irbis network - safecalls.io · increased pressure on existing networks, coupled with the need to...

32
Version WP 1.2 | 17.05.2019 Decentralized telecommunications network (IBS) IRBIS NETWORK

Upload: others

Post on 19-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Version WP 1.2 | 17.05.2019

Decentralized telecommunications network

(IBS)

IRBIS

NETWORK

Page 2: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

1. Modern State of Mobile Telecom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.1 Market Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2 Economic Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2.1 Multiple Intermediaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2.2 Excessive expenditures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2.3 Telecom Oligopoly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3 Telecom Security Breaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3.1 Data Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3.2 SMS Interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3.3 Wiretapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4 Mobile telecom: Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2. SafeCalls Telecom Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.1 Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.2 Development Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.3 Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.3.1 SafeCalls SIM-cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.3.2 VoIP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.3.3 @SafeCallsBot for Telegram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.4 How does SafeCalls differ from traditional mobile telecom? . . . . . . . . . . . . . . . . . . . . .

3. Irbis Network Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.1 Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.1.1 Fiat part: Payments and client services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.1.2 Cryptocurrency part: Irbis Network Tokens (IBS) . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.2 Emission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.2.1 IBS Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.2.2 Fundraising and IEO Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.3 Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.4 Advisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4. Legal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4.1 Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4.2 Risks of the project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4

5

6

6

7

7

8

8

9

10

11

12

13

13

14

14

14

15

16

18

19

21

21

21

21

22

23

25

28

29

30

2Decentralized telecommunications network

Contents

Page 3: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

In the Press

3Decentralized telecommunications network

Page 4: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

CH

AP

TE

R

4Decentralized telecommunications network

MODERN

STATE

OF MOBILE

TELECOM

Page 5: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Today, telecommunications industry accounts for more than 4% of world GDP, amounting to more

than $3 trillion. More than 32 million jobs around the world are directly or indirectly connected to

the world of telecommunications.

Despite the widespread penetration of communications around the world, the world market is still

far from saturation, in particular, in the field of mobile communications. According to GSMA

statistics, global mobile penetration reaches 63%, i.e. almost 3 billion people in the world have

never used a cell phone. The main regions with high growth potential will be emerging markets

such as China and Brazil, as well as countries in the African continent. Judging by the pace of

infrastructure development in these countries today, it is safe to forecast that by 2020 the level of

penetration of mobile communication in those countries will be comparable with similar indicators

in developed countries.

Even if the lagging regions are completely saturated with traditional cellular communications, the

mobile telecom sector will not exhaust its growth potential. The reason for this is technical

progress and the emergence of new trends in the global economy. One of these development

triggers is the digitization of the economy, due to which the number of connected devices (incl. IoT

hardware) will increase from 18 billion to about 50 billion by 2020 and to 100 billion by 2025.

Increased pressure on existing networks, coupled with the need to implement networks of the fifth

and sixth generations in the coming years will require the largest telecommunications companies

to invest $900 billions in infrastructure modernization in the long term of 5-6 years.

In this context we at SafeCalls Telecom see our mission as to compete with big telecom

companies by means of cost-effective traffic routing, lowering costs on marketing needs and

making all communication of our customers secure, which will ultimately result in higher quality

services which cost less than in traditional telecom.

5Decentralized telecommunications network

1.1 Market Size

MODERN STATE OF MOBILE TELECOM

Page 6: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Because of the fact that voice calls cannot be mixed with internet traffic, the information can’t be

sent via the most optimal and cost-effective way, which would solve the issue with excessively

expensive roaming phone calls. Overall, a common user may overpay up to 10 times for an

international call in comparison of what he pays for a home region call.

1.2.1 Multiple Intermediaries

As it was mentioned above, mobile telecom still uses technologies that stem back to 1970s.

Technological restrictions lay in the base of today’s communication process: it means that every

mobile provider should route voice traffic from one user to the other using a queue of

intermediaries, if users have different providers or, moreover, if they make international mobile

phone calls.

6Decentralized telecommunications network

MODERN STATE OF MOBILE TELECOM

1.2 Economic Challenges

Page 7: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

7Decentralized telecommunications network

MODERN STATE OF MOBILE TELECOM

1.2.2 Excessive expenditures

Traditional telecom companies have turned into billion-cap companies not only because their

intensive investments in hardware and telecom know-how, but rather heavily spending money on

marketing, boasting expenditures which are not directly connected with their primary activity. The

major part of them is paid by users paying their phone bills — after all, such service demand has

very low elasticity, which sometimes enables big telecom to spend their profits on side projects

with remarkably bad financials.

1.2.3 Telecom Oligopoly

Because of the fact that telecom operation requires some intensive capital investing to have

business up and running, it makes an exceptionally high entry barrier into the sector. Such

investments can’t be equally distributed in time: a bare minimum for telecom launch includes

hardware datacenters, telecom towers network, high-load software for operation, etc.

All the issues mentioned above result in what economists call oligopoly — a market of a few

companies which sometimes are not interested or just can’t create full-blown market competition,

because the demand of the service is constantly raising, and it does not lead to any significant

changes in the market position of companies already present in the sector.

