it’s essential to protect your Meta account from identity theft.

Articles Crypto Currency Digital Security EviSeed EviVault Technology News

Enhancing Crypto Wallet Security: How EviSeed and EviVault Could Have Prevented the $41M Crypto Heist

Articles EviVault Technology News Uncategorized

Why choose a Cold Wallet NFC HSM to secure your cryptocurrencies?

Articles Digital Security EviVault Technology NFC HSM technology Technical News

EviVault NFC HSM vs Flipper Zero: The duel of an NFC HSM and a Pentester

Articles EviVault Technology Phishing

Cryptbot malware steals data cryptocurrencies

Protecting Your Meta Account from Identity Theft

Meta is a family of products that includes Facebook, Instagram, Messenger, WhatsApp, Oculus, and more. These products allow you to connect with people, share content, play games, shop online, and explore new realities. However, they also store a lot of personal information that can be exploited by hackers if you don’t secure your account properly.

Identity theft of online accounts is a growing problem that affects many Meta users. Hackers use various techniques to illegally obtain user credentials and two-factor authentication information. This results in financial, legal, and psychological consequences for the victims, who find themselves deprived of their digital identity. In this article, we explain how to protect your Meta account from identity theft, with a focus on the security of your passwords and your two-factor authentication. We also present real testimonials of identity theft on Meta, which illustrate the seriousness of this problem and the importance of protecting yourself. Finally, we introduce you to an innovative solution that allows you to manage OTP tokens (One Time Password) securely and contactlessly thanks to an NFC device (Near Field Communication).

Identity theft on meta how to protect your meta account from identity theft by Freemindtronic from Andorra

Creating Strong and Unique Passwords to Safeguard Your Meta Account

To enhance the security of your Meta account, it’s crucial to create strong and unique passwords. A strong password is the first line of defense against identity theft. Use a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using obvious personal information, such as your name or date of birth. Furthermore, avoid reusing the same password on multiple accounts, as this makes it easier for hackers to gain unauthorized access. Consider using a secure password manager such as EviPass, offered by Freemindtronic, to store your passwords securely and regularly check their integrity.

Enhancing Meta Account Security with Two-Factor Authentication (2FA)

Enhancing the security of your Meta account is crucial, and enabling two-factor authentication (2FA) is an effective way to achieve that. In the security and login settings of your Meta account, you have access to a range of 2FA methods. Each method has its own advantages and considerations, empowering you to select the most suitable option for your needs.

Table: Comparison of Different 2FA Methods on Meta

2FA MethodAdvantagesDisadvantages
Security KeyHighly secure, doesn’t require internet connectionExpensive, susceptible to loss or forgetfulness, requires USB or NFC port
Authentication AppMore secure than SMS, compatible with multiple accountsRisk of smartphone loss or theft, requires prior installation
SMSSimple and quickRisk of phone number hacking, reliance on mobile network
Authentication ApplicationsEnhanced security, generates secure 2FA codesRisk of smartphone loss or theft
EviPassHighly secure, contactless, compatible with multiple accounts, no prior installation requiredRequires purchase of EviPass device

The Ultimate Solution – EviPass and EviOTP for Meta Account Protection

EviPass, powered by Freemindtronic’s EviOTP technology, offers the best of both worlds with its PassCypher product. PassCypher combines two technologies: EviPass Hardware and/or Digital Manager, compatible with Freemindtronic’s NFC HSM devices. It also incorporates the EviOTP technology, a secret key manager for OTP and HOTP, enabling the generation of OTP codes. With PassCypher, you can experience highly secure and contactless 2FA. It eliminates the need for prior installation and provides a seamless user experience. By securely storing and generating OTP secret keys using EviOTP technology, PassCypher ensures end-to-end authentication. Please note that the PassCypher device, which includes EviPass and EviOTP technologies, needs to be purchased to utilize this comprehensive solution.

Being Vigilant Against Phishing Attacks to Secure Your Meta Account

Hackers often use phishing techniques to trick you into disclosing your credentials. Be vigilant about suspicious emails or messages asking for your credentials or personal information. Do not click on dubious links and always check the website address before entering your information. If you receive a suspicious message claiming to be from Meta, report it immediately.

Regularly Updating Security Information for Meta Account Protection

To maintain optimal security, it is important to update your security information regularly, such as your recovery email address and phone number. This information will allow you to regain access to your account in case of identity theft or password forgetfulness. Make sure you choose secure and easily accessible recovery information that only you have access to.

Implementing EviOTP for Enhanced Meta Account Security against Identity Theft

One innovative solution for securing your Meta account is EviOTP by Freemindtronic. EviOTP utilizes contactless technology and NFC devices to securely manage OTP tokens (One Time Passwords). By enabling two-factor authentication with EviOTP, you are required to provide an additional code along with your password when logging into your Meta account. This method offers optimal protection against phishing attacks and identity theft, as your OTP tokens are stored and encrypted within the NFC device, physically isolated from your computer and phone systems.

Table: Advantages and disadvantages 2FA

2FA MethodProsCons
SMSSimple and fastRisk of hacking your phone number, dependence on mobile network
Authentication AppMore secure than SMS, compatible with multiple accountsRisk of losing or stealing your smartphone, requires prior installation
Security KeyVery secure, does not require internet connectionExpensive, easy to lose or forget, requires USB or NFC port
EviOTPVery secure, contactless, compatible with multiple accounts, does not require prior installationRequires purchasing the EviOTP device

Considering the different options available, each 2FA method offers unique benefits and drawbacks. Security keys provide a high level of security but may be costly and prone to loss. Authentication apps offer increased security and compatibility, but the risk of smartphone theft exists. SMS codes are simple and fast but carry the risk of phone number hacking. Authentication applications like Google Authenticator or Microsoft Authenticator generate secure codes but are still susceptible to smartphone loss. Finally, EviOTP stands out as a highly secure, contactless option compatible with multiple accounts, although it requires purchasing the EviOTP device.

EviOTP – The Ultimate 2FA Solution

For the ultimate 2FA solution, EviOTP by Freemindtronic offers unmatched security and convenience. EviOTP combines contactless technology, compatibility with multiple accounts, and a seamless user experience. It eliminates the need for prior installation and configuration, making it ready to use right out of the box. By securely storing and generating OTP secret keys, EviOTP ensures end-to-end authentication. To benefit from EviOTP, please note that the EviOTP device must be purchased.

To enable two-factor authentication with Contactless OTP Manager, you must follow these steps:

  1. Download and install the PassCypher application embedding the EviPass technology and especially EviOTP on your NFC-compatible Android mobile device from the Google Play Store.
  2. Log in to your Meta account on a computer or mobile browser.
  3. Go to the security and login settings of your Meta account and click on “Use two-factor authentication”.
  4. Choose the option “Authentication application” and follow the instructions on the screen.
  5. Open the PassCypher application on your mobile device and bring your Contactless OTP Manager device close to the phone to scan the QR code displayed by Meta.
  6. Enter the six-digit code generated by Contactless OTP Manager in the “Security Code” field on Meta and click on “Next”.
  7. Save the recovery codes provided by Meta in case of loss or theft in your Contactless OTP Manager device that you also use to generate codes to authenticate yourself.

Beware of phishing attacks

Hackers often use phishing techniques to trick you into disclosing your credentials. Be vigilant about suspicious emails or messages asking for your credentials or personal information. Do not click on dubious links and always check the website address before entering your information. If you receive a suspicious message claiming to be from Meta, report it immediately.

Update your security information regularly

To maintain optimal security, it is important to update your security information regularly, such as your recovery email address and phone number. This information will allow you to regain access to your account in case of identity theft or password forgetfulness. Make sure you choose secure and easily accessible recovery information only by you.

Real Testimonials of Meta Account Identity Theft and Steps to Protect Yourself

Identity theft is a phenomenon that affects more and more internet users worldwide. According to a study by the Federal Trade Commission, consumers reported losing more than $5.8 billion to fraud in 2021, an increase of more than 70% over the previous year. Among the most common types of fraud are identity theft scams, which aim to steal the login information of users on various Meta products, such as Instagram, Facebook, Messenger, WhatsApp or Oculus. These information can then be used to harm the reputation, finances or privacy of the victims.

Finding real testimonials of identity theft on Meta is not always easy. Indeed, victims may feel ashamed of being fooled, afraid of the consequences or simply not know who to turn to report the problem or ask for help. That’s why we have gathered in this section some true and verified stories that illustrate the different possible scenarios of identity theft on Meta. These stories are presented in the form of small short paragraphs that are easy to read and explain how the victims discovered the hacking, how they reacted and what were the consequences.

We hope that these testimonials will help you to become aware of the risks associated with identity theft on Meta and to adopt good practices to protect your personal data online. If you are a victim or witness of identity theft, do not hesitate to report the problem to the competent authorities and ask for help from specialized services.

  • Marie found June 6, 2021 Marie’s Instagram account was hacked by scammers. They tricked her into giving them her login information. They used her account to ask her followers for money. Marie reported the hack to Instagram and warned her contacts. She finally got her account and her 2,000 followers back. She learned to be more careful online.
  • A woman from France had her Instagram account hacked by scammers who tried to extort money from her followers. She contacted Meta, but received no response. She then contacted a cybersecurity expert who helped her recover her account and her 6,000 followers.
  • Muriel, a regular user of Meta, was a victim of identity theft on her personal account as well as on her Meta Business Manager account. Despite activating two-factor authentication, hackers managed to bypass security measures, leaving Muriel in a difficult situation. Unable to receive the necessary help from Meta, she shared her experience on social networks, hoping to find a contact within Meta who could help her solve this frustrating problem.
  • In December 2021, Meta filed a lawsuit against the bad actors who allegedly created over 39,000 websites that resembled the login pages of Instagram, Facebook, Messenger, and WhatsApp. The defendants used these websites to deceive users and collect their login information. They also infringed Meta’s trademarks by using its logos and names on their fake pages.
  • In February 2023, a couple was victim of a phishing scam that targeted META users. They received an email that seemed to come from the social network and asked them to confirm their credentials and password to avoid the closure of their account. When they clicked on the link, they were redirected to a fake login page that recorded their data. A few days later, they noticed that their account had been hacked and that fraudulent purchases had been made with their credit card linked to their META account.
  • In October 2022, a woman discovered that her Instagram account had been hacked and that a scammer had used her identity to blackmail her followers. He sent them messages pretending to be her and asking for nude photos or money. He threatened to expose their private conversations or photos if they did not comply. The victim reported the hack to Instagram and warned her contacts about the scam.
  • In October 2021, a man was sentenced to 18 months in prison with a suspended sentence for having impersonated several personalities on social networks, including the president of the French Republic Emmanuel Macron. He created fake META (ex-Facebook) accounts and sent private messages to internet users asking them for money or services. He also tried to extort personal information from journalists and politicians by pretending to be their relatives or collaborators.
  • In February 2020, a woman discovered that her META account had been hacked and that a scammer had used her identity to trick her friends. He sent them messages pretending to be her and asking them for financial help for an emergency. He then asked them to send him PCS recharge codes (prepaid cards) that he could use to buy goods or services online. The victim filed a complaint and alerted her contacts about the hack.
  • French case of Loïc: Loïc suffered identity theft on Meta for a grueling period of 17 years. Hackers opened numerous bank accounts in his name, took out consumer loans and used his information to benefit from social and tax benefits. Loïc recounted his ordeal during an interview with Olivier Delacroix on Europe 1 on January 15th, 2019. For years, he had to provide proof of identity and fight with administrations, banks and bailiffs to restore the truth and regain control of his digital identity.
  • Case of Julie: Julie was a victim of identity theft on her Meta account by her ex-partner. He managed to access her account by cloning her SIM card, changing her security information and posting defamatory messages in her name. Julie quickly became aware of the situation and immediately filed a complaint with the competent authorities. She also contacted the Cybermalveillance.gouv.fr service to get help in the process of recovering her account and protecting her online reputation.
  • Thomas’s Instagram account was hacked by a hacker who impersonated him and sent rude messages to his contacts. He managed to recover his account with the help of a cybersecurity expert.
  • Benoît fell victim to a scam on WhatsApp. He received a message from a friend who asked him to lend him money urgently. He agreed and sent 500 euros by bank transfer. He realized too late that it was an impostor who had hacked his friend’s account.
  • Clara was a victim of identity theft on her Facebook account. She received a notification that told her she had won a free trip and asked her to click on a link to claim it. She followed the link and entered her Facebook credentials. She realized too late that it was a trap to steal her data and use it to create fake profiles in her name.
  • David was a victim of identity theft on his Oculus account. He received an email that told him he had been selected to test a new virtual reality game and asked him to download an app on his smartphone. He downloaded the app and scanned a QR code with his Oculus headset. He realized too late that it was a malicious software that had stolen his login information and used his account to buy games without his permission.
  • Emma was a victim of identity theft on her Meta Workplace account. She received a message from a colleague who asked her to send him confidential documents related to an ongoing project. She trusted him and sent the documents by email. She realized too late that it was an impostor who had hacked her colleague’s account and used the documents to harm the company.
  • Another real case of identity theft on Meta is that of Aaron Elekes. This film and TV producer had his Facebook account hacked by scammers who impersonated him and his contacts. Despite his efforts to recover his account, he did not receive the necessary help from Meta. He had to create several new accounts under his name, which caused him a lot of stress and frustration. This testimonial shows how important it is to protect your Meta account from identity theft.
  • Other real examples of identity theft on Meta include:
    • A company called Meta that accuses Meta (formerly Facebook) of unlawfully seizing its mark, name and identity.
    • The risks associated with identity theft on Meta, such as the loss of personal data, the spread of false information, the contact scam or the infringement of copyright.

These real testimonials of identity theft on Meta illustrate the severity of the problem and highlight the importance of taking adequate security measures to protect your account. By following the tips mentioned above, such as creating strong passwords, enabling two-factor authentication and using innovative solutions like EviPass and EviOTP, you can enhance the security of your Meta account and significantly reduce the risks of identity theft.

Conclusion: Safeguard Your Meta Account from Identity Theft

Protecting your Meta account from identity theft is essential to preserve your online security. By following the recommended security measures, such as creating strong and unique passwords, enabling two-factor authentication and using innovative solutions like EviPass and EviOTP from Freemindtronic, you enhance the security of your account and reduce the risks of identity theft. Also be vigilant about phishing attempts and make sure to update your security information regularly. Use the tools and technologies at your disposal to enhance the security of your Meta account. By following these tips, you will be able to fully enjoy your experience on Meta with peace of mind.

Protect your digital identity and take the necessary steps to secure your Meta account now. Don’t let hackers steal your online identity. Be proactive in your approach to security and make protecting your account a top priority.

By adopting strong security measures and staying informed about the latest techniques used by hackers, you can minimize the risks of identity theft and protect your digital life on Meta. Make sure you implement the recommendations presented in this article and don’t hesitate to explore more advanced security solutions to further enhance the protection of your account. Your online security is in your hands, so act now to protect your Meta account from identity theft.

Protect your digital identity and take the necessary steps to secure your Meta account now. Don’t let hackers steal your online identity. Be proactive in your approach to security and make protecting your account a top priority.

By adopting strong security measures and staying informed about the latest techniques used by hackers, you can minimize the risks of identity theft and protect your digital life on Meta. Make sure you implement the recommendations presented in this article and don’t hesitate to explore more advanced security solutions to further enhance the protection of your account. Your online security is in your hands, so act now to protect your Meta account from identity theft.

Remember that securing your Meta account is not limited to these measures. Stay vigilant, educate yourself on the latest security practices and be proactive in protecting your digital identity. By taking these precautions, you can fully enjoy your experience on Meta safely and peacefully.

EviPass the ultimate offline NFC hardware password manager passwordless manager by Freemindtronic Andorra

About Freemindtronic

Freemindtronic is a company specialized in digital security solutions based on NFC technology (Near Field Communication). Founded in 2017 by Jean-Marc Zanni, an expert in embedded systems engineering, Freemindtronic offers innovative products such as EviPass and EviOTP that allow users to manage their passwords and OTP tokens securely and contactlessly. Freemindtronic’s solutions are designed for individuals and professionals who want to protect their digital identity from cyberattacks and identity theft.

Strong Passwords in the Quantum Computing Era

Strong Passwords in the Quantum Computing

Strong Passwords by Jacques gascuel This article will be updated with any new information on the topic, and readers are encouraged to leave comments or contact the author with any suggestions or additions.  

How to Protect Your Passwords from Quantum Computers Introduction

Do you know that quantum computers could break your passwords in seconds? This could expose your personal and financial data to hackers. To prevent this, you need to create strong passwords that can resist quantum attacks. In this article, you will learn how to do it easily and effectively.

2025 Digital Security

APT44 QR Code Phishing: New Cyber Espionage Tactics

2023 Digital Security

WhatsApp Hacking: Prevention and Solutions

2025 PassCypher Password Products Technical News

Passwordless Password Manager: Secure, One-Click Simplicity to Redefine Access

2024 Digital Security

Why Encrypt SMS? FBI and CISA Recommendations

How to create strong passwords in the era of quantum computing?

Quantum computing is a technology that promises to revolutionize the field of computation by exploiting the properties of subatomic particles. It offers unprecedented possibilities for scientific research, artificial intelligence or cryptography. But it also represents a risk for the security of data and online communications. Indeed, quantum computers could be able to crack the secret codes that protect our passwords, our bank accounts or our private messages.

What is quantum computing? What is encryption? What is a brute force attack?How to protect ourselves from this threat? The answer is simple: create strong passwords and resist quantum attacks. But what is a strong password? And how to choose it? Here are some tips to help you strengthen your digital security in the era of quantum computing.

What is quantum computing and how does it work in video?

What is a strong password?

A strong password is a password that is hard to guess or crack by a hacker. It must be composed of at least 12 characters, mix uppercase and lowercase letters, numbers and symbols, and not contain dictionary words, proper names or personal data. For example, “P@ssw0rd123” is not a strong password, because it is too short, too simple and too common. On the other hand, “Qx7!tZ9#rGm4” is a strong password, because it is long, complex and random.

Why is a strong password important?

A strong password is important because it reduces the risk that your account will be hacked by a brute force attack. A brute force attack consists of testing all possible combinations of characters until finding the right password. The longer and more complex the password, the more possible combinations there are, and the more time and resources it takes to crack it.

For example, a password of 8 characters composed only of lowercase letters has about 200 billion (26^8) possible combinations. A classical computer can crack it in a few minutes. But a password of 20 characters composed of letters, numbers and symbols has about 10^39 (95^20) possible combinations. A classical computer would need 766 trillion years to crack it.

But what about quantum computers?

Quantum computers are able to perform calculations much faster and more powerful than classical computers thanks to their ability to manipulate qubits instead of bits. A qubit can take two states simultaneously (0 and 1), which allows it to explore multiple solutions at the same time. Thus, a quantum computer could theoretically crack a password by testing all possible combinations in parallel.

However, there are technical and practical limits to this ability. First, you need to have a quantum computer powerful and stable enough to perform this type of operation. However, current quantum computers are still very rudimentary and only have a limited number of qubits. Second, you need to know the type of encryption used to protect the password. However, there are encryption algorithms that are resistant to quantum attacks, such as symmetric encryption or elliptic curve encryption. Third, you need to have access to the system that stores the password. However, there are security measures that prevent unauthorized access, such as two-factor authentication or account locking after several unsuccessful attempts.

Thus, even if quantum computers represent a potential threat for the security of passwords, they are not yet able to crack them easily. Nevertheless, it is prudent to prepare for the advent of this technology by creating strong passwords and changing them regularly.

How to choose a strong password?

To choose a strong password, there are several methods. Here are some examples:

  • The Diceware method: it consists of randomly choosing several words from a predefined list and separating them by spaces or symbols. For example, “piano cat star 7 &”. This method allows you to create passwords that are easy to remember and hard to crack.
  • The XKCD method: it consists of choosing four random words and assembling them without space. For example, “correcthorsebatterystaple”. This method is inspired by a comic from the XKCD site that shows that this type of password is safer than a complex but short password.

The random generator method: it consists of using an online tool that creates a random password composed of letters, numbers and symbols. For example, “Qx7!tZ9#rGm4”. This is the method implemented in the evicore nfc and evicore hsm technology from Freemindtronic, which features a random password generator with Shannon entropy control. This technology also automatically calculates the number of bits of the generated password based on the type of printable ASCII 95 characters used. This method allows you to create very secure passwords but difficult or impossible to remember, which requires the use of a hardware or virtual password manager. Whatever the method chosen, it is important to follow some rules:

  • Do not use the same password for multiple accounts or services.
  • Do not write the password on a paper or store it on an insecure device.
  • Do not share the password with other people or communicate it by email or phone.
  • Do not use obvious clues or security questions to recover the password in case of forgetfulness.
  • Use a password manager to store and manage your passwords securely.

Tools for creating and protecting strong passwords

If you want to create and protect strong passwords in the age of quantum computing, you can use some of these online tools to help you:

  • Online password generator: A tool that creates a random and strong password composed of letters, numbers and symbols. For example, Mot de passe.xyz is a free and secure online password generator that lets you choose the length and types of characters for your password.
  • Password strength calculator: A tool that calculates the entropy (the number of bits) of a password based on its length and the number of possible characters. For example, Password Entropy Calculator is a free online tool that shows you how strong your password is and how long it would take to crack it.
  • Data breach checker: A tool that checks if your email or phone number has been exposed in a data breach. For example, Have I Been Pwned? is a free online service that lets you check if your personal information has been compromised by hackers.

Using these tools can help you create and protect strong passwords that are resistant to quantum attacks. However, you should also remember to use different passwords for different accounts, change them regularly, and use a password manager to store them safely.

In conclusion

Passwords are essential to protect our privacy and our data online. Faced with the potential threat of quantum computers, it is important to create strong passwords and resist quantum attacks. To do this, we need to choose passwords that are long and complex, change them regularly and manage them with caution. Thus, we will be able to enjoy the benefits of quantum computing without fearing for our digital security.

Electronic Signature HSM OpenPGP

Electronic Signature from DataShielder

Electronic signatures are increasingly being used to authenticate and protect documents online. But did you know that there are different levels of security for electronic signatures? According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different degree of reliability and safety. In this article, we will look at simple electronic signatures and explain how HSM OpenPGP can make them more secure.

Simple Electronic Signatures

A simple electronic signature is the most basic form of electronic signature. It has no specific criteria defined by the eIDAS regulation. It is based solely on the express or implied consent of the author of the document. For example, a simple click on an “I agree” button or entering a name in a form field can be considered a simple electronic signature.

Simple electronic signatures are used for documents that do not require increased security, such as newsletters, surveys or contact forms. They have limited legal value, as they do not guarantee the identity of the signer or the integrity of the document.

Simple electronic signatures present several risks for data security. First of all, they are easy to forge or usurp. It is enough to know the name or email address of the signer to be able to sign in his place. Then, they are vulnerable to computer attacks. A hacker can intercept, modify or delete the signed document without the signer or the recipient noticing. Finally, they are difficult to verify. There is no simple and reliable way to prove the authenticity and validity of a simple electronic signature.

Il is a tool that allows you to sign your electronic documents in compliance with the eIDAS regulation. HSM OpenPGP offers you several advantages to enhance the security of your simple electronic signatures:

HSM OpenPGP uses an asymmetric cryptography system to protect your data. Each signer has a pair of keys: a public key and a private key. The public key is used to verify the signature, while the private key is used to sign the document. The private key is stored in a secure digital vault and is only accessible to the signer. HSM OpenPGP generates a timestamp for each signed document. The timestamp is an indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents tampering or repudiation. HSM OpenPGP allows you to choose the level of security of your electronic signature according to your needs. You can opt for a simple, advanced or qualified electronic signature. Each level offers additional guarantees on the identity of the signer and the validity of the document. It is therefore a tool that allows you to sign your electronic documents with confidence and compliance. If you want to learn more about HSM OpenPGP and its features, feel free to visit our website or contact us.

