Sunsetting 2G and 3G networks is not an easy step for mobile network operators (MNOs) due to several technical, financial, and social factors. The decision isn’t just about technology—it’s about customers, business strategy, and infrastructure readiness. One of the main challenges is the Legacy Device Support IoT and M2M devices: Many industrial machines, alarm systems, […]


🔐 The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently have access to the SS7 network, taking advantage of its low security. Consequently, more businesses and individuals with direct access to the network, as […]

👉Previous generations relied on the SS7 and Diameter protocols. The 5G network core is built on well-known Internet protocols such as HTTP and TLS. 👉 Security threats associated with 3G and 4G will remain after 5G reaches the public and heavily influence NR deployments. However, the main challenge with 5G is that Internet technologies are […]

📃5Ghoul is the name given to a set of 14 newly discovered vulnerabilities in Qualcomm and MediaTek 5G modems, disclosed in December 2023 by researchers from the Singapore University of Technology and Design (SUTD). These vulnerabilities affect hundreds of smartphone models and allow cyberattacks on 5G-enabled devices. 👉5GHoul = 5G + Ghoul, an Arabic mythology. […]

👉 The first 2G mobile network in the world was launched in Finland in 1991, marking the first digital mobile network and replacing analogue 1G systems. 👉 The Nokia 1100, launched in 2003, remains the best-selling phone of all time, with over 250 million units sold. Also, it had a firmware bug that hackers could […]

The Question is Actual 5G or Icon-only 5G! Recently, a new mobile app called SignalTracker showed that nearly 40% of 5G connections are actually 4G, as per PolicyTracker. Actual 5G is about twice as fast as icon-only connections, averaging 49 Mbps compared to 27 Mbps in our tests. In UK tests, when the 5G icon […]

The journey started with 2G and 3G, where Voice was the leading service, and the main protocols were SS7 and SIGTRAN (Signaling Transport). At this time, the primary Firewalls are: SS7/SIGTRAN Firewall: Its functions are national/international interconnect protection with different policies and detection patterns in real-time. GTP Firewall: The functions are GTP Packet binary checks […]

SS7 was never designed with security in mind, so it has always been open to internal and external threats. S7 Firewall is a smart, rules-based system that can monitor, create rules, and enforce policies to prevent or mitigate the effects of these attacks. It is essential for safeguarding your network and subscribers. The GSMA’s FS.11 […]

When I started my 5G Journey in 2017, I first explored the 5G network versions: 5G NSA (Non-Standalone) and 5G SA (Standalone). Most MNOs envision starting with 5G NSA and moving towards the full capabilities of 5G SA. However, the reality of 5G SA has so far proved somewhat different from the vision. Here, I […]

Voice calls remain one of the most vital means of communication in both personal and professional spheres. They provide instant and direct interaction, allowing for clear and immediate conversations. Unlike text-based communication, voice calls share emotions and urgency, making them invaluable for building relationships, conducting business, and handling emergencies. To enhance the efficiency for connecting […]

Currently, I see some confusion regarding 5G identification and the purpose of each one, such as which network node generates them and the subscriber’s role. I summarized the 3 identifications in one page, and here is the summary: What is SUPI? The Subscription Permanent Identifier (SUPI) is stored within the SIM. The SUPI is the […]