Page 8: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Cellular service in the modern world is an essential means of two-way data exchange. Transfer of

information through its channels is carried out in various areas of human activity and often requires

compliance with an increased confidentiality.

Nevertheless, a significant number of leaks from state, municipal, commercial and non-profit

organizations prove vulnerability of the system. Telecommunications networks are still not

particularly perfect and have a number of security breaches, among which is an outdated SS7

technology.

SS7 also referred to as the Signaling System #7, was introduced about 40 years ago (in 1970s) and

in those years has been a breakthrough in terms of security.

The problem requires publicity and urgent action, as numerous telecom operators keep on using

this signaling system internationally, while some cases of real attacks have already been reported1.

SafeCalls has created various telecom solutions bearing it in mind and fixing all possible security

breaches, which are described below in more detail.

1.3.1 Data Acquisition

To commit an attack, a hacker needs to obtain an international mobile subscriber identity (or

“IMSI”). This can be done by delivering text message from external “network” emulated on the

computer. In response to request, home network reports the MSC/VLR address, which helps find

out whether the subscriber is at home or in roaming; and if in roaming, which network he/she is

using (in order to send SMS there). At the same time transmission of IMSI occurs that is also

necessary for message routing.

1.3 Telecom Security Breaches

8Decentralized telecommunications network

MODERN STATE OF MOBILE TELECOM

1 For more information on the topic read our research SS7

Page 9: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Since SMS requests from MSC/VLR delivery of confirmation, attacker has several options:

• to send to the sender confirmation on the message delivery,

• send confirmation to the sender and a modified message to subscriber, or

• do not send confirmation to the sender, intercept the message to his/her address and

request to resend this message to subscriber.

As a result, an attacker obtains the subscriber’s IMSI to control parameters of his/her “profile”, HLR

address where these parameters are stored, as well as the MSC/VLR address (information about

what region (country) this subscriber is currently in).

1.3.2 SMS Interception

Interception of text messages is carried out after blocking subscriber’s services. No additional

actions are required for this attack.

9Decentralized telecommunications network

MODERN STATE OF MOBILE TELECOM

Page 10: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

10Decentralized telecommunications network

2 For more cases (e.g. wiretapping, profile spoofing etc.) read our research SS7 ENG

MODERN STATE OF MOBILE TELECOM

Such manipulation is carried out in a few seconds, and interlocutors do not have time to

suspect that there is someone third between them2.

If desired, an attacker can specify his/her MSC/VLR address and start receiving the victim’s traffic:

read all message history or request one-time SMS passwords for authorization on various online

services.

1.3.3 Wiretapping

Using profile spoofing, hacker can change address of the balance platform and specify an address

of equipment that is under his/her control. Then call forwarding will go to the number of attacker,

who will illegally interfere into conversation.

Page 11: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Technological

lagging:

widely spread signalling system 7 is

outdated and has numerous security

breaches which allow unlawful activities

with the private data of mobile users

Telecom

Oligopoly:

the entry barrier is very high in terms of

investments, so the market suffers from

the lack of service providers, making

telecom a sector which is not enough

competitive

Excessive

expenditures:

telecom companies are heavily

spending money on marketing, boasting

expenditures which are not directly

connected with their primary activity —

all of this is out their users’ pockets

Multiple

intermediaries:

conventional voice calls can’t be mixed

with internet traffic, the information

can’t be sent via the most optimal and

costeffective way, which would solve

the issue with excessively expensive

roaming phone calls

To cap it all, modern mobile telecom has a number of issues and inefficiencies which are paid for

by its users. We at SafeCalls Telecom are going to tackle the following problems:

1.4 Mobile telecom: Problem Statement

11Decentralized telecommunications network

MODERN STATE OF MOBILE TELECOM

Page 12: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require
Page 13: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

To be done:

• Distributed Irbis Network

• Network nodes

• Main network launch

• SIM for IoT

• VPN Network

2020

Telegram bot launch

To be done:

• Sale of Internet SIM

• IEO Round (Q2)

• Release of secure SafeCallsOS-based smartphone (Q4)

• Sale of eSIM connected to Telegram bot (Q4)

2019

Secure VoIP launch2018

Launch of a secure GSM network via SIM2017

SafeCalls Telecom is a distributed mobile communication service that uses a ready-made mobile

network infrastructure together with their new nodes that are developed and supported by

community members.

SafeCalls Telecom is based on the technology of routing mobile traffic and voice calls in such a way

that information is received and transmitted through the most advantageous channel, taking into

account the cost of using it and the quality of the connection itself.

SafeCalls Telecom system is designed in such a way it removes the inherent costs of cellular

operators on marketing from users' subscription fees, increases competition in the market of

cellular operators, eliminates excessive mobile roaming expenses, and improves mobile

communications security.

2.1 Business Overview

2.2 Development Timeline

13Decentralized telecommunications network

SAFECALLS TELECOM PROJECT

Page 14: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

2.3.2 VoIP Service

SC.VoIP is a basic product provided to SafeCalls Telecom

subscribers.