Advanced Electronic Signatures

Electronic signatures are increasingly used to authenticate and protect online documents. But not all electronic signatures are equal. According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different level of reliability and security. In this article, we will focus on advanced electronic signatures and explain how HSM OpenPGP can make them safer.

An advanced electronic signature is a form of electronic signature that offers a higher level of security than a simple electronic signature. It is based on a digital certificate issued by a trusted third party, called a qualified trust service provider (QTSP). This certificate allows to authenticate the identity of the signer and to ensure the integrity of the signed document. To be considered as an advanced electronic signature, the signature must meet several criteria defined by the eIDAS regulation. It must be:

  • Uniquely linked to the signer;
  • Capable of identifying the signer;
  • Created using signature creation data that the signer can use under his exclusive control;
  • Linked to the signed data in such a way that any subsequent modification of the data is detectable.

Advanced electronic signatures are used for documents that require increased security, such as contracts, invoices or tax declarations. They have a stronger legal value than simple electronic signatures, because they can prove the origin and integrity of the document.

It is an encryption key management application that provides unparalleled security and privacy to users. It is compatible with all messaging services and offers end-to-end encrypted instant messaging via segmented key authentication SMS. It also has a file encryption and data signing system with signature self-verification.

  • eIDAS compliance: By using HSM OpenPGP for advanced electronic signatures, you can be sure that your signatures meet the requirements of the eIDAS (Electronic IDentification, Authentication and Trust Services) regulation, which was established in July 2016 to define the criteria for an electronic signature process within the European Union.
  • Timestamp of signed documents: HSM OpenPGP generated a timestamp for each signed document. The timestamp is indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents falsification or repudiation.
  • Choice of security level: HSM OpenPGP also allows you to choose the level of security of your electronic signature according to your needs.
  • Advanced features for data security and privacy: In addition to meeting eIDAS requirements for advanced electronic signatures, HSM OpenPGP also offers other data security and privacy benefits. For example, it allows you to generate, store, and use all types of symmetric and asymmetric keys offline for Open PGP encryption algorithms. The user can freely choose the algorithm he wants to use from AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing, or use with HSM OpenPGP.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS regulation, but also additional protection for your data thanks to the advanced features offered by HSM OpenPGP.

Compliance with eIDAS Regulation

It is an innovative application for managing encryption keys and signing files. Although HSM OpenPGP offers an interesting approach to electronic signatures, it is important to note that its approach differs from the requirements for a qualified electronic signature under the eIDAS regulation.

The eIDAS Regulation (No 910/2014) was adopted on 23 July 2014 by the European Parliament and the European Union Council. It aims to strengthen trust in electronic transactions within the internal market by establishing a common foundation for secure electronic interactions between citizens, businesses and public authorities. According to this regulation, a qualified electronic signature must be created using a secure signature creation device (DSC) that ensures that the signature creation data is under the exclusive control of the signatory. It must also be based on a qualified electronic signature certificate that attests to the identity of the signatory and is issued by a qualified trust service provider (PSC) meeting applicable technical and regulatory requirements. Finally, it must allow the signatory to be identified and any subsequent changes to the signed data to be detected.

To learn more about the eIDAS Regulation, you can visit the EUR-Lex website at the following address:

https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32014R0910

HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation because its approach does not rely on the use of a secure signature creation device (DSC) or a qualified certificate for electronic signatures issued by a qualified trust service provider (PSC).

However, It’s offers an innovative approach in the field of file signing and data encryption. HSM OpenPGP allows the signatory to generate, store and share their own public key and signature hash without relying on an external trusted third party. HSM OpenPGP uses technology patented by Freemindtronic on segmented key authentication to provide users with an unparalleled level of security and privacy. HSM OpenPGP also allows you to choose the level of security for your electronic signature based on your needs.

In short, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy.

According to the eIDAS Regulation, an advanced electronic signature must meet the following criteria:

  • It is uniquely linked to the signatory.
  • It allows the signatory to be identified.
  • It is created using data that the signatory can use under their exclusive control.
  • It is linked to the data to which it relates in such a way that any subsequent changes to the data can be detected.

It is appears to meet these criteria by allowing the signatory to generate their own private key using an application on their phone. The private key is encrypted and stored in the keychain (Apple) or key store (Android) and is only accessible to the signatory. The signatory creates their signature in .asc format from their private key after authenticating by entering at least one key or two or three. The signatory then sends the signature and their public key to the recipient so that they can verify that the file has not been corrupted.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

In conclusion, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy. It is appears to meet the criteria for an advanced electronic signature by allowing the signatory to generate their own private key using an application on their phone and providing users with an unparalleled level of security and privacy thanks to its patented technology. By using HSM OpenPGPfor advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

KEEPSER datasheet products

NFC Card Cold Wallet Keepser recto verso

NFC PCB CARD

Technical specifications

Other link:

KEEPSER Products Warranty

Freemindtronic licensed products

Compatible technologies

EviVault & EviToken

Compatible products 

Keepser, Keepser Premium, Keepser Premium+, Keepser PASS, Keepser PRO, Keepser PRO+, KCW PASS, KCW PRO, KCW PRO+, Personal Safe Clone, Expert Safe Clone

Time to retain data in Eprom memory without electrical energy

40 years

Number of records cycles guaranteed 

MTBF – MTTF 1,000,000 writes at 25°C without error

Battery-free functional energy

NFC signal energy recovery via phone signal  (NFC terminal) Energy harvesting

Communication protocol

NFC  (ISO / IEC 15693) / Compatible (ISO / IEC 14443)

Terminal compatible

NFC Android phone or tablet

Type of terminal operating system

Android from version 6 and following

Type of operation

Contactless

Typical composition of a Keeps

  • Name + username + password
  • Name +bank card information
  • Name + loyalty card information
  • Name + private crypto currency key
  • Name + mnemonic phrase BIP39

Number of possible records

50 or 100

Maximum number of characters for the name of the Keeps

15 (dynamic optimization of characters number)

Number of total characters per Keeps

61 characters (name of  label + username + password)

Maximum number of characters for a credential password

48 characters

Anti-counterfeitingECC BLS12-381 signature Read-only 

Number of RSA keys

1 RSA4906 (private key and public key)

Type of characters allowedASCII (95 printable characters) – European ISO alpha digital – symbols

Eprom NFC encryption

AES-256 CBC

Automatic connection compatibility to internet accountsKeepser Extension for web browsers Chrome, Opera, Brave, UC Browser, Vivaldi, Edge, Torch, Chromium
  
  

Physical security – digital

NDEF

not available

Memory type

NFC EPROM

Access control and authentication

Depend of the models

Multi Authentication Factors by default: Connection Key, UIID Phone, Dynamic Encryption Key Extension, anticounterfeight key and some customisable: Administrator password, user password, BSSID, Geolocation, Phone digital fingerprint

Type of brute force protection

Depend of the models

3 default pin attempts before the NFC terminal is automatically disconnected

Number of attempts is configurable from 1 to 15 according to the models

Labels display time

Setable time from 5 seconds to 5 minuts according to the models

Individual access control by Keeps

Up to 5 setable authentication factors (MFA)

  • Password
  • Fingerprint
  • QRcode
  • Geolocation
  • BSSID

Secure data sharing

Copy, backup, hardware cloning between devices by NFC only via a smartphone paired to the device, by NFC Beam, Nearby share and QR code, sending encrypted data by all types of messaging, including SMS or MMS

Type of authentication of the NFC terminal on local network

Dynamic encryption key

Type of data encryption

 AES 256 / RSA 4096 / ECC 256-512 bits

Physical security memory blocks

Multi passwords protection

Technical features of the resin

Flame resistance: 6,4 mm UL94 V-0
Thermal resistance: -60 to 200 degrees Celsius
Pressure resistance 1050 bars per mm2
Hardness level: 90 SHORE D

 
  

Physical properties

Minimum operating temperature

-40° F (-40 C)

Maximum operating temperature

+185° F (+85 C)

Protection index CEI EN 62262

Higher than ISO IP89K

Liquid resistance of the electronic components coating
  • Waterproof
  • Acid-resistant
  • Alkaline resistant
MaterialPCB FR4 High Tg 170
ISO/IEC NFC15693 & ISO/IEC 18000-3 mode 1 Compatible 14443
Frequency13.56 megahertz of ±7 kilohertz of carrier frequency
Distance RF reading/writing0,8 to 2,5 inches (2 to 6 cm)
Format carte standardISO CR80
Dimensions (inches) 3.37 X 2,125 (85.6 x 54 mm)
Thickness0.4 inch (1 mm)
Weight (oz)around 0.35 (10 gr)
ColourBlack, white, gold, silver
  

General

Manufacturer

Freemindtronic (Andorra) or its licensee the  Syselec Group  (France)

REACH (SVHC concentration)

0%

RoHS compliant

Yes

Intellectual property protections International

 3 Patents FR3063365FR3047099 – FR2941572 

Builder’s warranty

Freemindtronic Technologies and Product Guarantee click HERE to learn more.

 

Software version history

Version history of software


Archive des Versions


Welcome to Freemindtornic’s software version history page. Here you will find a complete archive of all the updates and enhancements made to our software since their initial launch.

Update Details

Each history entry includes detailed information about the release, features added, bug fixes, and performance improvements to help you understand the evolution of our products.

Commitment to Excellence

We are committed to providing regular updates to continuously improve the user experience and meet the changing needs of our customer base.

Thank you for your continued trust and support.


Download softwares



Software Microsoft & Apple & Linux














SOFTWARE EMAILS CLIENTS


APPLICATIONS





Extensions Applications

WEB NAVIGATORS BASED ON CHROMIUM














WEB NAVIGATORS FIREFOX






EviCypher A New Way to Keep Secrets and Pass Them On

EviCypher - EviToken Technology Technology A New Way to Keep Secrets and Pass Them On, multiple trust criteria, password, fingerprint, geolocation, BSSID, ID phone, Sharing Contactless Encryption, MFA, secret management by Freemindtronic Andorra

EviToken & EviCypher Technology a new way to keep secrets and pass them on.

EviToken & EviCypher technology to control information privacy is an absolute necessity today, as there are so many cyber malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These so-called “cyber” threats alone represent approximately 75% of the infiltration techniques giving access to your confidential or personal data. All of these techniques have the same approach, which is identity theft. This mechanism allows an individual, or a machine, to impersonate someone or something else. The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.

    Protection techniques for transmitting confidential or personal data have been around for a very long time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with strong encryption (RSA of 2048 or 4096 bits or even ECDSA). Unfortunately, if the model on which these encryption techniques are based is proven and ensures flawless security, its IT implementation is, for its part, often undermined by man-in-the-middle attacks, or by elevations of law on information systems. These attacks, when identification or decryption relies only on one-factor authentication, allow the theft of encryption keys, and directly compromise the security of your data. To mitigate these threats, two-factor authentication (or 2FA) adds a layer of protection by either obtaining a unique code sent by SMS to your phone number, or by validating a request for it authentication (Google / Facebook), or through the use of authenticators which is increasingly recommended by security specialists.

Why use the EviToken & EviCypher Technology?

                 The purpose of EviToken & EviCypher technology is to secure secrets of different kinds, such as asymmetric keys (RSA), symmetric keys (AES) but also login information, PIN codes, account or bank card identifiers, cryptocurrency private keys, cryptocurrency wallet passphrases, cryptocurrency recovery phrases (SEED), etc. The EviToken & EviCypher secure safe is contained in a simple NFC card, not connected to a computer system. It communicates with the latter, on demand, via a near-field transmission protocol (NFC) which transmits data over an encrypted channel, built by EviToken & EviCypher. Secrets stored in the card are segmented and encrypted to make them physically inaccessible to cybercriminals. The EviToken & EviCypher secure safe is a real natural Air Gap component. Thus, apart from the case of data transmission, the architecture used has: no power supply; no security breach due to an increase in temperature (which makes it immune to malware such as “BitWhisper and Fansmitter”); no emission of sound signals, even those inaudible to the human ear and no emission of light or waves. Finally, to avoid a conflation with smart card-based systems, the support of EviToken & EviCypher technology does not require dedicated physical connection hardware with the digital system, nor does it have an operating system, which makes it insensitive to the introduction of malicious code as on a Java architecture. Like any electronic component, the EviToken & EviCypher secure safe can undergo invasive attacks which consist in using acids to expose the electronic circuit that will then have to be analyzed to try to understand the implementation of the secure secrets in multiple scrambled segments.

If EviToken & EviCypher technology provides security in a secure vault, what about the use of encryption keys to transport secrets over a secure channel?

In the context of two-factor authentication, we consider that you are the only one who can hold the second criterion of trust. This security measure traditionally allows, in case of failure, not to trigger the secure transport of your data. However, this function is not intended to secure the transport, it is the role of the encryption protocol to perform this operation. Thus, if the encryption keys are compromised, the data could be compromised during a listen. Faced with this problem, EviToken & EviCypher directly integrates metadata trust criteria into its encryption keys, in order to secure the encrypted messages during their transport. Thus, even in the event of a compromise of the keys, decryption remains blocked by the trust criteria. With this in mind, why stop at two criteria of trust? In its basic version, EviToken & EviCypher offers nine trust criteria based on the possession of a third-party object, technical components (phone ID, barcode, password, geolocation or BSSID) but also environmental and specific components to the sender, or recipient, to make data compromise even more difficult.

                A simple example, you want to send a confidential message containing your latest invention to a colleague in a hostile environment, with a high probability of compromise. You will therefore add non-digital trust criteria to your encryption key, to ensure its protection in the event of a compromise. The decryption of the message by the AES 256 symmetric key will only be accessible, by the digital tool, once the conditions related to the trust criteria have been met. If we base one of the trust criteria on a geolocation for example, the recipient must not only be in possession of an EviToken & EviCypher card, but also be physically located at the location of geolocation defined in the trust criteria to decrypt the message. This location may be known to the recipient like a convention, but may also not be known. The trust criterion will then be transmitted to him as one of the authentication multi-factors, by SMS / QR Code / Photo or any other means.

If EviToken & EviCypher technology provides security in a secure safe, encryption of messages with trust criteria based on environmental components, technical or not, what about the transmission of keys for use in a space digital connected?

                To secure end-to-end transmissions, several tools, used as gateways, such as smartphones or virtual keyboards, will be crossed.  EviToken & EviCypher then builds encrypted channels, from the first communications between the EviToken & EviCypher card and the first NFC communication gateway, using an AES 128 symmetric pairing key. The latter will be replaced by a 256-bit AES symmetric key, with different trust criteria depending on the user’s choice, when recording a secret. Communication with web browsers is achieved using 256-bit ECC ephemeral keys (X25519), to negotiate exchanges between the smartphone and the browser plugin, to insert website authentication, text decryption, etc. As for the transmission, from the smartphone, of texts, images or encrypted files, the encryption is carried out with a symmetric key AES 256 bits with trust criteria.

Why choose the EviToken & EviCypher technology?

Our goal is to better understand the feasibility of digital malicious acts through a human approach to attacks. Thus, if you do not physically have the EviToken & EviCypher card, or if you do not have access to it with a connection duration long enough to carry out an attack, it will be very difficult to compromise the safe, but it is quite obvious that «to the impossible no one is bound “. “However, this attack requires physical contact, it is no longer possible to hide behind anonymizers. Assuming that the encrypted message is sufficiently protected, with algorithms such as 2048- or 4096-bit RSA or even ECDSA, then it is necessary to look into the protection of the key. Indeed, this protection will remain true as long as the encryption and decryption keys remain secret. History of computer attacks shows certain difficulties in maintaining this assertion. It is therefore necessary to strengthen the protection of the keys, by accepting the compromise of the latter, while protecting the message during its transport. at best for this requirement, non-digital trust criteria, that is to say criteria known, held, observable or understandable by the recipient, are required for the decryption of the message and no longer of the key.

EviToken & EviCypher technology, by adding these trust criteria, changes the current paradigm of access to secrets. Thus, even if a secret, and more particularly a decryption key, were stolen, it could only be used if the trust criteria are met.

Based on the EviToken & EviCypher principle, the new EviCypher technology, which won the 2021 gold medal for international inventions from Geneva, brings new innovations in the creation, management, integration and augmented intelligence linked to the use of trust criteria. A new chapter on this internationally patented invention on segmented key authentication is opening.

About the author

fabrice crasnier cybersecurity university professor in france forensic expert of the court of appeal of toulouse in france and former forensic police officerFabrice Crasnier is the director of Research & Development departement of FREEMINDTRONIC. Freemindtronic, Andorran start-up designs and manufactures tailor-made solutions for its customers in the field of safety and cyber security of information systems and computer systems.

Fabrice is Associate Professor at Paul Sabatier University in Toulouse where he teaches cybercrime phenomena. He is at the origin of the creation of 3 forensic laboratories as head of forensic activities within the french police in Toulouse and within the SCASSI company. He has worked for 27 years in the judicial police, including 17 years following national and international cybercrime investigations. As a judicial expert since 2004 at the Court of Appeal of Toulouse, he has witnessed the delinquent transformation of cyberspace between 2000 and 2017. As a computer engineer, he has understood that the origin of cyberthreats is not always due to a defect in computer tools but more often to a misuse of these tools.

Fabrice can be reached online on LinkedIn: https://www.linkedin.com/in/fabricecrasnier/

For more information, visit the company website at www.freemindtronic.com

Freemindtronic Win Awards 2021 Next-Gen in Crypto Security with EviCypher & EviToken Technologies
Freemindtronic win awards 2021 Most Innovative in Hardware Password Manager with EviCypher & EviToken Technologies
Freemindtronic win awards 2021 Next-Gen in Secrets Management with EviCypher & EviToken Technologies
NEWS PROVIDED BY

Cyber Defense RSA Edition for 2021 
May 18, 2021
Related Link:
https://www.cyberdefensemagazine.com
Source Link:
https://www.cyberdefensemagazine.com/annual-editions/RSA-2021/Cyber-Defense-Magazine-RSA-Edition-for-2021.pdf

SHARE THIS ARTICLE

766 trillion years to find 20-character code like a randomly generated password

A server rack filled with multiple GPUs connected by yellow and black cables, illustrating the complexity and power needed to crack a 20-character code in 766 trillion years.

766 trillion years to find randomly generated 20-character code like randomly generated password

766 trillion years to find randomly generated 20-character code is the result of a simulator to find a 20-character generated by technology EviPass.

The age of the universe is estimated at only 14 billion years, this gives you an idea of comparison.

How did I find this result that you can control on your own?

We used the Password Strength Calculator developed by Bob Beeman [1] which was last updated on January 4, 2013.

This simulator is freely available on the www.bee-man.us website as well as the source code used.

Why We Chose Bob Beeman’s Simulator

In our quest to estimate the time it would take to crack a random 20-character code, we had several simulation tools at our disposal, including lastbit.com [2], password-checker.online-domain-tools.com [3], and ANSSI’s [4] simulator from ssi.gouv.fr. However, we ultimately opted for Mr. Bob BEEMAN’s simulator due to its transparent calculation method and its technical approach to brute force attacks.

Acknowledging Mr. Bob BEEMAN

Before delving into the details of our simulation, we must extend our gratitude to Mr. Bob BEEMAN for making his code freely accessible and copyable while upholding his copyrights, as explained on his website. We hope our research can contribute to his already impressive achievements, including a record-breaking 15-millisecond feat.

Reference to Ultra-Powerful Computers

To provide you with a comprehensive understanding of the state-of-the-art technology for brute force attacks in 2013, we examined Bob Beeman’s simulator’s reference to an ultra-powerful computer designed in 2012 specifically for password cracking.

Considering Computational Capacity

Bob Beeman’s simulator takes into account the computational capabilities of computers, including the 2012 design, for executing brute force attacks on passwords. It allows for adjustments in the “Values of Hacker: Axes/Second,” providing a valuable point of reference and comparison.

Staying with Default Parameters

For the sake of consistency, we maintained the default example provided by Bob Beeman, which assumed a rate of 60-109 (billion) attempts per second.

Radeon City: Revolutionizing Password Security

In this section, we’ll delve into the incredible story of Radeon City, a game-changing password-cracking cluster boasting 25 AMD Radeon graphics cards. Discover how it was built, what it can achieve, and why it’s reshaping the world of password security.

Building Radeon City

Jeremi Gosney, the visionary behind Radeon City and the CEO of Stricture Consulting Group, sought to create a powerhouse capable of cracking passwords with unprecedented speed and efficiency. His solution? Virtual OpenCL (VCL), a groundbreaking virtualization software.

Gosney assembled five servers, each armed with five AMD Radeon HD7970 graphics cards, interconnected through VCL. The cluster, aptly named Radeon City, was born at a cost of approximately $30,000 in 2012.

Unleashing Radeon City’s Power

Radeon City is a juggernaut, capable of generating an astounding 350 billion guesses per second when cracking NTLM cryptographic algorithm hashes. In just 5.5 hours, it can test every combination of eight-character passwords, including uppercase and lowercase letters, digits, and symbols.

But it doesn’t stop there. Radeon City can crack a range of cryptographic algorithms, from MD5 and SHA1 to SHA2 and even SHA3, at unprecedented speeds. It employs various attack types, including brute force, dictionary, rule-based, combinator, and hybrid attacks, using extensive wordlists and intricate rules.

Radeon City isn’t confined to offline attacks. It can also perform online attacks through distributed cracking, where passwords are guessed on live systems.

Why Radeon City is a Game-Changer

Radeon City marks a seismic shift in password security. It reveals the vulnerability of passwords protected by fast algorithms like NTLM and challenges the belief that longer, complex passwords equate to greater security. The key takeaway? Truly secure passwords are random strings absent from dictionaries.

Moreover, Radeon City advocates for slow and salted algorithms like Bcrypt, PBKDF2, or SHA512crypt, and underscores the importance of password management tools like EviPass.

Radeon City Specifications

Jeremi Gosney, a data security researcher, engineered a groundbreaking desktop rig that can swiftly dismantle older protocols. Leveraging the Open Computing Language (OpenCL) framework and Virtual OpenCL Open Cluster (VCL), Gosney deployed HashCat—a dedicated password-cracking program. The system comprises five quad-core servers, each housing 25 AMD Radeon GPUs, providing the immense computational power required for the task. These servers are interconnected with a 10 to 20 Gbps transfer rate facilitated by an Infiniband switch.

server filled with 25 AMD Radeon HD 7970 GPUs


Here’s a snapshot of Radeon City’s technical specifications:

  • Servers: 5
  • Graphics Cards: 25 AMD Radeon GPUs
  • Model: AMD Radeon HD7970
  • Memory: 3 GB GDDR5
  • Clock Speed: 925 MHz
  • Compute Units: 32
  • Stream Processors: 2048
  • Peak Performance: 3.79 TFLOPS
  • Virtualization Software: Virtual OpenCL (VCL)
  • Password-Cracking Software: ocl-Hashcat Plus
  • Cost: $30,000 (2012)


This powerhouse enables Radeon City to achieve unprecedented speeds in password cracking, making it a game-changer in the realm of data security.

Advantages and Disadvantages of Radeon City

Advantages:

  1. Power: Radeon City cracks passwords using both fast and slow algorithms.
  2. Flexibility: It executes a variety of attacks with extensive wordlists and complex rules.
  3. Innovation: Using virtualization technology, it overcomes hardware limitations.

