Addressing SIM Swap Fraud with Codeb’s Identity Broker-Initiated OIDC Authentication

Nowadays, SIM swap fraud poses a significant threat to personal and financial security. This form of identity theft involves fraudsters manipulating mobile carriers to transfer a victim’s phone number to a new SIM card under their control. However, innovative solutions like Codeb’s Identity Broker-Initiated OpenID Connect (OIDC) Authentication are stepping up to address this challenge. … Read more

How do I configure CodeB SMS for SMS Authenticity

To use the SMS validation feature of the CodeB app, please follow these three steps: Firstly, after installing the app, configure and confirm your mobile number in the “Settings” menu by selecting “Own Number” and pressing “OK”. Secondly, configure your carrier’s CodeB Identity Node by selecting “CodeB Identity” in the “Settings” menu. The default setting … Read more

Blockchain X.509 Certification Authority

Public Key Infrastructure (PKI) is the standard today to enable secure communication over the web, sign document or to encrypt sensitive data. PKI comprises digital certificates managed by the certificate authorities (CAs) to verify the user’s identity. However, the security of PKI is unfortunately reliant on the reliability of these third-party CAs. This serves as … Read more

The Future of Telecommunications: Blockchain Automation Networks, SSI, OpenID Connect, and Anti-Fraud Measures

In the dynamic landscape of telecommunications, Blockchain Automation Networks (BANs) are emerging as a transformative force. Coupled with Self-Sovereign Identity (SSI), OpenID Connect, and anti-fraud measures, these networks are set to revolutionize the industry. Let’s explore this exciting frontier, including insights from the Communications Business Automation Network (CBAN). Blockchain and Telecommunications: A Perfect Match Blockchain, … Read more

Stir/Shaken APIs

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. As every CodeB Node contains a gateway connecting the Stir/Shaken world with the CBAN Antifraud system we offer a couple of public Stir/Shaken APIs in our Antifraud Namespace on: … Read more

Integration of Stir/Shaken into Asterisk

As deadlines for Stir/Shaken are just around the corner even other countries are considering to introduce Stir/Shaken or similar methods. As we offer a broad range of Fraud Mitigation and Stir/Shaken APIs you can find below an example macro for Asterisk to integrate CodeB’s Stir/Shaken API. Note: Please do not forget to replace the string … Read more

CodeB CommandLine Interface (CLI)

For testing purposes we created an easy to use CommandLine Interface (CLI) to interact with the CodeB WebSocket API. Contact us in case you are interested to try it out! The CodeB CLI support verbs (such as ping, add and check) with various options and parameters. It displays help messages if you call it with … Read more

STIR/SHAKEN and CLI Spoofing Mitigation

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. This means that calls traveling through interconnected phone networks would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. … Read more

Detect & Protect Against Wangiri Callback Fraud

Wangiri Callback Fraud is a widespread and diverse global challenge, damaging operator and service provider reputations and relationships with their subscribers. While fraudsters are well known for their malicious innovations, they are loyal to what works; once a scamming method proves to deliver dependable results, they relentlessly take advantage over the long term. One tried … Read more

Distributed IMEI Blacklisting

Small, portable and high value, mobile devices – and the information stored in them – are attractive to criminals. As high-end handsets can be worth hundreds of dollars,there is a major international black market for mobile devices obtained through theft, fuelled in part by organized crime. For the victim, the experience can be traumatic, as … Read more