Blockchain X.509 Certification Authority

Public Key Infrastructure (PKI) is the standard today to enable secure communication over the web, sign document or to encrypt sensitive data. PKI comprises digital certificates managed by the certificate authorities (CAs) to verify the user’s identity. However, the security of PKI is unfortunately reliant on the reliability of these third-party CAs. This serves as … Read more

Stir/Shaken APIs

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. As every CodeB Node contains a gateway connecting the Stir/Shaken world with the CBAN Antifraud system we offer a couple of public Stir/Shaken APIs in our Antifraud Namespace on: … Read more

CodeB CommandLine Interface (CLI)

For testing purposes we created an easy to use CommandLine Interface (CLI) to interact with the CodeB WebSocket API. Contact us in case you are interested to try it out! The CodeB CLI support verbs (such as ping, add and check) with various options and parameters. It displays help messages if you call it with … Read more

STIR/SHAKEN and CLI Spoofing Mitigation

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. This means that calls traveling through interconnected phone networks would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. … Read more

Detect & Protect Against Wangiri Callback Fraud

Wangiri Callback Fraud is a widespread and diverse global challenge, damaging operator and service provider reputations and relationships with their subscribers. While fraudsters are well known for their malicious innovations, they are loyal to what works; once a scamming method proves to deliver dependable results, they relentlessly take advantage over the long term. One tried … Read more

Distributed IMEI Blacklisting

Small, portable and high value, mobile devices – and the information stored in them – are attractive to criminals. As high-end handsets can be worth hundreds of dollars,there is a major international black market for mobile devices obtained through theft, fuelled in part by organized crime. For the victim, the experience can be traumatic, as … Read more

CLI Spoofing / OBR Fraud

Increasing numbers of mobile operators within the European economic area have introduced origin based rating (OBR) for voice termination. German mobile network operators introduced significant surcharges in mobile termination rates (MTRs), based on the country of call origination, with differences as much as €0.20 per minute (a 1,000% increase) and further surcharge penalties for calls … Read more