Disadvantages:

  1. Cost: Building and operating Radeon City can be expensive, including high electricity costs.
  2. Noise: It generates significant noise, requiring specialized cooling and soundproofing.
  3. Ethical Considerations: While powerful, its capabilities raise ethical and legal questions about its potential misuse.

Simulation Parameters and Results

To calculate the estimated time required to find a 20-character code with 94 symbols, we used the formula:

a^b / (c * 2)

Where:

  • “a” represents the number of possible characters,
  • “b” denotes the number of characters in the password,
  • “c” indicates the number of hash calculations achievable per second.

By selecting 94 symbols, a password length of 20 characters, and a 50% probability of success compared to the theoretical result, our simulation yielded an astonishing result: 766.076,000,000,000,000 years or 766 trillion [5] years.

Understanding the Financial Implications

This simulation approach not only provides insights into the time required but also sheds light on the financial investments necessary to establish a computer system capable of cracking such a password.

Consider this: The reference computer, as configured by Gosney, relies on a pool of 25 virtual AMD GPUs to crack even robust passwords. Yet, a single unit of this type, priced at approximately $30,000 in 2012, can generate just 348 billion hashes of NTLM passwords per second. To achieve results within the realm of 766 trillion years, one would need to acquire multiple such machines.

Hence, to decipher only a 20-character password generated with EviPass technology, residing within an EviTag NFC HSM or EviCard NFC HSM device, an investment of nearly $25 billion would be required. A remarkable comparison, given that global military expenses were estimated at 1.7 billion dollars [6].

Beyond Brute Force

It’s important to note that this test focused solely on brute force attacks without taking into account the activation and utilization of additional countermeasures, such as physical blockchain and jamming, which will be explored in future articles.

A Point of Reference: ANSSI’s Simulator

To provide further context, we examined the ANSSI website [7], whose simulator is limited to 20 characters and 90 symbols. This simulator yielded a score of 130, the maximum attainable. This score places passwords of this nature on par with the smallest key size of the standard AES (128-bit) encryption algorithm. Notably, our password generators exceed this maximum, boasting 20 characters with 94 symbols [8].

Forming Your Own Opinion

The aim of this article is to empower you to form your own assessment of the resilience of our password generators against brute force attacks. While we are not the sole providers of powerful password generators, our test stands as a benchmark against other comparable implementations.

Ensuring Ongoing Security

Our embedded password generator undergoes regular updates to maintain its complexity and withstand the evolving landscape of brute force attacks. Our commitment is to enhance security without compromising user convenience—a complex yet vital undertaking.

Diverse Password Generation Options

Our password creation options offer versatility. Users can either select passwords from the pool of 95 available characters, opt for a semi-automatic generation followed by modification, or automate the process entirely according to default criteria, allowing passwords of up to 20 characters.

Adaptability to Website Constraints

For websites that impose restrictions on symbols or character limits, users can customize their password generation preferences, choosing between identifiers, letters, and/or numbers, with or without symbols.

Hexadecimal Generator for Added Utility

We’ve also introduced a hexadecimal generator to facilitate programming of digital codes. This feature proves invaluable in various domains, including electronics, electromechanics, and maintenance services, enabling the creation and modification of digital access codes with ease. Furthermore, codes can be securely shared with building residents through functions like “scrambling” or encryption via a QR Code, all made possible by EviCore technologies from Freemindtronic.

To learn more about our solutions, please visit:

Air Gap secrets management

Air Gap secrets management nfc hardware wallet secrets keeper Safety & Cybersecurity awards Gobal Infosec Freemindtronic Made in Andorra

Air Gap secrets management by Freemindtronic Andorra.

The Importance of Air Gap secrets management

The challenge is to keep the secrets as long as possible, and that they are always accessible, in seconds, by authorized persons. The data must be non-repudiable.

The device must be scalable and easy to use, without batteries, without charge and without guarantee for life. It has a    multi-level access control of physical source confidence. It can be used  offline. It isskimmed from end to end from the device to the display as well as the sharing of secrets.

In addition, the device works for life without battery.

It is resistant to all types of environment, to immersion in liquids, X-rays, electrostatic, magnetic, electrical, thermal -40 to 85 degrees, mechanical stress. It also works under water, in wood or concrete.

Ideally, such a solution should also be favourable to the planet and should be ecologically favorable.

The device decentralizes the secrets of computer systems and information systems. The device has an autonomous energy security  system. It designed to be the best security system  and cyber security physical and digital. It is manageable and usable offline, without contact at the discretion of the administrator and/or the user.

Freemindtronic NFC devices have all the above features. In addition, they withstandbrute force attacks  from a distance  and nearby. A remote cyberattack  is physicallyimpossible. Indeed, the devices are physically not connected with thenetwork,  it communicates with the network only contactless, on demand, in an encrypted way. These are Air Gap devices.

How the Air Gap secrets management Works?

It’s a physical barrier, the Air Gap”! The device is not physically connected to a network! It has no physical connectors! It has no back door! One means of communication, NFC industrial technology! For more information click  

Wikipedia on Air Gap security

How does the devices work?

All operating guides are made in real-time video, and show that sensitive data can be recorded, read and shared in seconds, offline, without a server connection. Everything is done without contact, via an industrial NFC memory capable of keeping the data in its memory for 40 years, without the need for an electrical energy source. It is possible to perform more than a million writing cycles in these memories, without error.

  To learn more about how Freemindtronic’sNFC devices work,  watch the videos from theplaylist of the Freemindtronic  or  EviVaultchannel.

These videos include user guides for various products and services designed and manufactured on the basis of our  EviAlpha,  EviToken  and EviCyphertechnologies.

These devices are designed to store for life many types of secrets such as private cryptocurrency keys (Bitcoin, Ethereum and other crypto-assets such as IOAT, Tron) and the Passphrases of Smart Contracts and Seed Recovery BIP39 as well as passwords and encryption keys in RSA 4096 and AES 256. 

To date, Freemindtronic’s NFC devices can generate the addresses of private keys for Solarcoin, Bitcoin, Bitcoin Cash, Bitcoin Gold, Dash, Digibyte, Dogecoin, Ethereum, Ethereum Classic, Ethereum Gold, Ethereum Lite, Ethereumcash, Feathercoin, Stellar, Litecoin, Namecoin,

To learn more about the EviVault NFC HSM Technology in click here or the EviCore NFC HSM Technology in click here

Android NFC phones compatible

List of Android NFC Phones compatible with the FMT application from Freemindtronic Made in Andorra

Android NFC Phones Compatible with FMT Application

Welcome in Android NFC phones compatible you will find a NFC compatible phone list Android that work with the FMT application, contactless technologies for NFC devices developed by Freemindtronic Andorra.

Google source update date: 7/05/2021

 

 
ManufacturerModel NameModel Code
A1A1 Alpha 20+P671F60
A1A1 Smart N9VFD720
AG MobileAGM A9HSSDM450QC
AG MobileAGM A10SHARKL5
AG MobileAGM X3T91EUE1
AT&TU705AAU705AA
ATOLSmart.Slim Plust50p
AZOM TECHDesert2Desert2
AccentTANK_P55TANK_P55
AcerWalleWalle
AcerE380acer_e3n
AcerA3-A30omega
AdartRX550ALIGATOR_RX550
AdvantechAIM75-LTEAIM75-LTE
AdvantechAIM75-WIFIAIM75-WIFI
AligatorALIGATOR_RX710_EEAALIGATOR_RX710
AligatorALIGATOR RX800ALIGATOR_RX800
AligatorRX700RX700
AllViewX2 Soul XtremeX2_Soul_Xtreme
AlticeE54E54
AlticeS32_NFCS32_NFC
AlticeALTICE S43S43
AlticeALTICE S60S60
AlticeS61S61
AlticeALTICE S70S70
Archos50 Diamondac50da
ArchosArchos Sense 50Xac50xse
ArchosLogic Instrument Fieldbook F1Blifbf1b
AscomAscom Myco 3ABAA
AscomAscom Myco 3ABBA
AscomAscom Myco 3ACAA
AscomAscom Myco 3ACBA
AscomAscom Myco 3ADAA
AsperaASPERA R9R9
AsusPadFone 2A68
AsusPadFone InfinityASUS-A80
AsusThe new PadFone Infinity (A86)ASUS-A86
AsusPadFone X (A91)ASUS-T00D
AsusZenFone AR (ZS571KL)ASUS_A002
AsusZenFone ARASUS_A002_1
AsusZenFone Ares (ZS572KL)ASUS_A002_2
AsusZenFone VASUS_A006
AsusROG Phone llASUS_I001_1
AsusZenFone 7 / 7 Pro (ZS670KS/ZS671KS)ASUS_I002D
AsusROG Phone 3ASUS_I003_1
AsusROG Phone 5ASUS_I005_1
AsusZenFone 6 (ZS630KL) (WW) / 6Z (ZS630KL) (IN)ASUS_I01WD
AsusPadFone S (PF500KL)ASUS_T00N
AsusZenFone Go (T500)ASUS_X003
AsusZenFone 5 (ZE620KL)ASUS_X00QD
AsusZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN)ASUS_X00T_6
AsusZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN)ASUS_X00T_8
AsusZenFone 5 Lite (ZC600KL)ASUS_X017D_1
AsusZenFone 5 Lite (ZC600KL)ASUS_X017D_2
AsusZenFone Max Pro M2 (ZB631KL) (WW) / Max Pro M2 (ZB630KL) (IN)ASUS_X01BD_1
Asus飛馬2 Plus (T550KLC)ASUS_X550
AsusZenFone 3 Deluxe (ZS550KL)ASUS_Z01F_1
AsusZenFone 4 Pro (ZS551KL)ASUS_Z01GD_1
AsusZenFone 4 (ZE554KL)ASUS_Z01KDA
AsusZenFone 4 (ZE554KL)ASUS_Z01KD_1
AsusROG PhoneASUS_Z01QD_1
AsusZenFone 5Z (ZS620KL) (WW) / 5Z (ZS621KL) (IN)ASUS_Z01R_1
AsusTransformer Pad (TF103CE)K010E
AsusTransformer PadK010_1
AsusTransformer Pad (TF103C)K010_3
AsusMeMO Pad 7 (ME176CE)K013C
AsusMeMO Pad 8 (ME581CL)K015
AsusZenFone 2 (ZE551ML)Z00A
AsusZenFone 2 (ZE551ML)Z00A_1
AsusZenFone 2 (ZE551ML)Z00A_3
AsusZenFone Zoom (ZX551ML)Z00X
AsusZenFone Zoom (ZX551ML)Z00X_1
AsusZenFone Zoom (ZX551ML)Z00X_2
AsusZenFone 3 Deluxe (ZS570KL)Z016
AsusZenFone 3 Deluxe (ZS570KL)Z016_1
AsusNexus 7 (2013)deb
AsusNexus 7 (2013)flo
AsusNexus 7 (2012)grouper
AsusNexus 7 (2012)tilapia
Athesi AP5701AP5701
AthesiAthesi professional AP5705SAP5705S
AthesiAP5801AP5801
AthesiAP6301AP6301
Audi AGSDIS1sdis1
BARTECPixavi PhonePixaviPhone
BARTECPixavi ThermalPixaviThermal
BLUEWORLDTM12TM12
BQruBQ-5001L ContactBQru-5001L
BQruBQ-5045LBQru-5045L
BQruBQ-5530LBQru-5530L
BQruBQ-5535LBQru-5535L
BQruBQ-5540LBQru-5540L
BQruBQ-5541LBQru-5541L
BQruBQ-5730LBQru-5730L
BQruBQ-5731L Magic SBQru-5731L
BQruBQ-6015L UniverseBQru-6015L
BQruBQ-6035LBQru-6035L
BQruBQ-6040LBQru-6040L
BQruBQ-6042BQru-6042L
BQruBQ-6424LBQru-6424L
BQruBQ-6630LBQru-6630L
BenQAgora 4GAgora_4G
BenQAgora_4G_ProAgora_4G_Pro
BenQF5BENQ_F5
BenQF5_16F5
BenQF52_09F52
BenQF55F55
BenQF55JF55J
BenQHarrierHarrier
BenQT3T3
BentleySDIS1sdis1
BittiumBittium Tough Mobile 2craton
Bittiumgranitegranite
BlackBerryDTEK60argon
BlackBerryKEYonebbb100
BlackBerryBlackBerry MOTIONbbd100
BlackBerryBlackBerry KEY2 LEbbe100
BlackBerryBlackBerry KEY2bbf100
BlackBerryDTEK50hamburg
BlackBerryPRIV by BlackBerryvenice
BlackfoxBMM441ABMM441A
BlackfoxBMM441BBMM441B
BlackfoxBMM441S BMM441S
BlackfoxBMM442DBMM442D
BlackfoxBMM442SBMM442S
BlackfoxBMM443DBMM443D
BlackfoxBMM541BBMM541B
BlackfoxBMM541WBMM541W
BlackfoxBMM543DBMM543D
BlackfoxBMM543SBMM543S
BlacksharkSHARK KSR-A0kaiser
BlacksharkSHARK PRS-A0penrose
BlackviewA80PlusA80Plus
BlackviewBL6000ProBL6000Pro
BlackviewBV4900BV4900
BlackviewBV4900ProBV4900Pro
BlackviewBV5100BV5100
BlackviewBV5100ProBV5100Pro
BlackviewBV5500PlusBV5500Plus
BlackviewBV5500ProBV5500Pro
BlackviewBV5800BV5800
BlackviewBV5800PRO_RUBV5800Pro_RU
BlackviewBV5800PROBV5800_PRO
BlackviewBV5800_RUBV5800_RU
BlackviewBV5900BV5900
BlackviewBV6000sBV6000S
BlackviewBV6000S_RUBV6000S_RU
BlackviewBV6000_RUBV6000_RU
BlackviewBV6100BV6100
BlackviewBV6300BV6300
BlackviewBV6300ProBV6300Pro
BlackviewBV6600BV6600
BlackviewBV6800ProBV6800Pro
BlackviewBV6800Pro-RUBV6800Pro_RU
BlackviewBV6900BV6900
BlackviewBV7000BV7000
BlackviewBV8000 ProBV8000Pro
BlackviewBV8000Pro_RUBV8000Pro_RU
BlackviewBV9000BV9000
BlackviewBV9000-FBV9000-F
BlackviewBV9000-RUBV9000-RU
BlackviewBV9000 ProBV9000Pro
BlackviewBV9000 Pro-FBV9000Pro-F
BlackviewBV9000-RUBV9000Pro-RU
BlackviewBV9100BV9100
BlackviewBlackview BV9500BV9500
BlackviewBlackview BV9500-RUBV9500-RU
BlackviewBlackview BV9500PlusBV9500Plus
BlackviewBlackview BV9500ProBV9500Pro
BlackviewBV9600BV9600
BlackviewBV9600EBV9600E
BlackviewBlackview BV9700ProBV9700Pro
BlackviewBV9800BV9800
BlackviewBV9800ProBV9800Pro
BlackviewBlackview BV9900BV9900
BlackviewBlackview BV9900EBV9900E
BlackviewBlackview BV9900ProBV9900Pro
BlackviewBV9600ProBlackview
BlackviewMAX1MAX1
BlackviewBV6000SOLID_4G1
BluPURE XLBLU_PURE_XL
BlubooS2S2
BlubooS3S3
BluebirdBM180BM180
BluebirdEF400EF400
BluebirdEF401EF401
BluebirdEF500EF500
BluebirdEF501REF501
BluebirdEF550EF550
BluebirdEF550REF550R
BluebirdEK430EK430
BluebirdHF450HF450
BluebirdHF550HF550
BluebirdRT080RT080
BluebirdRT103RT103
BluebirdST103ST103
BluebirdVF550VF550
BluebirdVX500VX500
BrandtBPRIMESBPRIMES
BravvaImpress_AeroImpress_Aero
Bullitt GroupCat S60CatS60
C5 Mobilenoa X2 Plusnoa_x2_Plus
CHAINWAYC6000C6000
CHAINWAYC71C71
CHAINWAYP80P80
CHCNAVHCE600HCE600
CHCNAVLT700LT700
CILICOC6C6
CILICOF880F880
CONKERST60ST_60
CONKERSX50SX50
Carbon MobileCarbon 1 Mark IIC1M2BD_R2
CasioET-L10ET-L10
CasioDT-X400dtx400
CasioIT-G400itg400
Casioitg600itg600
CasioIT-G650itg650
CatS40CatS40
CatCat S41CatS41
CatCat S48cCatS48c
CatS50CatS50
CatCatS50cCatS50c
CatCat S52CatS52
CatCat S61CatS61
CatCat S42S42
CatCat S42S42G
CatCat S62S62
CatCat S62 ProS62Pro
CedarCedar CT8X2CT8X2
CedarCedar CT8X2CT8XEU
ChameleonChameleon-HChameleon-H
Cherry MobileFlare XFlare_X
China Mobilen1 maxm823_cmcc
CipherlabHera51Hera51
CipherlabRK25RK25
CipherlabRK25WORK25WO
CipherlabRK95RK95
CipherlabRS31RS31
CipherlabRS35RS35
CipherlabRS51_HSRS51_HS
CiscoCP-860860
CloudMindsA1-901A1-901
CodeCR4900cr4900
ConcordConcord M15Concord_M15
CondorPGN607PGN607
ConquestCONQUEST S12ProS12Pro
ConquestS11conquest-S11
Conquestconquest_S16conquest_S16
Coolpad89718971
CoolpadA8-931A8-931
CoolpadY803-8CPY803_8
CoolpadY803-9CPY803_9
CoolpadCPT1CoolpadT1
CoolpadVodafoneSmart4VodafoneSmart4
CoolpadVodafoneSmart4turboVodafoneSmart4turbo
CoolpadY92-9Y92-9
CoppernicC-eightC-eight
CoppernicC-fiveC-five
CoviaCP-K19CP-K19
CricketU705ACU705AC
CrosscallCORE-M4CORE-M4
CrosscallTREKKER-M1 COREHS8909QC
CrosscallTrekker- M1HS8916QC
CrosscallCore- X3HS8917QC
CrosscallAction-X3HS8937QC
CrosscallAction-X3HS8937QCs
CrosscallTREKKER- X3HS8952QC
CrosscallTrekker- X4HSSDM660QC
CrosscallCore-X4L762
CrosscallCore-T4L810
CubotC20C20
CubotC30C30
CubotKINGKONG 5 ProKINGKONG_5_Pro
CubotKING_KONG_3KING_KONG_3
CubotNOTE 20NOTE_20
CubotNOTE 20 PRONOTE_20_PRO
CubotP40P40
CubotQUESTQUEST
CubotX30X30
CustomK-RangerK-Ranger
CustomP-RangerP-Ranger
CyrusCM17CM17
CyrusCM17XA_EEACM17XA
CyrusCS22CS22
CyrusCS22XACS22XA
CyrusCS22XA_EEACS22XA_EEA
CyrusCS40CS40
CyrusCS45XACS45XA
CyrusCS45XA_EEACS45XA_EEA
DEXPAS260AS260
DEXPDEXP B145B145
DEXPB260B260
DEXPG355G355
DEXPGL255GL255
DEXPGL355GL355
DEXPGS150GS150
DEXPGS153GS153
DEXPGS155GS155
DEXPT155T155
DSICRD86QERD86QE
DSICMobilebase DS6ds6
DatalogicMemor 20Q10
DatalogicMemor 20Q10A
DatalogicDatalogic MEMOR 10dl35
DatalogicSkorpio X5sx5
DataminiTPOS74G-IGF720TPOS74G-IGF720
DellVenue 10SO
Denso WaveBHT-1700QWB-2-A7BHT-1700QWB-2-A7
Denso WaveBHT-1700QWBG-2-A7BHT-1700QWBG-2-A7
Denso WaveBHT-1800QWB-3-A7BHT-1800QWB-3-A7
Denso WaveBHT-1800QWBG-3-A7BHT-1800QWBG-3-A7
Denso WaveBHT-M60-QW-A10BHT-M60-QW-A10
Denso WaveBHT-M60-QWG-A10BHT-M60-QWG-A10
Denso WaveBHT-M70-QWG-A10BHT-M70-QWG-A10
Denso WaveBHT-M80-QW-A10BHT-M80-QW-A10
Denso WaveBHT-M80-QWG-A10BHT-M80-QWG-A10
Denso WaveBHT-1600BHT1600
DiMora MobileAdrenalin ProAdrenalin_Pro
DigiDigi R2Digi_R2
DigiLandDL1031mid1031
DigicelDigi K1Digi_K1
DigmaCITI 609CS6063ML
DigmaDIGMA LINX PAY 4G LS5053MLLS5053ML
DitecmaM1092RM1092R
DitecmaM1092RV5M1092RV5
DitecmaM1092Rv4M1092Rv4
DoogeeN100N100
DoogeeS40S40
DoogeeS40ProS40Pro
DoogeeS58ProS58Pro
DoogeeS59ProS59Pro
DoogeeS60S60
DoogeeS60LiteS60Lite
DoogeeS68ProS68Pro
DoogeeS70S70
DoogeeS70LiteS70Lite
DoogeeS80S80
DoogeeS80LiteS80Lite
DoogeeS86S86
DoogeeS86ProS86Pro
DoogeeS88PlusS88Plus
DoogeeS88ProS88Pro
DoogeeS90CS90C
DoogeeS90proS90Pro
DoogeeS95S95
DoogeeS95Pro S95Pro
DoogeeS96ProS96Pro
DoogeeY8plusY8Plus
DoroDoro 824825A
DoroDoro 8042DSB0110
DoroDSB-0220DSB0220
EACRUGGEDEP500EP500
EACRUGGEDRG80 RG80
EACRUGGEDWolf10RWolf10R
ECSTF10EA2TF10EA2_4
ECSTF10EA2TF10EA2_P8_1
ECSTF10MK1TF10MK1_3
ELO TouchM50M50
ELO TouchM50CM50C
EPIKONERS550RS550
ElephoneA6_MaxA6_Max
ElephoneE10E10
ElephoneE10_ProE10_Pro
ElephonePX_ProPX_Pro
ElephoneSoldierSoldier
ElephoneU3HU3H
ElephoneU5U5
ElephoneU_ProU_Pro
ElevateV55CV55C
EmporiaemporiaSMART.4S4
EmporiaS5_EEAS5
EmporiaSESE
EnergizerHardcase H620SH620SEU
EnergizerH550SHARDCASEH550S
EnergizerUltimate U710SUltimate_U710S
Essential ProductsPH-1mata
EvolveoEVOLVEO StrongPhone G8EVOLVEOG8
EvolveoGM6 DSStrongPhoneG5
EvolveoEVOLVEO StrongPhone G9StrongPhone_G9
ExtremRock_X11ROCK_X11
F150B2021B2021
F150Bison2021_EEABison2021
FairphoneFairphone3FP3
Famous FonesFonos-O1Fonos-O1
FirehawkToughDroidToughDroid
FreebitTONE m15TONE_m15
FujitsuBZ01BZ01
FujitsuF-01FF01F
FujitsuF-01HF01H
FujitsuF-01JF01J
FujitsuF-01KF01K
FujitsuF-01LF01L
FujitsuF-02FF02F
FujitsuF-02GF02G
FujitsuF-02HF02H
FujitsuF-02KF02K
FujitsuF-02LF02L
FujitsuF-03GF03G
FujitsuF-03HF03H
FujitsuF-03KF03K
FujitsuF-04GF04G
FujitsuF-04HF04H
FujitsuF-04JF04J
FujitsuF-04KF04K
FujitsuF-05FF05F
FujitsuF-05JF05J
Fujitsuarrows Be4 F-41AF41A
FujitsuF-42AF42A
FujitsuF-51AF51A
Fujitsuarrows NX9 F-52AF52A
FujitsuFARTMB611YFARTMB611Y
FujitsuARROWS M01M01
Fujitsuarrows M02M02
Fujitsuarrows M03M03
Fujitsuarrows M04M04
Fujitsuarrows M04 PREMIUMM04P
FujitsuM305M305
FujitsuARROWS M357M357
FujitsuM359M359
FujitsuARROWS M555M555
FujitsuPatio600Patio600
FujitsuPatio730Patio730
Fujitsu801FJSBM801FJ
FujitsuTONE m17TONEm17
Fujitsu901FJYM901FJ
Fujitsuarrows M05arrowsM05
Fujitsuarrows RXarrowsRX
FxtecFxtec QX1000QX1000
GRID Communications (SG)GS6100GRID_GS6100
GSmartGX2GBC_ares
Gen2WaveRP70ARP70A
General MobileGM 9 PlusGM9PLUS_s
Gesellschaft für SMK mBHTough Mobilegranite
GeshemGS81TEGS81TE
GetnordLYNXLYNX
GigasetGS290GS290
GigasetGigaset GS3GS3
GigasetGX290GX290
GigasetGigaset GS4Gigaset_GS4
GinzzuRS9602RS9602
GioneeM7PlusGIONEE_BJ17G08A
GioneeGN3002GIONEE_GBL7356
GioneeGN3002LGIONEE_GBL7356L
GioneeM2017GIONEE_GBL8918
GioneeF106LGIONEE_SW17G03
GioneeGIONEE F109GIONEE_SW17G09
GioneeE8GiONEE_GN9008
GlocalmeS20iS20iQ19
GooglePixel 3blueline
GooglePixel 3a XLbonito
GooglePixel 4a (5G)bramble
GooglePixel 4 XLcoral
GooglePixel 3 XLcrosshatch
GooglePixel 4flame
GooglePixel XLmarlin
GooglePixel 5redfin
GooglePixelsailfish
GooglePixel 3asargo
GooglePixel 4asunfish
GooglePixel 2 XLtaimen
GooglePixel 2walleye
GoogleProject Tango Tablet Development Kityellowstone
GtelInfinity 7 PlusInfinity7Plus
GtelInfinity 7 ProInfinity7Pro
HOMTOMHT80HT80
HPPro Slate 10 EE G1bulldog
HPPro Slate 12dane
HPSlate 8 Prodogwood
HPPro Slate 8malamute
HPPro Slate 10 EE G1poodle
HTCHTC6435LVWdlx
HTCButterfly Sdlxpul
HTCNexus 9flounder
HTCNexus 9 LTEflounder_lte
HTCDesire 530htc_a16ul
HTCDesire 650htc_a17uhl
HTCDesire 620htc_a31ul
HTCDesire 626htc_a32dcgl
HTCDesire 626htc_a32ewl
HTCDesire 626htc_a32ewlpp
HTCDesire 626htc_a32ul
HTCDesire 626htc_a32ul_emea
HTCDesire 612htc_a3qhdcl
HTCDesire 610htc_a3qhdul
HTC HTC Desire 610htc_a3ul
HTC0PFJ50htc_a51tuhl
HTCDesire 820htc_a51ul
HTCDesire 826 dual simhtc_a52dwgl
HTCDesire 826htc_a52tuhl
HTCE9pwhtc_a55ml_dtul
HTCDesire 10 prohtc_a56dj_pro_dugl
HTCDesire 10 lifestylehtc_a56djuhl
HTCDesire 10 lifestylehtc_a56djul
HTCDesire 825 dual simhtc_a56dugl
HTCDesire 825htc_a56uhl
HTC710Chtc_a5chl
HTCD816ehtc_a5dugl
HTCD816vhtc_a5dwgl
HTCDesire 816htc_a5ul
HTC10 evohtc_acauhl
HTCU Playhtc_alpine_dugl
HTCU Playhtc_alpine_uhl
HTCButterfly 2htc_b2ul
HTCHTL23htc_b2wlj
HTCButterfly 3htc_b3tuhl
HTCHTV31htc_b3uhl
HTCDesire 12shtc_bre2dugl
HTCDesire 12shtc_bre2exdugl
HTCHTC Desire19+htc_bre2pdugl
HTCHTC Desire 20 Prohtc_bymdugl
HTCOne A9shtc_e36_ml_uhl
HTCOne A9shtc_e36_ml_ul
HTCHTC One X9 dual simhtc_e56ml_dtul
HTCOne X9htc_e56ml_tuhl
HTCOne X10htc_e66_dtwl
HTCOne X10htc_e66_dugl
HTCOne X10htc_e66_uhl
HTCEXODUS 1htc_exodugl
HTCEXODUS 1htc_exouhl
HTCDesire EYEhtc_eyetuhl
HTCDesire EYEhtc_eyeul
HTCDesire EYEhtc_eyeul_att
HTCU20 5Ghtc_flhdugl
HTCHTC U11 EYEshtc_haydtwl
HTCHTC U11 EYEshtc_haydugl
HTCOne A9htc_hiaeuhl
HTCOne A9htc_hiaeul
HTCOne A9htc_hiaewhl
HTCM9pwhtc_hiau_ml_tuhl
HTCOne M9+ (Prime Camera Edition)htc_hiaur2_ml_tuhl
HTCM9pxhtc_hiaur_ml_tuhl
HTCOne ME dual simhtc_hima_ace_ml_dtul
HTCOne S9htc_himar2uhl
HTCM9ehtc_himaruhl
HTCOne M9htc_himauhl
HTCOne M9htc_himaul
HTCOne M9htc_himaulatt
HTCOne M9htc_himawhl
HTCOne M9htc_himawl
HTCU12 +htc_imedtwl
HTCU12+htc_imedugl
HTCU12+htc_imeuhl
HTCU12+htc_imeuhljp
HTCU12 Lifehtc_imldugl
HTCOne (M8)htc_m8
HTCOne (M8) (4G LTE 双卡双待 联通版)htc_m8dug
HTCOne (M8)htc_m8dwg
HTCONE M8shtc_m8qlul
HTCM8thtc_m8tl
HTCOne (M8)htc_m8whl
HTCOne (M8)htc_m8wl
HTCOne (E8) dual simhtc_mecdug
HTCOne (E8)htc_mecdwg
HTCOne (E8)htc_mectl
HTCOne (E8)htc_mecul
HTCOne_E8htc_mecul_emea
HTCOne (E8)htc_mecwhl
HTCOne mini 2htc_memul
HTCOne remixhtc_memwl
HTCU Ultrahtc_ocedtwl
HTCU Ultrahtc_ocedugl
HTCU Ultrahtc_oceuhl
HTCHTC U11 lifehtc_ocla1_sprout
HTCU11 Lifehtc_ocluhljapan
HTCHTC U11 lifehtc_oclul
HTCHTC U11+htc_ocmdtwl
HTCHTC U11+htc_ocmdugl
HTCU11htc_ocndtwl
HTCU11htc_ocndugl
HTCU11htc_ocnuhl
HTCU11htc_ocnuhljapan
HTCU11htc_ocnwhl
HTC10htc_pmec2tuhl
HTCM10htc_pmeuhl
HTC10htc_pmeuhljapan
HTC10htc_pmewhl
HTC10htc_pmewl
HTCHTC Desire 20+htc_srcdugl
HTCHTC U19ehtc_tetdugl
HTCHTC Desire 21 pro 5Ghtc_thudugl
HTCHTC Desire 19shtc_zddugl
HTCOne Google Play editionm7
HTCOnem7cdtu
HTC9060m7cdug
HTCOne Dual Simm7cdwg
HTCJ Onem7wlj
HTCOnem7wls
HTCOnem7wlv
HTCOne maxt6ul
HTCOne maxt6whl
HTCHTCOneMaxVZWt6wl
HTCDesire 601zara
HTCDesire 601zaracl
HafuryG20G20
HafuryGT20GT20
HafuryK30K30
HafuryK30 PROK30_PRO
HaierI6_InfinityI6_Infinity
HaierPower P10P10
HaierTitan_T3Titan_T3
HaierHaier Titan T5Titan_T5
Handheld GroupALGIZ RT8ALGIZ_RT8
Handheld GroupNautiz_X2NAUTIZ_X2
Handheld GroupNAUTIZ_X6NAUTIZ_X6
Handheld GroupNAUTIZ X6NAUTIZ_X6P
Handheld GroupNautiz X41albatross_EEA
Handheld GroupNautiz X41albatross_GL
Handheld GroupAlgiz RT7algizRT7
Handheld GroupNautiz X2alta_EEA
Handheld GroupNautiz X2alta_GL
Handheld-WirelessX6X6
Hatch101S101S
HeroHERO 4ALLHERO_4ALL
HighScreenMax3Max3
HighScreenPowerFiveMax2PowerFiveMax2
HighScreenPowerFiveMaxLitePowerFiveMaxLite
HikingA23A23
HisenseE621TE621T
HisenseA5 ProHLTE203T
HisenseF22HS6737MT
HisenseHisense M36HS8909QC
HisenseL678HS8916QC
HisenseHisense E77HS8937QC
HisenseA2MHS8953QC
HisenseAGM  X2HS8976QC
HisenseAGM X3HSSDM845QC
HisenseSTARTRAIL 6 4GL681
HisenseCMB510L696
Hisensel691msm8226
HoneywellD75E75E-L0N
HoneywellCK65CK65-L0-C
HoneywellCK65CK65-L0-N
HoneywellCN80CN80-L0-C
HoneywellCN80CN80-L0-N
HoneywellCN80CN80-L1-C
HoneywellCN80CN80-L1-N
HoneywellCN85CN85-L1-C
HoneywellCT40CT40-L0-C
HoneywellCT40CT40-L0-CA
HoneywellCT40CT40-L1-C
HoneywellCT40P-L0-DCT40P-L0-D
HoneywellCT40PCT40P-L1-D
HoneywellCT50CT50L0N-CS15S
HoneywellCT50CT50L0N-CS16S
HoneywellCT50CT50LFN-CS16S
HoneywellCT50CT50LUN-CS15S
HoneywellCT50CT50LUN-CS16S
HoneywellCT60-L0-CCT60-L0-C
HoneywellCT60CT60-L0N-ASC
HoneywellCT60-L1N-CCT60-L1-C
HoneywellEDA40EDA40-0
HoneywellEDA40EDA40-1
HoneywellEDA51EDA51-0
HoneywellEDA51EDA51-1
HoneywellEDA51KEDA51K-0
HoneywellEDA51KEDA51K-1
HoneywellEDA71EDA71-0
HoneywellEDA71EDA71-1
HoneywellTA60ATA60A-L0-C
HoneywellTA60ATA60A-L1-C
HoneywellVM1AVM1A-L0-N
HoneywellVM1AVM1A-L0-P
HoneywellVM3AVM3A-L0-N
HoneywellVM3AVM3A-L0-P
HoneywellEDA50eda50-011
HoneywellEDA50eda50-111
HoneywellEdA50eda50-211
HoneywellEDA50Keda50k-0
HoneywellEDA50Keda50k-1
HoneywellEDA70eda70-0
HoneywellEDA70eda70-3
HuaweiChe1-L04Che1
Huawei荣耀畅玩5CHNNEM-H
HuaweiP20 ProHW-01K
HuaweiP30 ProHW-02L
HuaweiMate 10HWALP
HuaweiHUAWEI Y5 2019HWAMN-M
HuaweiHUAWEI P20 LiteHWANE
HuaweiHUAWEI Y6 Prime 2018HWATU-QG
HuaweiHonor 7AHWAUM-Q
Huaweinova 2 PlusHWBAC
HuaweiHonor V10HWBKL
HuaweiMate 10 ProHWBLA
Huawei荣耀畅玩 6XHWBLN-H
HuaweiY6IIHWCAM-H
Huawei荣耀畅玩5AHWCAM-Q
HuaweinovaHWCAN
HuaweiP20 ProHWCLT
HuaweiHonor 10HWCOL
HuaweiHonor PlayHWCOR
HuaweiMate SHWCRR
HuaweiHonor V9HWDUK
HuaweiHUAWEI P30HWELE
HuaweiP20HWEML
HuaweiP9HWEVA
HuaweiHuawei Mate 20 XHWEVR
Huawei华为畅享7SHWFIG-H
HuaweiHonor 8HWFRD
HuaweiP8HWGRA
HuaweiMate 20HWHMA
Huaweihonor 10 LiteHWHRY-H
HuaweiHONOR 10iHWHRY-HF
Huaweinova 2sHWHWI
HuaweiHonor 8AHWJAT-M
HuaweiHUAWEI Y9 2019HWJKM-H
Huawei荣耀 8XHWJSN-H
HuaweiHonor V8HWKNT
Huawei华为畅享8HWLDN-Q
Huawei荣耀9青春版HWLLD-H
HuaweiMate 9 ProHWLON
HuaweiMate 20 RSHWLYA
HuaweiHUAWEI P30 liteHWMAR
HuaweiMate 9HWMHA
Huaweinova plusHWMLA
HuaweiHUAWEI Y6 Pro 2019HWMRD-M1
HuaweiY6 2017HWMYA-L6737
HuaweiPORSCHE DESIGN HUAWEI Mate RSHWNEO
HuaweiGT3HWNMO-H
HuaweiHonor MagicHWNTS
HuaweiMate 8HWNXT
Huaweinova 3HWPAR
HuaweiHONOR V20HWPCT
HuaweiHUAWEI P smart+ 2019HWPOT-H
Huaweinova liteHWPRA-H
HuaweiG7 PlusHWRIO
HuaweiMate 10 liteHWRNE
HuaweiHonor Note10HWRVL
HuaweiSC-CL00HWSC-CL00
HuaweiHUAWEI Mate 20 liteHWSNE
HuaweiHonor 9HWSTF
HuaweiY9 Prime 2019HWSTK-HF
HuaweiHonor Magic 2HWTNY
HuaweiP9 PlusHWVIE
HuaweiP10 PlusHWVKY
HuaweiHonor 8 SmartHWVNS-H
HuaweiP30 ProHWVOG
HuaweiP10HWVTR
HuaweiP10 liteHWWAS-H
HuaweiHUAWEI nova 5THWYAL
HuaweiNexus 6Pangler
HuaweiP8 青春版hwALE-H
HuaweiP8 LitehwALE-Q
HuaweiC199hwC199
HuaweiC199shwC199s
HuaweiC8817DhwC8817D
HuaweiC8817EhwC8817E
HuaweiC8818hwC8818
HuaweiCHM-CL00hwCHM-Q
HuaweiG6-L11hwG6-L11
HuaweiG620S-L01hwG620S-L01
HuaweiG7-L01hwG7-L01
HuaweiG7-L11hwG7-L11
HuaweiH60-L04hwH60
HuaweiP7 minihwP7Mini
HuaweiPE-CL00hwPE
HuaweiGX8hwRIO-L01
HuaweiY635-L02hwY635
HuaweiMate2hwmt2-c00
HuaweiMT2-L01hwmt2-l01
HuaweiMT2-L02hwmt2-l02
HuaweiMT2-L05hwmt2-l05
HuaweiMate 7hwmt7
HuaweiP7hwp7
HyteraPDC550PDC550
HyteraPDM680PDM680
HyteraPNC550_P_TUPNC550
HyundaiHY1-5085HY1_5085
HyveBuzz BU01buzz_bu01
IDEMIAID ScreenID_Screen
INOIINOI_7_4_64_2021INOI_7_4_64_2021
ITOSIC-51IC_51
ITOSIC_55IC_55
ITOSIC_61IC_61
ITOSIT_51IT_51
IWRISTIWRIST_M8IWRIST_M8
IncoRouge1Rouge1
InfinixInfinix HOT 10S NFCInfinix-X689D
InfinixNOTE 10 ProInfinix-X695C
InfocusM330D77
InfocusBig TabIF195a
InfocusBig TabIF236a
InfocusM320M320
InfocusM518MC2_APT
InfocusM512MC2_CN
InfocusM510tTID
InfocusM511TID_CHT
InfocusM511TID_TWN
InfocusIN815VK3
InfocusIN810VKY
InfocusM812AVN2
InfocusM810VNA
InfocusVZHVZH
IsafeIS330IS330
IsafeIS520IS520
IsafeIS520.1IS520_1
IsafeIS530IS530
IsafeIS655IS655
IsafeIS910.1IS910_1
IsafeIS930IS930
JanamHT1HT1
JanamXG4XG4
JanamXT75XM75
JanamXT100XT100
JanamXT2XT2
JanamXT200XT200
JanamXT3XT3
JanamXT30XT30
JesyJ9SJ9S
JingaPass3GJI50AG1_189HP
JingaJinga Pass4GJI50AG2_189HP
JingaPass PlusJI55AG_189ID
JingaJoyPROJI55B_189BW
JingaPassPass
JingaPicasso NotePicassoNote
Juniper SystemsCedar CT8CT8
Juniper SystemsMesa3MS3A
KIRISUNKIRISUN T650T650
KaicomH702H702
KaicomK901K901
KapsysSmartVision2r889
KenwoodKWSA80KXP8800
KodakEktraKodakEktra
KoganKogan Agora XIAGORA_XI
KoganKogan Agora 8 PlusAgora_8_Plus
KoganAgora 6 PlusKogan_Agora_6Plus
KoganKogan Agora XSKogan_Agora_XS
Kruger&MatzDRIVE9DRIVE9
Kruger&MatzDRIVE_6DRIVE_6
Kruger&MatzDRIVE_6SSDRIVE_6S
Kruger&MatzDRIVE 8DRIVE_8
Kruger&MatzLive 8 EEALive_8
KyoceraHydro VIBEC6725
KyoceraHydro ICONC6730
KyoceraDuraForceE6560
KyoceraDuraForceE6560C
KyoceraDuraForceE6560L
KyoceraDuraForceE6560T
KyoceraTorqueXTE6715
KyoceraDuraForceE6762
KyoceraBrigadierE6782
KyoceraDuraScoutE6782L
KyoceraDuraForce XDE6790
KyoceraDuraForce PRO with Sapphire ShieldE6810
KyoceraDuraForce PRO with Sapphire ShieldE6810_3GB
KyoceraDuraForce PROE6820
KyoceraDuraForce PROE6820TM_3GB
KyoceraDuraForce PROE6820_3GB
KyoceraDuraForce PROE6830
KyoceraDuraForce PROE6833
KyoceraDuraForce PRO 2 with Sapphire shieldE6910
KyoceraDuraForce Pro 2E6920
KyoceraDuraForce Ultra 5GE7110
KyoceraTORQUEKC-100S
KyoceraTORQUE(KC-S701)KC-S701
KyoceraDURA FORCE PROKC-S702
KyoceraTORQUE(R) 5GKYG01
KyoceraURBANO V01KYV31
KyoceraINFOBAR A03KYV33
KyoceraURBANO V02KYV34
KyoceraTORQUE G02KYV35
KyoceraDIGNO rafreKYV36
KyoceraQua phone (KYV37)KYV37
KyoceraTORQUE G03KYV41
KyoceraBASIO 3KYV43
KyoceraURBANO V04KYV45
KyoceraTORQUE G04KYV46
KyoceraURBANO L03KYY23
KyoceraTORQUE G01KYY24
KyoceraS6S6-KC_sprout
KyoceraS8S8-KC_sprout
KyoceraX3X3-KC_sprout
LAMINALTT8A4G_EEALTT8A4G_EEA
LEOMOLEM-TS1 LMS
LGEDM-01GDM-01G
LGEDM-01KDM-01K
LGEDM-02HDM-02H
LGEQua phone PXJSG
LGEV20 PROL-01J
LGEV30+L-01K
LGELG style2L-01L
LGEJOJOL-02K
LGEL-03KL-03K
LGELG style3L-41A
LGELG V60 ThinQ 5GL-51A
LGELG VELVETL-52A
LGEQ92acelm
LGEK92acexlm
LGEAKAaka
LGELG G5 SEalicee
LGELG G8 ThinQâ„¢alphaamz
LGELG G8 ThinQâ„¢alphalm
LGELG G8 ThinQâ„¢alphaplus
LGEQ8anna
LGEG Pro2b1
LGEG Pro2b1w
LGELG G Vistab2l
LGEG3 Stylusb2ldsn
LGEGx2b2ln
LGEG3 Stylusb2lssn
LGELG Ubbg
LGEG8S ThinQbetalm
LGENexus 5Xbullhead
LGELG Classc100n
LGELG Leon 4G LTEc50n
LGELG Spirit 4G LTEc70n
LGELG Volt LTEc70w
LGELG G4cc90n
LGEVELVETcaymanlm
LGEVELVETcaymanslm
LGELG Premier Procv3
LGEX4+cv3n
LGELG Q7+cv5a
LGELG Q7+cv5an
LGEQ8cv7an
LGELG Stylo 5cv7as
LGELG Stylo 5+cv7as-pr
LGEK22dh0lm
LGESpraye2jps
LGEF60e2n
LGEG Pad 10.1e9wifin
LGEV20elsa
LGEOptimus F6f6
LGELG F70f70n
LGELG Q9falcon
LGEV50 ThinQflashlm
LGEV50 ThinQflashlmdd
LGESignatureflashsignaturelm
LGELG Optimus LTE3fx1sk
LGELG G2g2
LGEG2 MINIg2m
LGEG2 mini 4G LTEg2mv
LGELG G3g3
LGELG G Stylog4stylusdsn
LGELG G Stylog4stylusn
LGEG Stylog4stylusw
LGELG Optimus G Progeefhd
LGELG Optimus G Progeefhd4g
LGELG Optimus Ggeehrc
LGELG Optimus Ggeehrc4g
LGEOptimus GKgvfhd
LGELG G5h1
LGENexus 5hammerhead
LGEG3 Beatjagdsnm
LGEG3 Beatjagn
LGEG3 Vigorjagnm
LGEV30joan
LGELG G7 ThinQjudyln
LGELG V35 ThinQjudyp
LGEV40 ThinQjudypn
LGELG X screenk5
LGELG X screenk5n
LGELG X Stylek6b
LGELG X camk7
LGELG X camk7n
LGEL5000l5000
LGEL Finol70pn
LGELG Optimus L9 IIl9ii
LGEG3 Screenliger
LGELG G6lucye
LGEL50 Sportyluv50ssn
LGEG Pro Liteluv90nfc
LGELG X300lv3n
LGELG K20lv517n
LGELG X Venturelv9n
LGELG Phoenix 2m1v
LGELG K10m209n
LGELG K10m216n
LGELG K10 LTEm253n
LGENexus 4mako
LGEVELVETmcaymanlm
LGELG Q7mcv5a
LGEQStylusmcv7a
LGELG-K41Smdh15lm
LGELG Reflectmdh30lm
LGEK51Smdh35lm
LGEQ61mdh40lm
LGEStylo 6mdh50lm
LGELG K31mdh5lm
LGELM-K420meh15lm
LGEQ52meh35lm
LGEV50S ThinQmh2lm
LGELG Q70mh3
LGELG Q70mh3-pl
LGELG K40mh4x
LGEMY LG Mobilemh5lm
LGELG K30mh5lm-8m
LGELG Q6mhn
LGELG X maxmk6m
LGELG X power mk6p
LGELG X powermk6pn
LGELG X400mlv5n
LGELG X5mlv7n
LGELG K8 LTEmm1vn
LGELG K3 LTEmme0n
LGELM-X420mmh4
LGEK50Smmh45lm
LGELG Q60mmh4p
LGELM-X520mmh4p-pr
LGELG K40mmh4x
LGELG K40Smmh55lm
LGELG Stylus3msf3n
LGELG Gxomega
LGELG Gxomegar
LGELG G4p1
LGELG G4 Beatp1bdsn
LGELG G4 Beatp1bssn
LGELG G Vista 2p1v
LGELG Stylo 2ph1
LGELG Stylus2ph1n
LGELG Stylo 2 Plusph2n
LGELG G7 Onephoenix_sprout
LGEV10pplus
LGELG Stylo 3 Plussf340n
LGEX Machsjr
LGELG G Pad II 10.1 FHDt1wifin
LGELG G3 Cat.6tiger6
LGELG G3 Atigers
LGELG V60 ThinQtimelm
LGELG Optimus L7 IIvee7e
LGEOptimus Vu2vu2kt
LGEOptimus Vu2vu2sk
LGEOptimus Vu2vu2u
LGEVU3vu3
LGEL65w55n
LGEL70w5n
LGEL90 Dualw7dsn
LGEL90w7n
LGELG WINGwinglm
LGEG Vistax10
LGELG Voltx5
LGELG F570Syg
LGELG G Flex2z2
LGELG G Flexzee
LUMUSNEOSC600NEOSC600
Land RoverExploreLRExplore
Land RoverLand Rover Explore RLRExploreR
LeTVLe Maxmax1_in
LeagooXRoverXRover
LeagooXRover CXRover_C
LeecoLe Pro3le_zl1
LenovoA380tA380t
LenovoA5500A5500
LenovoVIBE X3 LiteA7010a48
LenovoK80MK80M
LenovoP1P1a42
LenovoP2P2a42
LenovoLenovo TAB3 10 PlusTB3-X70F
LenovoTB3-X70ITB3-X70I
LenovoLenovo TAB3 10 PlusTB3-X70L
LenovoX3c50X3c50
LenovoX3c70X3c70
LenovoA805eairplayep
LenovoLenovo Z5 Proheart
LenovoVIBE X3 Litek5fp
LenovoVIBE X3 Litek5fp_m
LenovoK920/VIBE Z2kingdom_row
LenovoK920/VIBE Z2 Prokingdomt
LenovoP2kuntao
Lenovo拯救者电竞手机moba
LenovoP1passion
LenovoS860eshelle
LenovoX3a40x3_row
LenovoZ2z2r
LenovoZ2z2t
LenovoZ2wz2w
LenovoLenovo-9zap
Logic InstrumentLogic Instrument Fieldbook 57lifb57
Logic InstrumentFieldbook F1lifbf1
Logic InstrumentFieldbook F53lifbf53
Logic InstrumentFieldbook K80lifbk80
Logic InstrumentLogic Instrument Fieldbook KS80lifbks80
Logic InstrumentLogic Instrument Fieldbook N101lifbn101
Logic InstrumentLogic Instrument Fieldbook N80lifbn80
LogitecLZ-AA10LZ-AA10
LumigonT3Lumigon_T3
LumigonT2 HDT2HD
LyfLS-4511LS-4511
LyfLS-5027LS-5027
M3 MobileM3-SL10M3-SL10
M3 MobileM3SL10M3SL10
M3 MobileM3SM15N_EEAM3SM15N
M3 MobileM3SM15X_EEAM3SM15X
M3 MobileM3UL20F_EEAM3UL20F
M3 MobileM3UL20W_EEAM3UL20W
M3 MobileM3UL20X_EEAM3UL20X
M3 MobileM3 US20WM3US20W
M3 MobileM3 US20XM3US20X
MDC StorePrime_SPrime_S
MLS InnovationIQS805iQS805
MTR (MY)MT9MT9
MalataUV350UV350
MantraMFSTABIIMFSTABII
MantraMFSTABIVMFSTABIV
MantraMOXA71MOXA71
Mara PhonesMara Phones RMaraPhones_R
Mara PhonesMara X1Mara_X1
Mara PhonesMara X1 dMara_X1_d
Mara PhonesMara  Z1Mara_Z1
Mara PhonesMara Z1 MTMara_Z1_MT
Mara PhonesMara Z1 dMara_Z1_d
MaxcomMS507_STRONGMS507_STRONG
MaxcomMS515MS515
MaxcomMS571MS571_plus
MaxisNeXT M2VFD610
MaxisNeXT X1VFD710
MecerMK7000ProMK7000PRO
MedionS5504B5531
MeituV4V4
MeituV4sV4s
MeituMeitu V6Vivian
MeituMI CC 9 Meitu Editionvela
Meizu16s16s
Meizu16s promeizu16sPro
Meizumeizu 17meizu17
Meizumeizu 17 Promeizu17Pro
MeizuMEIZU 18meizu18
Meizumeizu 18 Promeizu18Pro
MiTACN651centaur
MiTACN635chiron_pro
MiTACN672hera_pro
MiTACN630surfing_pro
MinttULTRAMINTT Y3ULTRAMINTT_Y3
MinttULTRAMINTT Y5ULTRAMINTT_Y5
MobiIoTHotahHotahOTG_N
MobiIoTHotahHotahOTG_V
MobiIoTMobigo2MobiGo2
MobiwireHawk from EEHawk_from_EE
MobiwireHotahHotah
Mode1MD-04PMD-04P
MotorolaMoto Z Play Droidaddison
MotorolaMoto Z (2) Playalbus
Motorolamoto g(6)ali_n
Motorolamoto g(6) playaljeter_n
MotorolaMotorola Defybathena
Motorolamoto z3 playbeckham
Motorolamotorola edge plusburton
Motorolamoto g(10)capri
Motorolamoto g(30)caprip
Motorolamoto g(9) powercebu
MotorolaMoto X Styleclark
MotorolaMoto X Styleclark_ds
MotorolaMotorola onedeen_sprout
Motorolamotorola one hyperdef
Motorolamoto g(8) plusdoha_n
Motorolamoto g(6) plusevert_n
Motorolamoto g(6) plusevert_nt
Motorolamoto z4foles
MotorolaMoto X (1st Gen)ghost
MotorolaMoto Z Droidgriffin
Motorolamoto g(9) playguamp
Motorolamoto g40 fusionhanoip
MotorolaMoto G (4) Playharpia_n
MotorolaRAZR D3hawk40_umts
Motorolamoto g50ibiza
Motorolamotorola p50kane
Motorolamotorola one visionkane_sprout
Motorolamoto g 5Gkiev
MotorolaDROID Turbo 2kinzie
MotorolaMoto X Forcekinzie_uds
MotorolaMoto X Playlux
MotorolaMoto X Playlux_uds
MotorolaMoto Z(3)messi
MotorolaMoto G (5S)montana_n
Motorolamotorola one 5G UWnairo
MotorolaMoto Z (2) Forcenash
MotorolaMoto E (4) Plusnicklaus_fn
Motorolamotorola edge snio
Motorolamoto e5nora_8917_n
MotorolaDroid Ultraobake
MotorolaDroid MAXXobake-maxx
MotorolaDroid Miniobakem
Motorolamoto g(7) powerocean_n
Motorolamoto g(9) plusodessa
Motorolamotorola razrolson
Motorolamotorola one zoomparker
MotorolaMoto X (4)payton
MotorolaMoto X (4)payton_sprout
MotorolaMoto G (5) Pluspotter_n
MotorolaMoto G Plus (5th Gen)potter_nt
MotorolaDroid Turboquark
MotorolaMoto MAXXquark_umts
Motorolamotorola edgeracer
Motorolamoto g(7)river_n
MotorolaMoto G (5S) Plussanders_n
MotorolaMoto G (5S) Plussanders_nt
MotorolaDROID RAZR Mscorpion_mini
MotorolaNexus 6shamu
MotorolaMoto X Pro (China)shamu_t
MotorolaDROID RAZR ismi
Motorolamotorola razr 5Gsmith
MotorolaRAZR Msmq
MotorolaXT905smq_u
Motorolamoto g prosofiap_sprout
MotorolaElectrify Msolstice
Motorolamotorola one actiontroika
Motorolamotorola one actiontroika_sprout
MotorolaRAZR HDvanquish
MotorolaDROID RAZR HDvanquish_u
MotorolaMoto X (2nd Gen)victara
MotorolaMoto E (4)woods_fn
Motorola SolutionsLEX F10LEXF10
Motorola SolutionsLEX L11lexl11g_64
MyPhone (PL)Hammer AXE PROHammer_AXE_Pro_OPM
MyPhone (PL)Hammer Blade 2 ProHammer_Blade2_PRO
MyPhone (PL)Hammer_ExplorerHammer_Explorer
MyPhone (PL)Hammer IRON 3 LTEHammer_IRON_3_LTE
MyPhone (PL)Hammer_IRON_3_LTEHammer_IRON_3_LTEv2
MyPhone (PL)myPhone Prime 3myPhone_Prime_3
MyphoneHammer AXE M LTEAXE_M_LTE_OPM
MyphoneHammer Active 2 LTEHammer_Active2_LTE
MyphoneHammer Energy 18×9Hammer_Energy_18x9
MyphoneHammer Energy 2Hammer_Energy_2
MyphoneHammer Explorer ProHammer_Expl_Pro
MyphonemyPhone Now eSIMmyPhone_Now_eSIM
NOA MobileHummerHummer
NOA MobileHummer_2019_RHummer_2019_R
NabiDreamTab HD8 TabletDMTAB
NabiBig Tab HDâ„¢ 20″DMTAB-NV20A
NabiBig Tab HDâ„¢ 24″DMTAB-NV24A
Nabi2S Tabletnabi2S
NabiDreamTab HD8 Tablett8400n
NewlandNLS-MT6550-AMNLS-MT6550-AM
NewlandNLS-MT6552-EEANLS-MT6552-EEA
NewlandNLS-MT6552-GLNLS-MT6552-GL
NewlandNLS-MT6552-RUNLS-MT6552-RU
NewlandNewland NLS-MT90NLS-MT90-GL
NewlandNewland NLS-N7NLS-N7-GL
NewlandNLS-NFT10NLS-NFT10-GL
NewlandNLS-NFT10NLS-NFT10-RU
NextbitRobinether
NextgearNextgear n1Nextgear_n1
NoblexN601N601
NokiaNokia 8 SiroccoA1N
NokiaNokia 8 SiroccoA1N_sprout
NokiaNokia 9AOP
NokiaNokia 9AOP_sprout
NokiaNokia 7 plusB2N
NokiaNokia 7 plusB2N_sprout
NokiaNokia 8.3 5GBGT
NokiaNokia 8.3 5GBGT_sprout
NokiaNokia 7C1N
NokiaNokia 5.3CAP
NokiaNokia 5.3CAP_sprout
NokiaNokia 5.1CO2N_sprout
NokiaNokia 7.1CTL_sprout
NokiaNokia 7.2DDV_sprout
NokiaNokia 5.4DRD
NokiaNokia 5.4DRD_sprout
NokiaNokia 3.4DRS
NokiaNokia 3.4DRS_sprout
NokiaNokia 3.1ES2N_sprout
NokiaNokia 8NB1
NokiaNokia 5ND1
NokiaNokia 3NE1
NokiaNokia 4.2PAN_sprout
NokiaNokia 6PL2
NokiaNokia 6.1PL2_sprout
NokiaNokia 6PLE
NokiaNokia 8.1PNXN
NokiaNokia 8.1PNX_sprout
NokiaNokia 4.2Panther_00EEE
NokiaNokia X20QKS
NokiaNokia X20QKS_sprout
NokiaNokia 8 V 5G UWRAV_VZW
NokiaNokia 3.1 PlusRHD
NokiaNokia G20RNN
NokiaNokia G20RNN_sprout
NokiaNokia 3.1 PlusROON_sprout
NokiaNokia X10SCW
NokiaNokia X10SCW_sprout
NokiaNokia 6.2SLD_sprout
NomuM8M8
NomuS50 ProS50_Pro
NomuV31V31
NomuV31EV31E
NovinsunN11N11
NuAnsNEO [Reloaded]NEO2
NuuA5L+N5501LE
NuuNUU G3N5702L
NuuG4N6201L
OASYSTEG9300-5TEG9300-5
OnePlusOneA0001
OnePlusOnePlus NordNord
OnePlusOnePlus 7 ProOP7ProNRSpr
OnePlusOnePlus3OnePlus3
OnePlusOnePlus3TOnePlus3T
OnePlusOnePlus5OnePlus5
OnePlusOnePlus5TOnePlus5T
OnePlusOnePlus 6OnePlus6
OnePlusOnePlus6TOnePlus6T
OnePlusOnePlus6TOnePlus6TSingle
OnePlusOnePlus 7OnePlus7
OnePlusOnePlus 7 ProOnePlus7Pro
OnePlusOnePlus 7 Pro 5GOnePlus7ProNR
OnePlusOnePlus 7 ProOnePlus7ProTMO
OnePlusOnePlus 7TOnePlus7T
OnePlusOnePlus 7T ProOnePlus7TPro
OnePlusOnePlus 7T Pro 5GOnePlus7TProNR
OnePlusOnePlus 7TOnePlus7TTMO
OnePlusOnePlus 8OnePlus8
OnePlusOnePlus 8 ProOnePlus8Pro
OnePlusOnePlus 8TOnePlus8T
OnePlusOnePlus 8 5G OnePlus8TMO
OnePlusOnePlus 8T+ 5GOnePlus8TTMO
OnePlusOnePlus 8 5G UWOnePlus8VZW
OnePlusOnePlus 8OnePlus8Visible
OnePlusOnePlus 9 5GOnePlus9
OnePlusOnePlus 9 ProOnePlus9Pro
OnePlusOnePlus 9 Pro 5GOnePlus9ProTMO
OnePlusOnePlus 9 5GOnePlus9TMO
OnePlusOnePlus Nord N10 5GOnePlusN10
OnePlusOnePlus Nord N10 5GOnePlusN10METRO
OnePlusOnePlus Nord N10 5GOnePlusN10TMO
Oppo30003000
Oppo30073007
OppoA37tA37
OppoR15 ProCPH1831
OppoR15 ProCPH1833
OppoR15 ProCPH1833L1
OppoR17 ProCPH1877
OppoX9077FIND7
OppoN1N1
OppoN3N3
OppoReno Z 中国版OP4699
OppoReno 标准版OP46B1
OppoReno 10倍变焦版OP46C3
OppoReno AOP47CFL1
OppoRenoOP47DD
OppoRenoOP47DDL1
OppoReno 10x ZoomOP4845
OppoReno 10x ZoomOP4845L1
OppoReno 10x roomOP4847
OppoReno 10x RoomOP4847L1
OppoReno ZOP48A1
OppoReno ZOP48A1L1
OppoReno2 Z 中国版OP4A43
OppoReno4 中国版OP4A47
OppoA11x 中国版OP4A54
OppoReno 2 中国版OP4A57
OppoFind X2 中国版OP4A77
OppoFind X2 Pro 中国版OP4A7A
OppoReno AceOP4A89
OppoReno3 Pro 5G中国版OP4A9D
OppoK5OP4AA7
OppoReno3 元气版 5GOP4AB5
OppoReno Ace2OP4AD9
OppoReno3 5G 中国版OP4ADD
OppoReno4 Pro 中国版OP4AF7
OppoReno2 ZOP4B65L1
OppoA5 2020OP4B79L1
OppoA9 2020OP4B80L1
OppoReno 2OP4B83L1
OppoReno3OP4B9EL1
OppoFind X2OP4BA1L1
OppoFind X2 ProOP4BA2L1
OppoReno3 AOP4BAFL1
OppoReno 4Z 5GOP4BDCL1
OppoFind X2 Neo/Reno3 Pro OP4C2DL1
OppoFind X2 LiteOP4C41L1
OppoReno4 5GOP4C45L1
OppoA93OP4C51L1
OppoA72OP4C72L1
OppoA52OP4C7BL1
OppoReno4 Pro 5GOP4C87L1
OppoFind X3 Pro 中国版OP4E3F
OppoFind X3 中国版OP4E5D
OppoReno5 Pro 5GOP4EA3
OppoOPPO Reno5 Pro+ 5GOP4EA7
OppoA53OP4EFDL1
OppoReno5 pro 5GOP4F0BL1
OppoA74OP4F11L1
OppoOPPO Reno5 5GOP4F1BL1
OppoReno5OP4F25L1
OppoA94OP4F43L1
OppoFind X3 ProOP4F57L1
OppoR17 ProPBDM00
OppoR17 ProPBDT00
OppoA7nPCDT00
Opporealme X50 5GRMX2051CN
OppoX9000X9000
OppoX9006X9006
OppoX9007X9007
OppoX9070X9070
OppoX9076X9076
OppoX9077X9077
OpticonH-31h31
OpticonH-33h33
OrangeRise52BUZZ6T4G
OrangeNuraM812
OrangeNeva Rise S1Neva_Rise_S1
OrangeOrange Neva leafNeva_leaf
OrangeOrange Neva playNeva_play
OrangeNeva startNeva_start
OrangeOrange Neva zenNeva_zen
OrangeDive 71Orange_Dive_71
OrangeNeva 80Orange_Neva_80
OrangeRise51PIXI4_5_4G
OrangeRise_54Rise_54
OrangeNura2m823_orange
OrdissimoOrdissimo LeNumero2LeNumero2
OukitelC12 PlusC12_Plus
OukitelK10K10
OukitelK12K12
OukitelK13 ProK13_Pro
OukitelK15 PlusK15_Plus
OukitelK6K6
OukitelWP10WP10
OukitelWP2WP2
OukitelWP7WP7
OukitelWP8_ProWP8_Pro
POCOPOCO X3karna
POCOPOCO F2 Prolmi
POCOPOCO X3 NFCsurya
POCOPOCO X3 Provayu
POPTELPOPTEL P10P10
POPTELP60P60
POPTELP8P8
POPTELP9000 MAXP9000_MAX
PanasonicLUMIX CM1DMC-CM1
PanasonicFZ-A3FZ-A3
PanasonicFZ-L1FZ-L1AN
PanasonicFZ-L1FZ-L1AUN_A
PanasonicFZ-L1FZ-L1UN
PanasonicFZ-N1FZ-N1
PanasonicFZ-N1FZ-N1E
PanasonicFZ-N1FZ-N1EVU
PanasonicFZ-N1FFZ-N1F
PanasonicFZ-N1FZ-N1VU
PanasonicFZ-N1FZ-N1VUC
PanasonicFZ-N1FZ-N1VUF
PanasonicFZ-T1FZ-T1AN
PanasonicFZ-T1FZ-T1EUN
PanasonicFZ-T1FZ-T1VUN
PanasonicFZ-X1FZ-X1
PanasonicFZ-X1FZ-X1VU
PanasonicFZ-X1FZ-X1VUC
PanasonicP-01KP-01K
PantechIM-A880SEF56S
PantechVEGA Secret NoteEF59K
PantechVEGA Secret NoteEF59L
PantechVEGA Secret NoteEF59S
PantechIM-A850Sef48s
PantechIM-A850Kef49k
PantechIM-A850Lef50l
PantechIM-A860Kef51k
PantechIM-A860Lef51l
PantechIM-A860Sef51s
PantechIM-A870Kef52k
PantechIM-A870Lef52l
PantechIM-A870Sef52s
PantechVEGA Secret UPef60s
PantechVEGA Secret UPef61k
PantechVEGA Secret UPef62l
PantechIM-A910Kef63k
PantechIM-A910Lef63l
PantechIM-A910Sef63s
PantechIM-A920Sef65s
PantechIM-100GNef71g
PantechIM-100Kef71k
PantechIM-100Sef71s
Phone MaxRocky_1Rocky_1
Phone MaxS4GS4G
Phone MaxX1X1
Planet ComputersCosmo_CommunicatorCosmo_Communicator
PlusoneKiwamiFTJ152D
Point MobilePM451PM451
Point MobilePM30pm30
Point MobilePM45pm45
Point MobilePM45Epm45e
Point MobilePM66pm66
Point MobilePM70pm70
Point MobilePM80pm80
Point MobilePM85pm85
Point MobilePM90pm90
PokiniK6K6
PolytronP500P500
PosiflexMK_1000MK_1000
QMobileE8GBL5805QM
QuantumQSPT-1952QF3A
RakutenC330C330
RakutenRakuten HandP710
RatelCellCell
RazerPhone 2aura
RazerPhone 2bolt
RazerRazer Phonecheryl
RazerRazer phonecheryl_ckh
RazerPhone 2linus
Realmerealme 7iRE50C1
Realmerealme 7iRE50C1L1
Realmerealme 8 5GRE513CL1
Realmerealme 5RMX1915
Realmerealme XTRMX1921
Realmerealme XTRMX1921L1
Realmerealme 5RMX1927
Realmerealme X2ProRMX1931CN
Realmerealme X2ProRMX1931L1
Realmerealme X2RMX1991CN
Realmerealme X2RMX1993L1
Realmerealme 6RMX2001L1
Realmerealme 6RMX2002L1
Realmerealme C3RMX2020
Realmerealme X50 5G 移动版RMX2025CN
Realmerealme 6iRMX2040
Realmerealme X50t 5GRMX2052CN
Realmerealme 6ProRMX2063L1
Realmerealme X50 ProRMX2071CN
Realmerealme X50 Pro PlayRMX2072CN
Realmerealme X50 ProRMX2075L1
Realmerealme X50 ProRMX2076L1
Realmerealme X3RMX2083L1
Realmerealme X3RMX2086L1
Realmerealme 7 5GRMX2111L1
Realmerealme  X7 Pro RMX2121CN
Realmerealme X50m 5GRMX2142CN
Realmerealme X50 5GRMX2144L1
Realmerealme 7 ProRMX2170L1
Realmerealme C15RMX2180
Realme真我GTRMX2202CN
Realme真我GT NeoRMX3031CN
Realmerealme 8 ProRMX3081L1
Realmerealme 8RMX3085L1
Realme真我X7Pro 至尊版RMX3115CN
RedmiRedmi K40alioth
RedmiRedmi 9C NFCangelican
RedmiRedmi K30S Ultraapollo
RedmiRedmi K40 Gamingares
RedmiRedmi Note 8 Probegonia
RedmiRedmi 10X probomb
RedmiRedmi Note 10 5Gcamellian
RedmiRedmi Note 9Tcannong
RedmiRedmi K30 Ultracezanne
RedmiRedmi K20davinci
RedmiRedmi 9galahad
RedmiRedmi Note 9 progauguinpro
RedmiRedmi K40 Pro +haydn
RedmiRedmi Note 9 Projoyeuse
RedmiRedmi 9Tlemon
RedmiK30 PROlmi
RedmiRedmi Note 9merlinnfc
RedmiRedmi K30phoenix
RedmiRedmi K30 5Gpicasso
RedmiRedmi K20 Proraphael
RedmiRedmi Note 10 Prosweet
RedmiRedmi Note 8Twillow
ReederP13 Max BlueP13_Max_Blue
RemdunRD15PQERD15PQE
RemdunRD-52RD52
RemdunRD52ERD52E
RemdunRD86ERD86E
RhinoC10Rhino_C10
RhinoT8Rhino_T8
RoyaltekFGADFGAD
RuggONMT7030MT7030
RuggONPA501PA501BG
RuggONPA501PA501BW
RuggearPSM01EPSM01E
RuggearRG655RG655
RuggearRG720RG720
RuggearRG725_Q_EEARG725
RuggearRG760RG760
RuggearRG910RG910
RuggearDEWALT MD501md501
RuggearRugGear rg730rg730
RunboF1PlusF1Plus
S&T GlobalC20C20
SEWOONBP_65NBP_65
SFRSTARADDICT 4staraddict4
SHIFTSHIFT6mSHIFT6m
SHIFTSHIFT6mqaxolotl
SUPOINS66S66
SamsungGalaxy S6 Edge404SC
SamsungGalaxy Note3SC-01F
SamsungGalaxy Note EdgeSC-01G
SamsungGalaxy Active neoSC-01H
SamsungGalaxy Note7SC-01J
SamsungGalaxy Note8SC-01K
SamsungGalaxy Note9SC-01L
SamsungGalaxy Note10+SC-01M
SamsungGalaxy Note3SC-02F
SamsungGalaxy S5 ActiveSC-02G
SamsungGalaxy S7 EdgeSC-02H
SamsungGalaxy S8SC-02J
SamsungGalaxy S9SC-02K
SamsungGalaxy Feel2SC-02L
SamsungGalaxy A20SC-02M
SamsungGalaxy S8+SC-03J
SamsungGalaxy S9+SC-03K
SamsungGalaxy S10SC-03L
SamsungGalaxy S4SC-04E
SamsungGalaxy S5SC-04F
SamsungGalaxy S6 EdgeSC-04G
SamsungGalaxy FeelSC-04J
SamsungGalaxy S10+SC-04L
SamsungGalaxy S6SC-05G
SamsungGalaxy S10+ Olympic Games EditionSC-05L
SamsungGalaxy A41SC-41A
SamsungGalaxy A21SC-42A
SamsungGalaxy S20 5GSC-51A
SamsungGalaxy S21 5GSC-51B
SamsungGalaxy S20+ 5GSC-52A
SamsungGalaxy S21 Ultra 5GSC-52B
SamsungGalaxy Note20 Ultra 5GSC-53A
SamsungGalaxy A51 5GSC-54A
SamsungGalaxy S20 5GSC51Aa
SamsungGalaxy S20 5GSCG01
SamsungGalaxy S20+ 5GSCG02
SamsungGalaxy S20 Ultra 5GSCG03
SamsungGalaxy Z Flip 5GSCG04
SamsungGalaxy Note20 Ultra 5GSCG06
SamsungGalaxy A51 5GSCG07
SamsungGalaxy A32 5GSCG08
SamsungGalaxy S21 5GSCG09
SamsungGalaxy S21+ 5GSCG10
SamsungGalaxy Note3SCL22
SamsungGalaxy S5SCL23
SamsungGalaxy Note EdgeSCL24
SamsungGalaxy TabS 10.5SCT21
SamsungGalaxy S6 EdgeSCV31
SamsungGalaxy A8SCV32
SamsungGalaxy S7 EdgeSCV33
SamsungGalaxy Note7SCV34
SamsungGalaxy S8+SCV35
SamsungGalaxy S8SCV36
SamsungGalaxy Note8SCV37
SamsungGalaxy S9SCV38
SamsungGalaxy S9+SCV39
SamsungGalaxy Note9SCV40
SamsungGalaxy S10SCV41
SamsungGalaxy S10+SCV42
SamsungGalaxy A30SCV43
SamsungGalaxy A30SCV43-j
SamsungGalaxy A30SCV43-u
SamsungGalaxy FoldSCV44
SamsungGalaxy Note10+SCV45
SamsungGalaxy A20SCV46
SamsungGalaxy Z FlipSCV47
SamsungGalaxy A41SCV48
SamsungGalaxy A21SCV49
SamsungGalaxy A02sa02q
SamsungGalaxy A10a10
SamsungGalaxy A10ea10ekx
SamsungGalaxy A11a11q
SamsungGalaxy A12a12
SamsungGalaxy A12a12u
SamsungGalaxy A20a20
SamsungGalaxy A20ea20e
SamsungGalaxy A20a20p
SamsungGalaxy A21a21
SamsungGalaxy A21sa21s
SamsungGalaxy A30a30
SamsungGalaxy A30sa30s
SamsungGalaxy A31a31
SamsungGalaxy A32a32
SamsungGalaxy A32 5Ga32x
SamsungGalaxy A3a3lte
SamsungGalaxy A3a3ltectc
SamsungGalaxy A3a3ltedd
SamsungGalaxy A3a3lteslk
SamsungGalaxy A3a3ulte
SamsungGalaxy A3(2016)a3xelte
SamsungGalaxy A3(2016)a3xeltekx
SamsungGalaxy A3(2017)a3y17lte
SamsungGalaxy A40a40
SamsungGalaxy A41a41
SamsungGalaxy M42 5Ga42xq
SamsungGalaxy A42 5Ga42xuq
SamsungGalaxy A50a50
SamsungGalaxy A50sa50s
SamsungGalaxy A51a51
SamsungGalaxy A51 5Ga51x
SamsungGalaxy A51 5Ga51xq
SamsungGalaxy A52a52q
SamsungGalaxy A52 5Ga52xq
SamsungGalaxy A5a5lte
SamsungGalaxy A5a5ltectc
SamsungGalaxy A5a5ulte
SamsungGalaxy A5a5ultebmc
SamsungGalaxy A5a5ultektt
SamsungGalaxy A5a5ultelgt
SamsungGalaxy A5a5ulteskt
SamsungGalaxy A5(2016)a5xelte
SamsungGalaxy A5(2016)a5xeltecmcc
SamsungGalaxy A5(2016)a5xeltektt
SamsungGalaxy A5(2016)a5xeltelgt
SamsungGalaxy A5(2016)a5xelteskt
SamsungGalaxy A5(2016)a5xeltextc
SamsungGalaxy A5(2016)a5xltechn
SamsungGalaxy A5(2017)a5y17lte
SamsungGalaxy A5(2017)a5y17ltecan
SamsungGalaxy A5(2017)a5y17ltektt
SamsungGalaxy A5(2017)a5y17ltelgt
SamsungGalaxy A5(2017)a5y17lteskt
SamsungGalaxy A60a60q
SamsungGalaxy A6a6elteaio
SamsungGalaxy A6a6elteatt
SamsungGalaxy A6a6eltemtr
SamsungGalaxy A6a6eltespr
SamsungGalaxy A6a6eltetmo
SamsungGalaxy A6a6elteue
SamsungGalaxy A6a6lte
SamsungGalaxy A6a6lteks
SamsungGalaxy A6+a6plte
SamsungGalaxy A9 Star Litea6pltechn
SamsungGalaxy A9 Star Litea6pltecmcc
SamsungGalaxy Jeana6pltektt
SamsungGalaxy A70a70q
SamsungGalaxy A70sa70s
SamsungGalaxy A71a71
SamsungGalaxy A Quantuma71x
SamsungGalaxy A71 5Ga71xq
SamsungGalaxy A72a72q
SamsungGalaxy A7a7alte
SamsungGalaxy A7a7lte
SamsungGalaxy A7a7ltechn
SamsungGalaxy A7a7ltectc
SamsungGalaxy A7a7ltektt
SamsungGalaxy A7a7ltelgt
SamsungGalaxy A7a7lteskt
SamsungGalaxy A7(2016)a7xelte
SamsungGalaxy A7(2016)a7xeltecmcc
SamsungGalaxy A7(2016)a7xeltektt
SamsungGalaxy A7(2016)a7xeltelgt
SamsungGalaxy A7(2016)a7xelteskt
SamsungGalaxy A7(2016)a7xeltextc
SamsungGalaxy A7(2016)a7xltechn
SamsungGalaxy A7(2017)a7y17lte
SamsungGalaxy A7(2017)a7y17lteskt
SamsungGalaxy A7 (2018)a7y18lte
SamsungGalaxy A7 (2018)a7y18lteks
SamsungGalaxy A7a7y18ve
SamsungGalaxy Quantum2a82xq
SamsungGalaxy A8a8elteskt
SamsungGalaxy A8a8ltechn
SamsungGalaxy A8sa8sqlte
SamsungGalaxy A8sa8sqltechn
SamsungGalaxy A9 Proa8sqlteks
SamsungGalaxy A8(2016)a8xelte
SamsungGalaxy A8(2016)a8xelteskt
SamsungGalaxy A9(2016)a9xltechn
SamsungGalaxy A9 Proa9xproltechn
SamsungGalaxy A9 Proa9xproltesea
SamsungGalaxy A9 (2018)a9y18qlte
SamsungGalaxy A9 2018a9y18qltechn
SamsungGalaxy A9 (2018)a9y18qltekx
SamsungGalaxy CoreafyonlteMetroPCS
SamsungGalaxy Coreafyonltecan
SamsungGalaxy Avantafyonltetmo
SamsungGalaxy A8 Starastarqlte
SamsungGalaxy A8 Starastarqltechn
SamsungGalaxy A9 Starastarqltecmcc
SamsungGalaxy A8 Starastarqlteskt
SamsungGalaxy S10ebeyond0
SamsungGalaxy S10ebeyond0q
SamsungGalaxy S10beyond1
SamsungGalaxy S10beyond1q
SamsungGalaxy S10+beyond2
SamsungGalaxy S10+beyond2q
SamsungGalaxy S10 5Gbeyondx
SamsungGalaxy S10 5Gbeyondxq
SamsungGalaxy Z Flipbloomq
SamsungGalaxy Z Flip 5Gbloomxq
SamsungGalaxy S3c1ktt
SamsungGalaxy S3c1lgt
SamsungGalaxy Note20 5Gc1q
SamsungGalaxy Note20c1s
SamsungGalaxy S3c1skt
SamsungGalaxy Note20 Ultra 5Gc2q
SamsungGalaxy Note20 Ultrac2s
SamsungGalaxy C5c5ltechn
SamsungGalaxy C5c5pltechn
SamsungGalaxy C5 Proc5proltechn
SamsungGalaxy C7c7ltechn
SamsungGalaxy C7 Proc7prolte
SamsungGalaxy C7 Proc7proltechn
SamsungGalaxy C9 Proc9lte
SamsungGalaxy C9 Proc9ltechn
SamsungGalaxy Core Primecoreprimelte
SamsungGalaxy Core Primecoreprimevelte
SamsungGalaxy Note9crownlte
SamsungGalaxy Note9crownlteks
SamsungGalaxy Note9crownqltechn
SamsungGalaxy Note9crownqltecs
SamsungGalaxy Note9crownqltesq
SamsungGalaxy Note9crownqlteue
SamsungGalaxy S8 Activecruiserlteatt
SamsungGalaxy S8 Activecruiserltesq
SamsungGalaxy Note10d1
SamsungGalaxy Note10d1q
SamsungGalaxy Note10 5Gd1x
SamsungGalaxy Pocket Neod2aio
SamsungGalaxy S3d2att
SamsungGalaxy S3d2can
SamsungGalaxy S3d2cri
SamsungGalaxy S3d2lterefreshspr
SamsungGalaxy Note10+d2q
SamsungGalaxy Note10+d2s
SamsungGalaxy S3d2spi
SamsungGalaxy S3d2spr
SamsungGalaxy S3d2usc
SamsungGalaxy S3d2vmu
SamsungGalaxy S3d2vzw
SamsungGalaxy Note10+ 5Gd2x
SamsungGalaxy Note10+ 5Gd2xq
SamsungGalaxy Note10+ 5Gd2xq2
SamsungGalaxy S8+dream2lte
SamsungGalaxy S8+dream2lteks
SamsungGalaxy S8+dream2qltecan
SamsungGalaxy S8+dream2qltechn
SamsungGalaxy S8+dream2qltesq
SamsungGalaxy S8+dream2qlteue
SamsungGalaxy S 轻奢版dreamliteqltechn
SamsungGalaxy S8dreamlte
SamsungGalaxy S8dreamlteks
SamsungGalaxy S8dreamqltecan
SamsungGalaxy S8dreamqltechn
SamsungGalaxy S8dreamqltecmcc
SamsungGalaxy S8dreamqltesq
SamsungGalaxy S8dreamqlteue
SamsungGalaxy E5e5lte
SamsungGalaxy E5e5ltetfnvzw
SamsungGalaxy E5e5ltetw
SamsungGalaxy E7e7lte
SamsungGalaxy E7e7ltechn
SamsungGalaxy E7e7ltectc
SamsungGalaxy E7e7ltehktw
SamsungGalaxy Z Fold2 5Gf2q
SamsungGalaxy F62f62
SamsungGalaxy Roundflteskt
SamsungGalaxy Grand Primefortunalte
SamsungGalaxy Grand Primefortunaltectc
SamsungGalaxy Grand Primefortunaltezh
SamsungGalaxy Grand Primefortunaltezt
SamsungGalaxy Note3 Neofrescoltektt
SamsungGalaxy Note3 Neofrescoltelgt
SamsungGalaxy Note3 Neofrescolteskt
SamsungGardagardalteMetroPCS
SamsungGalaxy S3 Minigoldenlteatt
SamsungGalaxy S3 Minigoldenltebmc
SamsungGalaxy S3 Minigoldenltevzw
SamsungGalaxy Grand Primegprimelteacg
SamsungGalaxy Grand Primegprimeltecan
SamsungGalaxy Grand Primegprimeltemtr
SamsungGalaxy Grand Primegprimeltespr
SamsungGalaxy Grand Primegprimeltetfnvzw
SamsungGalaxy Grand Primegprimeltetmo
SamsungGalaxy Grand Primegprimelteusc
SamsungGalaxy Note7 gracelte
SamsungGalaxy Note7graceltektt
SamsungGalaxy Note7graceltelgt
SamsungGalaxy Note7gracelteskt
SamsungGalaxy Note7graceqlteacg
SamsungGalaxy Note7graceqlteatt
SamsungGalaxy Note7graceqltebmc
SamsungGalaxy Note7graceqltechn
SamsungGalaxy Note7graceqltespr
SamsungGalaxy Note7graceqltetmo
SamsungGalaxy Note7graceqlteusc
SamsungGalaxy Note7graceqltevzw
SamsungGalaxy Note Fan Editiongracerlte
SamsungGalaxy Note Fan Editiongracerltektt
SamsungGalaxy Note Fan Editiongracerltelgt
SamsungGalaxy Note Fan Editiongracerlteskt
SamsungGalaxy Grand Primegrandprimelte
SamsungGalaxy Grand Primegrandprimelteaio
SamsungGalaxy Go Primegrandprimelteatt
SamsungGalaxy Grand Primegrandprimevelte
SamsungGalaxy Grand Primegrandprimeveltezt
SamsungGalaxy Note8greatlte
SamsungGalaxy Note8greatlteks
SamsungGalaxy Note8greatqlte
SamsungGalaxy Note8greatqltechn
SamsungGalaxy Note8greatqltecmcc
SamsungGalaxy Note8greatqltecs
SamsungGalaxy Note8greatqlteue
SamsungGalaxy Tab Active2gtactive2lte
SamsungGalaxy Tab Active2gtactive2ltechn
SamsungGalaxy Tab Active2gtactive2ltekx
SamsungGalaxy Tab Active2gtactive2lteue
SamsungGalaxy Tab Active2gtactive2wifi
SamsungGalaxy Tab Active3gtactive3
SamsungGalaxy Tab Active3gtactive3wifi
SamsungGalaxy Tab Active Progtactivexl
SamsungGalaxy Tab Active Progtactivexlwifi
SamsungGalaxy Note3ha3g
SamsungGalaxy XCover Field Prohaechiy19
SamsungGalaxy XCover FieldProhaechiy19lteatt
SamsungGalaxy Ace Styleheatnfc3g
SamsungGalaxy Ace Styleheatqlte
SamsungGalaxy S7 edgehero2lte
SamsungGalaxy S7 Edgehero2ltebmc
SamsungGalaxy S7 Edgehero2ltektt
SamsungGalaxy S7 edgehero2ltelgt
SamsungGalaxy S7 Edgehero2lteskt
SamsungGalaxy S7 Edgehero2qlteatt
SamsungGalaxy S7 Edgehero2qltecctvzw
SamsungGalaxy S7 edgehero2qltechn
SamsungGalaxy S7 Edgehero2qltespr
SamsungGalaxy S7 Edgehero2qltetmo
SamsungGalaxy S7 edgehero2qlteue
SamsungGalaxy S7 Edgehero2qlteusc
SamsungGalaxy S7 Edgehero2qltevzw
SamsungGalaxy S7 herolte
SamsungGalaxy S7 heroltebmc
SamsungGalaxy S7 heroltektt
SamsungGalaxy S7 heroltelgt
SamsungGalaxy S7 herolteskt
SamsungGalaxy S7heroqlteacg
SamsungGalaxy S7heroqlteaio
SamsungGalaxy S7 heroqlteatt
SamsungGalaxy S7heroqltecctvzw
SamsungGalaxy S7heroqltechn
SamsungGalaxy S7heroqltelra
SamsungGalaxy S7heroqltemtr
SamsungGalaxy S7 heroqltespr
SamsungGalaxy S7heroqltetfnvzw
SamsungGalaxy S7 heroqltetmo
SamsungGalaxy S7heroqlteue
SamsungGalaxy S7heroqlteusc
SamsungGalaxy S7heroqltevzw
SamsungGalaxy Note3 Neohl3g
SamsungGalaxy Note3 Neohllte
SamsungGalaxy Note3hlte
SamsungGalaxy Note3hlteatt
SamsungGalaxy Note3hltecan
SamsungGalaxy Jhltejs01tw
SamsungGalaxy Note3hltektt
SamsungGalaxy Note3hltelgt
SamsungGalaxy Note3hlteskt
SamsungGalaxy Note3hltespr
SamsungGalaxy Note3hltetmo
SamsungGalaxy Note3hlteusc
SamsungGalaxy Note3hltevzw
SamsungGalaxy Note3htdlte
SamsungGalaxy J1j1nlte
SamsungGalaxy J1(2016)j1xlte
SamsungGalaxy J2j2lte
SamsungGalaxy J3j3ltectc
SamsungGalaxy J3(2016)j3ltekx
SamsungGalaxy J3(2016)j3ltetw
SamsungGalaxy J3(2016)j3ltexsa
SamsungGalaxy J3(2016)j3xlte
SamsungGalaxy J3(2016)j3xnlte
SamsungGalaxy J3 Pro 增强版j3xpro6mltechn
SamsungGalaxy J3 Proj3xproltechn
SamsungGalaxy J3 Proj3xproltectc
SamsungGalaxy J3 Proj3y17lte
SamsungGalaxy J3(2017)j3y17ltekx
SamsungGalaxy J3(2017)j3y17ltelgt
SamsungGalaxy J3j3y17qltecmcc
SamsungGalaxy J4+j4primelte
SamsungGalaxy J4+j4primeltekx
SamsungGalaxy J5j5ltechn
SamsungGalaxy J5j5ltekx
SamsungGalaxy J5j5nlte
SamsungGalaxy J5(2016)j5xltecmcc
SamsungGalaxy J5(2016)j5xnlte
SamsungGalaxy J5(2016)j5xnltektt
SamsungGalaxy J5(2016)j5xnltelgt
SamsungGalaxy J5(2016)j5xnlteskt
SamsungGalaxy J5 Proj5y17lte
SamsungGalaxy J5 Proj5y17ltedx
SamsungGalaxy J5j5y17ltektt
SamsungGalaxy J5j5y17ltelgt
SamsungGalaxy J5j5y17lteskt
SamsungGalaxy J5 Proj5y17ltextc
SamsungGalaxy J5j5ylte
SamsungGalaxy J6j6lte
SamsungGalaxy J6j6ltekx
SamsungGalaxy J6j6ltelgt
SamsungGalaxy J6+j6primelte
SamsungGalaxy J7j75ltektt
SamsungGalaxy J7(2016)j7eltemtr
SamsungGalaxy J7(2016)j7eltetmo
SamsungGalaxy J7j7ltechn
SamsungGalaxy J7(2015)j7ltespr
SamsungGalaxy Wide2j7popelteskt
SamsungGalaxy J7 Starj7topltemtr
SamsungGalaxy Wide3j7toplteskt
SamsungGalaxy J7 Crownj7topltetfntmo
SamsungGalaxy J7 Starj7topltetmo
SamsungGalaxy J7j7toplteue
SamsungGalaxy J7(2016)j7xelte
SamsungGalaxy J7(2016)j7xeltecmcc
SamsungGalaxy J7(2016)j7xeltektt
SamsungGalaxy On8j7xlte
SamsungGalaxy J7(2016)j7xltectc
SamsungGalaxy J7 Proj7y17lte
SamsungGalaxy J7(2017)j7y17ltektt
SamsungGalaxy S4ja3g
SamsungGalaxy S4 Duosja3gchnduos
SamsungGalaxy S4ja3gduosctc
SamsungGalaxy A8+(2018)jackpot2lte
SamsungGalaxy A8(2018)jackpotlte
SamsungGalaxy A8(2018)jackpotltecan
SamsungGalaxy A8(2018)jackpotlteks
SamsungGalaxy S4 Activejactivelte
SamsungGalaxy S4 Activejactivelteatt
SamsungGalaxy S4 Activejactivelteskt
SamsungGalaxy S4jaltektt
SamsungGalaxy S4jaltelgt
SamsungGalaxy S4jalteskt
SamsungGalaxy S4jflte
SamsungGalaxy S4jflteMetroPCS
SamsungGalaxy S4jflteaio
SamsungGalaxy S4jflteatt
SamsungGalaxy S4jfltecan
SamsungGalaxy S4jfltecri
SamsungGalaxy S4jfltecsp
SamsungGalaxy S4jfltelra
SamsungGalaxy S4jflterefreshspr
SamsungGalaxy S4jfltespr
SamsungGalaxy S4jfltetmo
SamsungGalaxy S4jflteusc
SamsungGalaxy S4jfltevzw
SamsungGalaxy S4jfltevzwpp
SamsungGalaxy S4jftdd
SamsungGalaxy S4jfvelte
SamsungGalaxy S4 Google Play Editionjgedlte
SamsungGalaxy S4jsglte
SamsungGalaxy S5k3g
SamsungGalaxy Core2kanas3gcmcc
SamsungGalaxy Core2kanas3gnfc
SamsungGalaxy S5 LTE-Akccat6
SamsungSM-W2018kellyltechn
SamsungGalaxy S5 Google Play Editionkgedlte
SamsungGalaxy S5 klte
SamsungGalaxy S5klteMetroPCS
SamsungGalaxy S5klteacg
SamsungGalaxy S5 Activeklteactive
SamsungGalaxy S5klteaio
SamsungGalaxy S5klteatt
SamsungGalaxy S5 Activeklteattactive
SamsungGalaxy S5kltecan
SamsungGalaxy S5 Activekltecanactive
SamsungGalaxy S5klteduoszn
SamsungGalaxy S5kltektt
SamsungGalaxy S5kltelgt
SamsungGalaxy S5kltelra
SamsungGalaxy S5klteskt
SamsungGalaxy S5kltespr
SamsungGalaxy S5 K Sportkltesprsports
SamsungGalaxy S5kltetfnvzw
SamsungGalaxy S5kltetmo
SamsungGalaxy S5klteusc
SamsungGalaxy S5kltevzw
SamsungGalaxy S5 minikminilte
SamsungGalaxy S5 minikminilteatt
SamsungGalaxy S5 Minikminilteusc
SamsungGalaxy S5 minikminiwifi
SamsungGalaxy S4ks01lte
SamsungGalaxy S4ks01ltektt
SamsungGalaxy S4ks01ltelgt
SamsungGalaxy S4 LTE-Aks01lteskt
SamsungGalaxy S5kwifi
SamsungGalaxy S5lentisltektt
SamsungGalaxy S5lentisltelgt
SamsungGalaxy S5lentislteskt
SamsungGalaxy M11m11q
SamsungGalaxy M12m12
SamsungGalaxy M20m20
SamsungGalaxy M20m20lte
SamsungGalaxy M21m21
SamsungGalaxy K Zoomm2a3g
SamsungGalaxy K Zoomm2alte
SamsungGalaxy K Zoomm2altecan
SamsungGalaxy K Zoomm2altelgt
SamsungGalaxy S3m3
SamsungGalaxy M30sm30s
SamsungGalaxy M31m31
SamsungGalaxy M31sm31s
SamsungGalaxy M40m40
SamsungGalaxy M51m51
SamsungGalaxy M62m62
SamsungNexus 10manta
SamsungGalaxy S6 Activemarinelteatt
SamsungGalaxy Tab4 matissewifigoogle
SamsungGalaxy Mega2mega2lte
SamsungGalaxy Mega2mega2lteatt
SamsungGalaxy Mega 6.3melius3g
SamsungGalaxy Mega 6.3meliuslte
SamsungGalaxy Mega 6.3meliuslteMetroPCS
SamsungGalaxy Mega 6.3meliuslteatt
SamsungGalaxy Mega 6.3meliusltecan
SamsungGalaxy Mega 6.3meliusltektt
SamsungGalaxy Mega 6.3meliusltelgt
SamsungGalaxy Mega 6.3meliuslteskt
SamsungGalaxy Mega 6.3meliusltespr
SamsungGalaxy Mega 6.3meliuslteusc
SamsungGalaxy S4 Zoommproject3g
SamsungGalaxy S4 Zoommprojectlteatt
SamsungGalaxy S4 Zoommprojectqlte
SamsungGalaxy Grand2ms01lte
SamsungGalaxy Grand2ms01ltektt
SamsungGalaxy Grand2ms01ltelgt
SamsungGalaxy Grand2ms01lteskt
SamsungGalaxy Note5noblelte
SamsungGalaxy Note5noblelteacg
SamsungGalaxy Note5noblelteatt
SamsungGalaxy Note5nobleltebmc
SamsungGalaxy Note5nobleltechn
SamsungGalaxy Note5nobleltehk
SamsungGalaxy Note5nobleltektt
SamsungGalaxy Note5nobleltelgt
SamsungGalaxy Note5nobleltelra
SamsungGalaxy Note5noblelteskt
SamsungGalaxy Note5nobleltespr
SamsungGalaxy Note5nobleltetmo
SamsungGalaxy Note5noblelteusc
SamsungGalaxy Note5nobleltevzw
SamsungGalaxy S21 5Go1q
SamsungGalaxy S21 5Go1s
SamsungGalaxy Wideon7nlteskt
SamsungGalaxy On7(2016)on7xeltektt
SamsungGalaxy On7(2016)on7xeltelgt
SamsungGalaxy On7(2016)on7xelteskt
SamsungGalaxy On7 Primeon7xrefltektt
SamsungGalaxy On7 Primeon7xrefltelgt
SamsungGalaxy On7 Primeon7xreflteskt
SamsungGalaxy S21 Ultra 5Gp3q
SamsungGalaxy S21 Ultra 5Gp3s
SamsungGalaxy S7 Activeposeidonlteatt
SamsungGalaxy A80r1q
SamsungGalaxy A90 5Gr3q
SamsungGalaxy S10 Liter5q
SamsungGalaxy Note10 Liter7
SamsungGalaxy S20 FE 5Gr8q
SamsungGalaxy S20 FEr8s
SamsungW2016royceltectc
SamsungGalaxy Tab Activerubenslte
SamsungGalaxy Tab4 Activerubensltekx
SamsungGalaxy Tab4 Activerubenswifi
SamsungGalaxy S3 Neos3ve3g
SamsungGalaxy S3 Neos3ve3gds
SamsungGalaxy S5 Neos5neolte
SamsungGalaxy S5 Neos5neoltecan
SamsungGalaxy S4 Miniserranolte
SamsungGalaxy S4 Miniserranoltebmc
SamsungGalaxy S4 Mini serranoltektt
SamsungGalaxy S4 Miniserranoltelra
SamsungGalaxy S4 Miniserranoltespr
SamsungGalaxy S4 Miniserranolteusc
SamsungGalaxy S4 Miniserranoltevzw
SamsungGalaxy S4 Miniserranovelte
SamsungGalaxy S4 Mini serranovolteatt
SamsungGalaxy Alphaslte
SamsungGalaxy Alphaslteatt
SamsungGalaxy Alphasltecan
SamsungGalaxy Alphasltechn
SamsungGalaxy Alphasltektt
SamsungGalaxy Alphasltelgt
SamsungGalaxy Alphaslteskt
SamsungGalaxy S9+star2lte
SamsungGalaxy S9+star2lteks
SamsungGalaxy S9+star2qltechn
SamsungGalaxy S9+star2qltecs
SamsungGalaxy S9+star2qltesq
SamsungGalaxy S9+star2qlteue
SamsungGalaxy S9starlte
SamsungGalaxy S9starlteks
SamsungGalaxy S9starqltechn
SamsungGalaxy S9starqltecmcc
SamsungGalaxy S9starqltecs
SamsungGalaxy S9starqltesq
SamsungGalaxy S9starqlteue
SamsungGalaxy Popsuperiorlteskt
SamsungGalaxy Note2t03g
SamsungGalaxy Note2t0lte
SamsungGalaxy Note IIt0lteatt
SamsungGalaxy Note2t0ltecan
SamsungGalaxy Note2t0ltektt
SamsungGalaxy Note2t0ltelgt
SamsungGalaxy Note2t0lteskt
SamsungGalaxy Note2t0ltespr
SamsungGalaxy Note2t0lteusc
SamsungGalaxy Note2t0ltevzw
SamsungGalaxy S21+ 5Gt2q
SamsungGalaxy S21+ 5Gt2s
SamsungGalaxy Note Edgetbeltektt
SamsungGalaxy Note Edgetbeltelgt
SamsungGalaxy Note Edgetbelteskt
SamsungGalaxy Note Edgetblte
SamsungGalaxy Note Edgetblteatt
SamsungGalaxy Note Edgetbltecan
SamsungGalaxy Note Edgetbltechn
SamsungGalaxy Note Edgetbltespr
SamsungGalaxy Note Edgetbltetmo
SamsungGalaxy Note Edgetblteusc
SamsungGalaxy Note Edgetbltevzw
SamsungGalaxy Note4tre3caltektt
SamsungGalaxy Note4 S-LTEtre3caltelgt
SamsungGalaxy Note4 S-LTEtre3calteskt
SamsungGalaxy Note4tre3g
SamsungGalaxy Note4trelte
SamsungGalaxy Note4treltektt
SamsungGalaxy Note4treltelgt
SamsungGalaxy Note4trelteskt
SamsungGalaxy Note4trhplte
SamsungGalaxy Note4trlte
SamsungGalaxy Note4trlteatt
SamsungGalaxy Note4trltecan
SamsungGalaxy Note4trltechn
SamsungGalaxy Note4trltechnzh
SamsungGalaxy Note4trltespr
SamsungGalaxy Note4trltetmo
SamsungGalaxy Note4trlteusc
SamsungGalaxy Note4trltevzw
SamsungGalaxy Mega2vastalte
SamsungGalaxy Mega2vastaltezh
Samsung领世旗舰8venenoltechn
SamsungW2017veyronltectc
SamsungGalaxy Core Litevictorlte
Samsung三星 W21 5Gvictory
SamsungGalaxy Ace4vivaltolte
SamsungGalaxy Ace4vivaltonfc3g
SamsungGalaxy Express2wilcoxlte
SamsungGalaxy Fold 5Gwinner
SamsungGalaxy S20 5Gx1q
SamsungGalaxy S20 5Gx1s
SamsungGalaxy Xcover3xcover3lte
SamsungGalaxy Xcover3xcover3velte
SamsungGalaxy XCover4xcover4lte
SamsungGalaxy Xcover4xcover4ltecan
SamsungGalaxy XCover 4sxcover4s
SamsungGalaxy XCover 5 xcover5
SamsungGalaxy XCover Proxcoverpro
SamsungGalaxy S20+ 5Gy2q
SamsungGalaxy S20+ 5Gy2s
SamsungGalaxy Young2young2nfc3g
SamsungGalaxy S20 Ultra 5Gz3q
SamsungGalaxy S20 Ultra 5Gz3s
SamsungGalaxy S6 Edge+zenlte
SamsungGalaxy S6 Edge+zenlteatt
SamsungGalaxy S6 Edge+zenltebmc
SamsungGalaxy S6 Edge+zenltechn
SamsungGalaxy S6 Edge+zenltektt
SamsungGalaxy S6 Edge+zenltekx
SamsungGalaxy S6 Edge+zenltelgt
SamsungGalaxy S6 Edge+zenlteskt
SamsungGalaxy S6 Edge+zenltespr
SamsungGalaxy S6 Edge+zenltetmo
SamsungGalaxy S6 Edge+zenlteusc
SamsungGalaxy S6 Edge+zenltevzw
SamsungGalaxy S6zeroflte
SamsungGalaxy S6zeroflteacg
SamsungGalaxy S6zeroflteaio
SamsungGalaxy S6zeroflteatt
SamsungGalaxy S6zerofltebmc
SamsungGalaxy S6zerofltechn
SamsungGalaxy S6zerofltectc
SamsungGalaxy S6zerofltektt
SamsungGalaxy S6zerofltelgt
SamsungGalaxy S6zerofltelra
SamsungGalaxy S6zerofltemtr
SamsungGalaxy S6zeroflteskt
SamsungGalaxy S6zerofltespr
SamsungGalaxy S6zerofltetfnvzw
SamsungGalaxy S6zerofltetmo
SamsungGalaxy S6zeroflteusc
SamsungGalaxy S6zerofltevzw
SamsungGalaxy S6 edgezerolte
SamsungGalaxy S6 Edgezerolteacg
SamsungGalaxy S6 Edgezerolteatt
SamsungGalaxy S6 Edgezeroltebmc
SamsungGalaxy S6 Edgezeroltechn
SamsungGalaxy S6 Edgezeroltektt
SamsungGalaxy S6 edgezeroltelgt
SamsungGalaxy S6 Edgezeroltelra
SamsungGalaxy S6 Edgezerolteskt
SamsungGalaxy S6 Edgezeroltespr
SamsungGalaxy S6 Edgezeroltetmo
SamsungGalaxy S6 Edgezerolteusc
SamsungGalaxy S6 Edgezeroltevzw
Samsung三星W20zodiac
Schokfreedom turbo XLfreedom_turbo_XL
SenseitSenseit N151SENSEIT_N151
SenterS917V9S917V9
SeuicAUTOID9Nd500b
SeuicAUTOID Pad Aird520
SeuicAUTOID Q9d550
SeuicCRUISE1d700s
SharpAQUOS R5G SH-RM14Banagher
SharpDisney Mobile on docomo DM-01HDM-01H
SharpDisney Mobile on docomo DM-01JDM-01J
SharpMedia TabletEB-L76G-B
SharpAQUOS U SHV37FSP
SharpAQUOS L SHV37FSP_u
SharpAQUOS SERIE mini SHV38GTQ
SharpSHARP AQUOS S3HH1
SharpSharp HH6HH6_sprout
SharpAQUOS R SHV39HUR
SharpAQUOS R compact SHV41JWT
SharpAQUOS sense4 SH-41AJerid
SharpAQUOS sense4 SH-M15JeridA
SharpAQUOS sense4 basic A003SHJeridB
SharpAQUOS sense4 lite SH-RM15JeridL
SharpAQUOS sense SHV40KXU
SharpAQUOS senseKXU_u
SharpAQUOS R2 SHV42LYV
SharpAQUOS sense2 SHV43MZW
SharpAQUOS sense2MZW-u
SharpAQUOS R3 SHV44NAX
SharpAQUOS sense3 plus サウンド SHV46OBY
SharpAQUOS zero5G basic DXOJ6
SharpAQUOS P1P1X
SharpAQUOS sense3 SHV45PCZ
SharpAQUOS sense3PCZ-u
SharpAQUOS zero2 SHV47QDA
SharpSHARP AQUOS S2 PlusSAT
SharpSHARP AQUOS S3SD1
SharpAQUOS Xx 304SHSG304SH
SharpAQUOS CRYSTAL XSG402SH
SharpAQUOS CRYSTAL 2SG403SH
SharpAQUOS XxSG404SH
SharpAQUOS Xx2SG502SH
SharpAQUOS Xx2 miniSG503SH
SharpAQUOS Xx 3SG506SH
SharpAQUOS Xx3 miniSG603SH
SharpAQUOS RSG605SH
SharpAQUOS eaSG606SH
SharpAQUOS R compact 701SHSG701SH
SharpAQUOS R2SG706SH
SharpAQUOS zeroSG801SH
SharpAQUOS R2 compact 803SHSG803SH
SharpAQUOS R3 808SHSG808SH
SharpAQUOS sense3 plus (901SH)SG901SH
SharpAQUOS zero2 906SHSG906SH
SharpAQUOS R5G 908SHSG908SH
SharpAQUOS zero5G basicSGA002SH
SharpAQUOS PHONE ZETA  SH-01FSH-01F
SharpAQUOS ZETA SH-01GSH-01G
SharpAQUOS ZETA SH-01HSH-01H
SharpAQUOS sense SH-01KSH-01K
SharpAQUOS sense2 SH-01LSH-01L
SharpAQUOS zero2 SH-01MSH-01M
SharpDisney Mobile on docomo SH-02GSH-02G
SharpAQUOS Compact SH-02HSH-02H
SharpAQUOS EVER SH-02JSH-02J
SharpAQUOS sense3 SH-02MSH-02M
SharpAQUOS ZETA SH-03GSH-03G
SharpAQUOS R SH-03JSH-03J
SharpAQUOS R2 SH-03KSH-03K
SharpAQUOS ZETA SH-04FSH-04F
SharpAQUOS EVER SH-04GSH-04G
SharpAQUOS ZETA SH-04HSH-04H
SharpAQUOS R3 SH-04LSH-04L
SharpAQUOS PAD SH-05GSH-05G
SharpAQUOS PAD SH-06FSH-06F
SharpAQUOS R5G SH-51ASH-51A
SharpAQUOS sense5GSH-53A
SharpSHARP AQUOS D10SH-D01
SharpAQUOS L2SH-L02
SharpAQUOS SH-M02SH-M02
SharpAQUOS SH-M02-EVA20SH-M02-EVA20
SharpAQUOS mini SH-M03SH-M03
SharpSH-M04SH-M04
SharpAQUOS sense lite (SH-M05)SH-M05
SharpAQUOS R compact SH-M06SH-M06
SharpAQUOS sense plus (SH-M07)SH-M07
SharpAQUOS sense2 (SH-M08)SH-M08
SharpAQUOS R2 compact (SH-M09)SH-M09
SharpAQUOS zero (SH-M10)SH-M10
SharpAQUOS sense3 plus SH-M11SH-M11
SharpAQUOS sense3 SH-M12SH-M12
SharpAQUOS zero2 SH-M13SH-M13
SharpAQUOS R3 SH-R10ASH-R10
SharpAQUOS SH-RM02SH-RM02
SharpAQUOS sense3 plus SH-RM11SH-RM11
SharpAQUOS sense3 liteSH-RM12
SharpSHARP AQUOS C10SH-Z01
SharpAQUOS zeroSH-Z10
SharpAQUOS zeroSH-Z10A
SharpAQUOS zero2 SH-Z20SH-Z20
SharpAQUOS SERIE SHL25SHL25
SharpAQUOS SERIE mini SHV31SHV31
SharpAQUOS SERIE SHV32SHV32
SharpAQUOS SERIE mini SHV33SHV33
SharpAQUOS SERIE SHV34SHV34
SharpAQUOS U SHV35SHV35
SharpSHARP AQUOS S2SS2
SharpStar Wars mobileSW001SH
SharpAQUOS sense5GSarah
SharpAQUOS sense5G SH-S50SarahH
SharpAQUOS R5G SHG01TGD
SharpAQUOS sense4 plusVG2
SharpSH-H01VZJ
SharpAQUOS sense5GWJG
Sharp507SHeve_sprout
SharpX1nasa_sprout
SharpS7vespa_sprout
Sigma MobileX-TREME PQ37X-TREME_PQ37
Sigma MobileX-treme PQ36X-treme_PQ36
Sigma MobileX-treme PQ53X-treme_PQ53
Sigma MobileX-treme_PQ54 MAXX-treme_PQ54_MAX
Sigma MobileX-TREME PQ39X_TREME_PQ39
SirinFINNEY PHONESR00300-W
SirinLABS SOLARINsolarin
SmileA955ZA955Z
SnopowM10M10
SonimtechRS60RS60
SonimtechRS80RS80
SonimtechXP7XP7700
SonimtechSmart-Ex 01XP7700Z1
SonimtechXP7705XP7705
SonimtechXP8XP8800
SonyXperia Z3401SO
SonyXperia Z4402SO
SonyXperia Z5501SO
SonyXperia X Performance502SO
SonyXperia XZ601SO
SonyXperia XZs602SO
SonyXperia XZ1701SO
SonyXperia XZ2702SO
SonyXperia XZ3801SO
SonyXperia 1802SO
SonyXperia 5901SO
SonyXperia 8902SO
SonyXperia 10 IIA001SO
SonyXperia 5 IIA002SO
SonyXperia ZRC5502
SonyXperia ZRC5503
SonyXperia ZLC6502
SonyXperia ZLC6503
SonyXperia ZLC6506
SonyXperia ZC6602
SonyXperia ZC6603
SonyXperia ZC6616
SonyXperia Z UltraC6802
SonySmartphone Z Ultra Google Play editionC6806
SonyXperia Z UltraC6833
SonyXperia Z UltraC6843
SonyXperia Z1C6902
SonyXperia Z1C6903
SonyXperia Z1C6906
SonyXperia Z1C6916
SonyXperia Z1C6943
SonyXperia E3D2202
SonyXperia E3D2203
SonyXperia E3D2206
SonyXperia E3 DualD2212
SonyXperia E3D2243
SonyXperia M2 DualD2302
SonyXperia M2D2303
SonyXperia M2D2305
SonyXperia M2D2306
SonyXperia M2 AquaD2403
SonyXperia M2 AquaD2406
SonyXperia C3 DualD2502
SonyXperia C3D2533
SonyXperia T3D5102
SonyXperia T3D5103
SonyXperia T3D5106
SonyXperia T2 UltraD5303
SonyXperia T2 UltraD5306
SonyXperia T2 UltraD5316
SonyXperia T2 UltraD5316N
SonyXperia T2 Ultra dualD5322
SonyXperia Z1 CompactD5503
SonyXperia J1 CompactD5788
SonyXperia Z3 CompactD5803
SonyXperia Z3 CompactD5833
SonyXperia Z2D6502
SonyXperia Z2D6503
SonyXperia Z2D6543
SonyXperia Z2aD6563
SonyXperia Z3D6603
SonyXperia Z3D6616
SonyXperia Z3 DualD6633
SonyXperia Z3D6643
SonyXperia Z3D6646
SonyXperia Z3D6653
SonyXperia Z3 DualD6683
SonyXperia Z3vD6708
SonyXperiaâ„¢ E4gE2003
SonyXperia E4gE2053
SonyXperiaâ„¢ M4 AquaE2303
SonyXperiaâ„¢ M4 AquaE2306
SonyXperiaâ„¢ M4 Aqua DualE2312
SonyXperiaâ„¢ M4 Aqua DualE2333
SonyXperiaâ„¢ M4 AquaE2353
SonyXperiaâ„¢ M4 Aqua DualE2363
SonyXperiaâ„¢ C4E5303
SonyXperiaâ„¢ C4E5306
SonyXperiaâ„¢ C4 DualE5333
SonyXperiaâ„¢ C4 DualE5343
SonyXperiaâ„¢ C4E5353
SonyXperiaâ„¢ C4 DualE5363
SonyXperia C5 UltraE5506
SonyXperia C5 Ultra DualE5533
SonyXperia C5 UltraE5553
SonyXperia C5 Ultra DualE5563
SonyXperia M5E5603
SonyXperia M5E5606
SonyXperia M5 DualE5633
SonyXperia M5 DualE5643
SonyXperia M5E5653
SonyXperia M5 DualE5663
SonyXperia Z5 CompactE5803
SonyXperia Z5 CompactE5823
SonyXperia Z4vE6508
SonyXperia Z3+ Dual E6533
SonyXperia Z3+   E6553
SonyXperia Z5E6603
SonyXperia Z5 dualE6633
SonyXperia Z5E6653
SonyXperia Z5 dualE6683
SonyXperia Z5 Premium DualE6833
SonyXperia Z5 PremiumE6853
SonyXperia Z5 PremiumE6883
SonyXperia XAF3111
SonyXperia XAF3112
SonyXperia XAF3113
SonyXperia XAF3115
SonyXperia XAF3116
SonyXperia XA UltraF3211
SonyXperia XA UltraF3212
SonyXperia XA UltraF3213
SonyXperia XA UltraF3215
SonyXperia XA UltraF3216
SonyXperia E5F3311
SonyXperia E5F3313
SonyXperia XF5121
SonyXperia XF5122
SonyXperia X CompactF5321
SonyXperia X PerformanceF8131
SonyXperia X PerformanceF8132
SonyXperia XZF8331
SonyXperia XZF8332
SonyXperia TouchG1109
SonyXperia HelloG1209
SonyXperia XA1G3112
SonyXperia XA1G3116
SonyXperia XA1G3121
SonyXperia XA1G3123
SonyXperia XA1G3125
SonyXperia XA1 UltraG3212
SonyXperia XA1 UltraG3221
SonyXperia XA1 UltraG3223
SonyXperia XA1 UltraG3226
SonyXperia L1G3311
SonyXperia L1G3312
SonyXperia L1G3313
SonyXperia XA1 PlusG3412
SonyXperia XA1 PlusG3416
SonyXperia XA1 PlusG3421
SonyXperia XA1 PlusG3423
SonyXperia XA1 PlusG3426
SonyXperia XZ PremiumG8141
SonyXperia XZ PremiumG8142
SonyXperia XZ PremiumG8188
SonyXperia XZsG8231
SonyXperia XZsG8232
SonyXperia XZ1G8341
SonyXperia XZ1G8342
SonyXperia XZ1G8343
SonyXperia XZ1 CompactG8441
SonyXperia XA2H3113
SonyXperia XA2H3123
SonyXperia XA2H3133
SonyXperia XA2 UltraH3213
SonyXperia XA2 UltraH3223
SonyXperia L2H3311
SonyXperia L2H3321
SonyXperia XA2 PlusH3413
SonyXperia XA2H4113
SonyXperia XA2H4133
SonyXperia XA2 UltraH4213
SonyXperia XA2 UltraH4233
SonyXperia L2H4311
SonyXperia L2H4331
SonyXperia XA2 PlusH4413
SonyXperia XA2 PlusH4493
SonyXperia XZ2 PremiumH8116
SonyXperia XZ2 PremiumH8166
SonyXperia XZ2H8216
SonyXperia XZ2H8266
SonyXperia XZ2H8276
SonyXperia XZ2H8296
SonyXperia XZ2 CompactH8314
SonyXperia XZ2 CompactH8324
SonyXperia XZ3H8416
SonyXperia XZ3H9436
SonyXperia XZ3H9493
SonyXperia 10I3113
SonyXperia 10I3123
SonyXperia 10 PlusI3213
SonyXperia 10 PlusI3223
SonyXperia L3I3312
SonyXperia 10I4113
SonyXperia 10I4193
SonyXperia 10 PlusI4213
SonyXperia 10 PlusI4293
SonyXperia L3I4312
SonyXperia L3I4332
SonyXperia AceJ3173
SonyXperia 8 LiteJ3273
SonyXperia 1J8110
SonyXperia 1J8170
SonyXperia 5J8210
SonyXperia 5J8270
SonyXperia 1J9110
SonyXperia 1 Professional EditionJ9150
SonyXperia 1J9180
SonyXperia 5J9210
SonyXperia 5J9260
SonyXperia Tablet ZSGP311
SonyXperia Tablet ZSGP312
SonyXperia Tablet ZSGP321
SonyXperia Tablet ZSGP351
SonyXperia Z UltraSGP412
SonyXperia Z2 TabletSGP511
SonyXperia Z2 TabletSGP512
SonyXperia Z2 TabletSGP521
SonyXperia Z2 TabletSGP551
SonyXperia Z2 TabletSGP561
SonyXperia Z3 Tablet CompactSGP611
SonyXperia Z3 Tablet CompactSGP612
SonyXperia Z3 Tablet CompactSGP621
SonyXperia Z3 Tablet CompactSGP641
SonyXperia Z4 TabletSGP712
SonyXperia Z4 TabletSGP771
SonyXperia Z1SO-01F
SonyXperia Z3SO-01G
SonyXperia Z5SO-01H
SonyXperia XZSO-01J
SonyXperia XZ1SO-01K
SonyXperia XZ3SO-01L
SonyXperia 5SO-01M
SonyXperia ZSO-02E
SonyXperia Z1fSO-02F
SonyXperia Z3 CompactSO-02G
SonyXperia Z5 CompactSO-02H
SonyXperia X CompactSO-02J
SonyXperia XZ1 CompactSO-02K
SonyXperia AceSO-02L
SonyXperia Z2SO-03F
SonyXperia Z4SO-03G
SonyXperia Z5 PremiumSO-03H
SonyXperia XZsSO-03J
SonyXperia XZ2SO-03K
SonyXperia 1SO-03L
SonyXperia A2SO-04F
SonyXperia A4SO-04G
SonyXperia X PerformanceSO-04H
SonyXperia XZ PremiumSO-04J
SonyXperia XZ2 PremiumSO-04K
SonyXperia Z2 TabletSO-05F
SonyXperia Z4 TabletSO-05G
SonyXperia XZ2 CompactSO-05K
SonyXperia 10 IISO-41A
SonyXperia 1 IISO-51A
SonyXperia 5 IISO-52A
SonyXperia 1 IISOG01
SonyXperia 5 IISOG02
SonyXperia Z1SOL23
SonyXperia Z UltraSOL24
SonyXperia ZL2SOL25
SonyXperia Z3SOL26
SonyXperia Z2 TabletSOT21
SonyXperia Z4 TabletSOT31
SonyXperia Z4SOV31
SonyXperia Z5SOV32
SonyXperia X PerformanceSOV33
SonyXperia XZSOV34
SonyXperia XZsSOV35
SonyXperia XZ1SOV36
SonyXperia XZ2SOV37
SonyXperia XZ2 PremiumSOV38
SonyXperia XZ3SOV39
SonyXperia 1SOV40
SonyXperia 5SOV41
SonyXperia 8SOV42
SonyXperia 8SOV42-u
SonyXperia 10 IISOV43
SonyXperia L4XQ-AD51
SonyXperia L4XQ-AD52
SonyXperia PROXQ-AQ52
SonyXperia PROXQ-AQ62
SonyXperia 5 IIXQ-AS42
SonyXperia 5 IIXQ-AS52
SonyXperia 5 IIXQ-AS62
SonyXperia 5 IIXQ-AS72
SonyXperia 1 IIXQ-AT42
SonyXperia 1 IIXQ-AT51
SonyXperia 1 IIXQ-AT52
SonyXperia 1 IIXQ-AT72
SonyXperia 10 IIXQ-AU42
SonyXperia 10 IIXQ-AU51
SonyXperia 10 IIXQ-AU52
SonyXperia Z3 Compactaries
SonyXperia Z3leo
SonyXperia Xsuzu
SonyAudioNW-A100icx1293
SonyAudioNW-ZX500icx1295
SoshSoshPhoneSoshPhone
SpectralinkVersity 92-Series VC92
SpectralinkVersityVersity
SprintHTC Bolthtc_acawhl
SugarSUGAR S50SUGAR_S50
SugarSUGAR S55SUGAR_S55
SugarSUGAR C13p210cn
SugarSugar T50p611bn
SwissvoiceG50G50
T-MobileREVVL 4+Porto
T-MobileREVVL 5GSeattle_5G
T-MobileREVVLRY+lake_n
TASKPHONET20T20P
TCLSmartphoneA5A_INFINI
TCLTCL 20 SEAustin
TCLTCL 10 PlusBoston
TCLTCL 20EHONG_KONG
TCLTCL 20YHong_Kong_Pro
TCLTCL 20 5GIrvine
TCLTCL 20SMiami_Pro
TCLTCL 10 SEOakland
TCLTCL 10 5GSeattle
TCLTCL PLEXT1
TCLA1T1_LE
TCLTCL 10LT1_LITE
TCLTCL 10 ProT1_PRO
TCT (Alcatel)Alcatel 3A3A
TCT (Alcatel)Alcatel 3XA3A_PLUS
TCT (Alcatel)Alcatel 3VA3A_XL_4G
TCT (Alcatel)Alcatel 5XA5X
TCT (Alcatel)U5 HDBUZZ6E
TCT (Alcatel)U5BUZZ6T4G
TCT (Alcatel)Alcatel 3Dive_73
TCT (Alcatel)A5ELSA6
TCT (Alcatel)A7ELSA6P
TCT (Alcatel)IDOL 2 SEOS_lte
TCT (Alcatel)6037KEclipse
TCT (Alcatel)alcatel 1XEdison
TCT (Alcatel)Alcatel 3Gauss
TCT (Alcatel)T2HANDYT2
TCT (Alcatel)TCL H900MHERO2
TCT (Alcatel)8030BHERO2PLUS
TCT (Alcatel)Alcatel 1SHONG_KONG
TCT (Alcatel)Alcatel 3LHong_Kong_Pro
TCT (Alcatel)M812CM812
TCT (Alcatel)Idol2 MINI SMIATA_lte
TCT (Alcatel)Alcatel 3XMilan
TCT (Alcatel)ALCATEL PIXI 4 (5)PIXI4_5_4G
TCT (Alcatel)7045YRIO5
TCT (Alcatel)Soul 4SOUL4
TCT (Alcatel)TCL 10 5G UWSeattle_VZW
TCT (Alcatel)Alcatel 1STokyo
TCT (Alcatel)Alcatel 3X PlusTokyoPro
TCT (Alcatel)Alcatel 1U3A_PLUS_4G
TCT (Alcatel)Alcatel 1XU5A_PLUS_4G
TCT (Alcatel)NeXT by Maxis (M1)VFD700
TCT (Alcatel)Alcatel 3XVenice
TCT (Alcatel)Vodafone 985NVodafone985N
TCT (Alcatel)ALCATEL ONETOUCH IDOL 3 (5.5)idol3
TCT (Alcatel)6039Yidol347
TCT (Alcatel)Alcatel_6055Uidol4
TCT (Alcatel)SOL PRIMEidol4s
TCT (Alcatel)SOL PRIMEidol4s_skt
TCT (Alcatel)A3mickey6
TCT (Alcatel)Flash Plus 2shine_plus
TCT (Alcatel)Alcatel_6060Csimba6_cricket
TESPROMayumi U1Mayumi_U1
TG&Co.TG-L900SJGR
TG&Co.TG-L800SPHX
TONETONE_e21TONE_e21
TabletopTabletop_T2Tabletop_T2
TecnoTECNO SPARK 7TECNO-KF6m
TecnoTECNO SPARK 7TECNO-KF6n
TecnoTECNO POVA 2TECNO-LE7n
TectoyTECTOY ON 128GBTokyoPro
TeloSystemsTE590PTE590P_E
TeloSystemsTE590PTE590P_O
TeloSystemsTELO_TE610TELO_TE610
TeloSystemsTELO_TE610_OTELO_TE610_O
TeracubeTeracube 2eTeracube_2e
TeracubeTeracube_OneTeracube_One
TetratabTF10EA2TF10EA2_Medical_1
ThurayaThuraya X5-TouchX5-Touch
TiwellAS_601LAS_601L
TridentA25A25
TridentA53 PROA53_PRO
Trimble NavigationTDC600/MM60E7167
Trimble NavigationMM50EE773X_4G
Trimble NavigationPeopleNet ConnectedTabletMS5
TurbonetADR1776ADR1776
TurbonetTN500A1TN500A1
TurbonetTN502A1TN502A1
TurbonetTurboTab E1TN800A1
TurbonetTN502A1access
UlefoneArmor 10 5GArmor_10_5G
Ulefone Company Gotron – FIH Foxconn Marketing Name  Retail BrandingArmor_11_5G
UlefoneArmor 2Armor_2
UlefoneArmor 2SArmor_2S
UlefoneArmor_3Armor_3
UlefoneArmor_3WArmor_3W
UlefoneArmor_3WTArmor_3WT
UlefoneArmor_5SArmor_5S
UlefoneArmor6Armor_6
UlefoneArmor_6EArmor_6E
UlefoneArmor_6SArmor_6S
UlefoneArmor_7Armor_7
UlefoneArmor_7EArmor_7E
UlefoneArmor_7EArmor_7E_Q
UlefoneArmor 7Armor_7_Q
UlefoneArmor 8Armor_8
UlefoneArmor 9Armor_9
UlefoneArmor 9EArmor_9E
UlefoneArmor XArmor_X
UlefoneArmor_X2Armor_X2
UlefoneArmor_X5Armor_X5
UlefoneArmor X5 ProArmor_X5_Pro
UlefoneArmor X5Armor_X5_Q
UlefoneArmor X7 ProArmor_X7_Pro
UlefoneArmor X7Armor_X7_Q
UlefonePower_3LPower_3L
UlefonePower_3L_EEAPower_3L_EEA
UlefonePower_6Power_6
UlefoneT2T2
UlefoneArmor_5Ulefone_Armor_5
UmidigiBISONBISON
UmidigiBISON GT EEABISON_GT
UmidigiBISON R EEABISON_R
UmidigiF1F1
UmidigiOne Max EOne_Max
UmidigiOne ProOne_Pro
UmidigiPowerPower
UmidigiPower_3_EEAPower_3
UmidigiS3_ProS3_Pro
UmidigiS5_Pro_EEAS5_Pro
UmidigiZ2 ProZ2_PRO
UnihertzAtomAtom
UnihertzAtom_LAtom_L
UnihertzAtom_XLAtom_XL
UnihertzJelly2Jelly2
UnihertzJelly2_JPJelly2_JP
UnihertzTitanTitan
UnihertzTitan pocketTitan_pocket
UnistrongUT10UT10
UnistrongUT12UT12
UnistrongUT12PUT12P
UnistrongUT30_EEAUT30
UnistrongUT32UT32
UnistrongUT56UT56
UnitechEA320EA320
UnitechEA500PlusEA500Plus
UnitechEA510EA510
UnitechEA630EA630
UnitechHT730HT730
UnitechPA760PA760
UnitechTB85TB85
UnitechWD200wd200
Unnion TechnologiesHH25HH25
Unnion TechnologiesUNSP7UNSP7
UrovoDT40DT40
UrovoDT50DT50
UrovoP8100P8100
UrovoRT40SQ47
Urovoi6310i6310
V2COMT2ROCKY_T2
VALIFONEM790M790
VALIFONEV200_EEAV200
VALIFONEV700V700
VALIFONEV710V710
VerneeM8 ProM8_Pro
VerneeActiveV1
VerneeV2 ProV2_Pro
VerneeV3V3
VertexCS24CS24
VertexCS28CS28
VertexS1GlocalMe_S1
VertexImpress_Astra4GImpress_Astra4G
VertexImpress CubeImpress_Cube
VertexImpress FireImpress_Fire
VertexImpress_FlashImpress_Flash
VertexImpress_FrostImpress_Frost
VertexImpress_Luck4G_NFCImpress_Luck4G_NFC
VertexImpress_PlutoImpress_Pluto
VertexImpress_RossoImpress_Rosso
VertexImpress StoneImpress_Stone
VertexImpress_Sunset4GImpress_Sunset4G
VertexImpress Vega (4G)Impress_Vega
VertexImpress_ViraImpress_Vira
VertexPro_P300_4GPro_P300_4G
VertexPro_P300_4GPro_P310_4G
VertuASTER  PASTER_P
VertuAster Talexa
VertuSignature Touchodin
VertuSignature Touchtitan
VertuConstellation Xtron
VestelVenus Z40Poyraz
VestelVSP355gg55
VestelVSP355ss55
Vivovivo 18071807N
Vivovivo 18181818N
Vivovivo 18191819N
VivoY171902D
Vivovivo 19071907
Vivo vivo 19071907N
Vivovivo 19101910N
Vivovivo 19121912
Vivovivo 19131913
Vivovivo 19151915
Vivovivo 19191919
Vivovivo 19201920
VivoV19301930
Vivovivo 19331933
Vivovivo 19351935
VivoV19371937
Vivovivo 19381938
VivoX502004
Vivovivo 20052005
VivoX50 Pro2006
VivoI20092009
VivoI20122012
VivoV20222023
VivoV20252025
VivoV20272027
VivoV20362036
VivoV20402040
VivoV20412041
VivoV20462046
VivoV20472047
VivoV20612061
VivoX5Pro VPD1421V
VivoV1824APD1824
VivoV1836APD1836
VivoV1916APD1916
VivoV1922APD1922
VivoV1923APD1923
VivoV1924APD1924
VivoV1938CTPD1938
VivoV1950APD1950
VivoV1955APD1955
VivoV1981APD1981
VivoV1986APD1986
VivoV2001APD2001
VivoV2005APD2005
VivoV2011APD2011
VivoV2020APD2020
VivoV2025APD2024
VivoV2046APD2046
VivoV2059APD2047
VivoV2049APD2049
VivoV2055APD2055
VivoV2056APD2056
VivoV2072APD2072
VivoV2080APD2080
VivoV2085APD2085
VivoV2118APD2118
VkworldS9S9
VodafoneVDF 600P809V50
VodafoneSmart ultra 6P839V55
Vodafone895VF-895N
VodafoneVodafone Smart E8VFD511
VodafoneSmart N8VFD610
VodafoneSmart_N9_LiteVFD620
VodafoneSmart ultra 7VFD700
VodafoneSmart V8VFD710
VodafoneVodafone Smart N9VFD720
VodafoneVodafone Smart X9VFD820
VodafoneSmart platinum 7VFD900
VsmartJoy 4juniper
WaltonPrimo ZX2GBL5805WA
Webfleet SolutionsPRO 8475triton
WieppoWieppo E1Wieppo_E1
WigorV5V5
WikoTOMMY2T3931AC
WikoWIM LiteT6901AC
WikoWIMT9051AC
WikoTone E19TONE_e19
WikoTOMMY2V3931AC
WikoView3 ProW-P611
WikoWC300WC300
WikoWC300SNWC300SN
WikoW_C200SNW_C200SN
WikoW_C800W_C800
WikoC800W_C800S
WikoW_C860W_C860
WikoWIMi9051
WikoWIM Litep6901
WikoTommy2 Plusv3941
WileyfoxSwift 2marmite
WingsW4 EEAW4
WingsW7W7
WingsW7 QW7_Q
WingsWXWX
WiseasyWISENET5WISENET5
XiaomiMi MIX 3 5Gandromeda
XiaomiMi 10Tapollo
XiaomiMI 4LTEcancro
XiaomiMi 5scapricorn
XiaomiMi 10 Ultracas
XiaomiMI 9cepheus
XiaomiMIX 2chiron
XiaomiMi 10 Procmi
XiaomiMi 11 Litecourbet
XiaomiMi9 Pro 5Gcrux
XiaomiMI 8dipper
XiaomiMI  8  Proequuleus
XiaomiMi 10T Litegauguin
XiaomiMi 5gemini
XiaomiMi 9 SEgrus
XiaomiMI Note 3jason
XiaomiMIXlithium
XiaomiRedmi K30 Pro Zoom Editionlmipro
XiaomiMi 11 Promars
XiaomiMi 10 lite 5Gmonet
XiaomiMI 5s Plusnatrium
XiaomiMIX 3perseus
XiaomiMi 3pisces
XiaomiMIX 2Spolaris
XiaomiMI CC 9pyxis
XiaomiMi 11 Lite 5Grenoir
XiaomiMI6sagit
XiaomiMi Note2scorpio
XiaomiMi 11 Ultrastar
XiaomiMi 10Sthyme
XiaomiMi Note 10 Litetoco
XiaomiMi Note 10tucana
XiaomiMi 10umi
XiaomiMI  8  Explorer  Editionursa
XiaomiMi 10 Lite zoomvangogh
XiaomiMi 11venus
Xplore TechnologiesM6M6
YandexYNDX-000SBAmber
Yota DevicesYotaPhone2yotaphone2
YumpingoYUMPINGO_1YUMPINGO_1
ZMBIZIZMBIZIZMBIZI_Z1
ZOOMMEM1M1
ZOOMSMARTLT600TLT600T
ZOOMSMARTLT800LT800
ZTEN940ScN940Sc
ZTENX505JNX505J
ZTENX506JNX506J
ZTENX508JNX508J
ZTENX510JNX510J
ZTENX512JNX512J
ZTENX523J_V1NX523J_V1
ZTENX531J NX531J
ZTENX563JNX563J
ZTENX569JNX569J
ZTENX589JNX589J
ZTENX591JNX591J
ZTENX595JNX595J
ZTENX601JNX601J
ZTENX606JNX606J
ZTERed Magic 5G liteNX651J-EEA
ZTERED MAGIC 5GNX659J
ZTERed Magic 5GNX659J-EEA
ZTENX659JNX659J-RU
ZTENX669JNX669J-EEA
ZTENX669JNX669J-UN
ZTEOrange Neva jetNeva_jet
ZTEZTE BLADE V9P450F10
ZTEP609P609
ZTEZTE A2121EP618A01
ZTEBA602TP637T02
ZTEBA910P653N31
ZTEZTE Blade A7 2020P662F02D
ZTEZTE Blade A7 2020P662F02_D1
ZTEZTE Axon 11P671A13
ZTEZTE Blade V1000RUP671F20D
ZTEZTE 2050P671F50_D
ZTEZTE Blade V 2020P671F60
ZTE ZTE A20 5GP725A02
ZTEZTE Axon 11 5G P725A11
ZTEZTE Axon 11 5GP725A12
ZTEBLADE A506P809F52
ZTEZTE Blade A522P817E53
ZTEBLADE V9 VITAP840F03
ZTET85P840F20
ZTEBV0850P840S01
ZTEZTE BV0870P840V71
ZTEZTE Blade V8 ArcP840V80
ZTEZTE A2019G ProP845A01
ZTEZTE A2019 ProP845A02
ZTEBlade V770P852F52
ZTEZTE Axon 10 ProP855A01
ZTEZTE Axon 10 ProP855A02
ZTEZTE Axon 10 ProP855A03_NA
ZTEZTE Axon 10 ProP855A21
ZTEChina Mobile Forerunner X1P855A23
ZTEZTE Axon 10s Pro 5GP865A02
ZTEZTE Axon 30 5GP875A02
ZTEZTE Blade A3 2020RUP932F50
ZTEA1 AlphaP963F01D
ZTEZTE A7020P963F03
ZTEZTE 8010P963F05
ZTESoshPhone 3SoshPhone_3
ZTETelstra Tough Max 3T86
ZTEBA910TT_P653N31
ZTEVodafone Smart X9VFD822
ZTEBA910V_P653N31
ZTES2010V_P653S10
ZTEBlade A7S 2020-TZ6350T
ZTEP650 ProZ6351O
ZTEP651 2021Z6355O
ZTEZ6530MZ6530
ZTEA003ZTZ6650S
ZTEBlade X1 5GZ6750
ZTEZR01Z7750R
ZTEZ2020N3Z8850K
ZTE902ZTZ8851S
ZTEG718CZTE-G718C
ZTEG719CZTE-G719C
ZTEQ802CZTE-Q802C
ZTEZTE BLADE V0850ZTE_BLADE_V0850
ZTEA1Pailsa
ZTEZTE A2017Uailsa_ii
ZTEZTE C2017alice
ZTEA1Rbilly
ZTEZTE A2018candice
ZTEZmax 3dandelion
ZTEZ999fujisan
ZTEVodafone Smart ultra 6msm8916_32
ZTEB2017Gmsm8952_64
ZTEA2015msm8994
ZTEZTE A2017msm8996
ZTEUhuranoah
ZTEZTE V890sdm660_64
ZTEB2017Gtulip
ZTEN9510warplte
ZebraCustomer Concierge 6000CC610LC
ZebraCustomer Concierge 600CC610LN
ZebraCustomer Concierge 6000CC610PC
ZebraEC50EC50
ZebraEC55EC55
ZebraET5XET50E
ZebraET5XET50T
ZebraET51ET51L
ZebraET51ET51S
ZebraET5XET55E
ZebraET5XET55T
ZebraET56ET56L
ZebraET56ET56S
ZebraZebra Technologies L10L10AW
ZebraZebra Technologies MC2200MC2200
ZebraZebra Technologies MC2700MC2700
ZebraMC330KMC33
ZebraMC3300xMC3300x
ZebraMC3300xMC3300xC
ZebraMC330KMC33C
ZebraZebra Technologies MC9300MC93C
ZebraTC21TC21
ZebraTC26TC26
ZebraTC51TC51
ZebraTC51TC51HC
ZebraTC52TC52
ZebraZebra Technologies TC52xTC52X
ZebraTC55TC55
ZebraTC56TC56
ZebraTC57TC57
ZebraZebra Technologies TC57xTC57X
ZebraTC70xTC70x
ZebraTC72TC72
ZebraPolluxTC75
ZebraTC75xTC75x
ZebraTC75xDFTC75xDF
ZebraTC77TC77
ZebraTC8000TC8000
ZebraZebra Technologies TC8300TC83BH
ZebraZebra Technologies WT6300WT63B0
ZebraMC36cardhu
boxchipS900PlusS900Plus
bqAquaris M5Aquaris_M5
bqAquaris MAquaris_M55
bqAquaris X5 PlusAquaris_X5_Plus
bqAquaris Xbardock
bqAquaris X Probardock-pro
bqAquaris Uchaozu
bqAquaris Cjeice
bqAquaris Vnappa
bqAquaris Vsnappa_s
bqAquaris V Plusraditz
bqAquaris Vs Plusraditz_s
bqAquaris U2yamcha
bqAquaris X2zangya_sprout
bqAquaris X2 PROzangyapro_sprout
duraMOBIDK66DK66
ecomEx-Handy 10Ex-Handy10
ecomSmart-Ex02Smart-Ex02
fplusLife Tab Pluslifetabplus
iDataiData T1T1
iDataiData_50iData_50
iDataiData 50iData_50_EEA
iDataiData_K1iData_K1
iDataiData K1iData_K1_EEA
iDeviceUzbekistanUzbekistan
iHuntS100ApeXS100ApeX
iHuntS60 Discovery PlusS60_Discovery_Plus
iHuntiHunt S90 ApexS90_Apex
iWaylinkMC432MC432A_GWL
iWaylinkTC601ATC601A_GWL
iWaylinkTC601BTC601B_GWL
iWaylinkTC601TC601_GWL
ioutdoorPolar3_EEAPolar3
kozenT5T05
teXetTM-5081TM-5081
teXetTM-5083TM-5083
teXetTM-5084TM-5084
teXetTM-5583TM-5583
teXetTexet TM-5584TM-5584
teXetTM-5702TM-5702
teXetTM-5703TM-5703
This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.