The main difference between VoIP SafeCalls and other

VoIP-providers:

• proprietary communication protocol;

• encrypted traffic (audio / video / text);

• substitution of outgoing numbers;

Subscriber protection in GSM communications is a comprehensive mechanism that includes:

• dynamic identifiers (IMSI + Ki, hidden MSISDN);

• SIM-card encryption (signaling encryption);

• SIM card data protection from third parties (self-destruction);

• forced encryption of GSM traffic using the A5 algorithm;

• a ban on the transfer of subscriber geodata;

• incoming virtual numbers of 224 countries (> 10 numbers on 1 SIM card);

• lack of billing (third parties will not be able to get an extract on calls);

• substitution of CLI numbers (you can change the outgoing number for the call);

• voice change (hiding the real voice of the subscriber);

• secure mobile Internet (works via VPN communication channel);

• anonymous connection of the subscriber to the network (without identification).

2.3.1 SafeCalls SIM-cards

Work on any phones through the towers of mobile operators in 150

countries of the world. No internet connection is required. A SIM

card is required to use this connection. Subscribers can use

anonymous mobile Internet via SIM cards.

Thanks to the built-in protection at the operator level and the SIM

card level, SafeCalls subscribers use secure communication in 150

countries of the world.

2.3 Products

14Decentralized telecommunications network

SAFECALLS TELECOM PROJECT

Page 15: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

• change of voice according to phonetic features;

• virtual numbers of different countries;

• payment by cryptocurrency;

• anonymous connection.

Works wherever there is Internet. One can connect to a secure connection through an application

on a smartphone / tablet / PC.

In order to use VoIP, a subscriber needs to:

• sign up;

• replenish the balance (USD);

• use the app to make calls;

• OR purchase a separate VoIP phone.

VoIP is the main technology of SafeCalls Telecom, which allows to further develop other

products of the company and create a distributed network.

2.3.3 @SafeCallsBot for Telegram

Our Telegram-bot uses the same infrastructure as VoIP. At the

moment, both VoIP and the bot are already functioning, and they

will continue to expand their functionality. The bot allows users to

make anonymous calls to any phone numbers, substitute their

number, change the voice timbre. The product is in open beta.

The SafeCalls bot is a convenient service for making secure calls

and getting familiar with SafeCalls Telecom products. In the future,

the user can buy a SafeCalls Telecom SIM card and / or become a

VoIP subscriber.

15Decentralized telecommunications network

SAFECALLS TELECOM PROJECT

Page 16: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Only we provide:

• dynamic identifiers

(IMSI + Ki, hidden MSISDN);

• incoming virtual numbers

of 224 countries

(> 10 numbers on 1 SIM card);

• lack of billing (third parties will not

be able to get an extract on calls);

• substitution of CLI numbers

(you can change the outgoing

number for the call);

• voice change (hiding the real

voice of the subscriber);

• each new call is randomly routed

through a different voice traffic

provider;

• secure mobile Internet (works via

VPN communication channel);

• anonymous connection

of the subscriber to the network

(without identification).

Every provider has:

• static identifiers

(IMSI + Ki, public MSISDN);

• identification of the subscriber;

• high prices for roaming calls

and Mobile Internet;

• connection via one voice

communication channel.

16Decentralized telecommunications network

SAFECALLS TELECOM PROJECT

2.4 How does SafeCalls differ

from traditional mobile telecom

SС Telecom users are protected from interception of mobile data and listening to calls:

The described communication scheme gives users several advantages over traditional cellular

communication:

• In SafeCalls Telecom there is no - concept

of roaming as such, respectively, the

prices for calls within one country and for

international calls are comparatively

inexpensive;

• Smartphones SafeCalls equipped with

hardware encryption function calls, text

messages and Internet traffic;

• Complicated routing of communication

channels eliminates the ability to track

where the call was made or the message

was sent;

• All network infrastructure is on servers of

many countries. Its development is not

controlled by the central government, but

proceeds according to the laws of the

market.

Page 17: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

17Decentralized telecommunications network

SAFECALLS TELECOM PROJECT

Contributors participating in the Irbis Network token sale channel their money in developing

software, equipment for network nodes and community growth around the world. Such

contributions will also help to create so-called "out of the box solutions" for a distributed network,

so you can easily deploy new nodes and new that will lead to the rapid growth of the entire SC

Telecom distributed network. It is also worth mentioning that contributors can also maintain their

own infrastructure nodes, increasing their profits from participation in the work of Irbis Network.

Thus, the cost of communication services of a distributed network consists of payment for the

used channel and commission of the routing node. Despite the existence of a commission,

infrastructure holders and contributors, communication services from SC Telecom are competitive

in price for national communications and are an order of magnitude more advantageous than

traditional international roaming.

Page 18: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require
Page 19: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

The entire economy of the project is divided into 2 parts: fiat and cryptocurrency parts. The

functionality of the fiat part allows users to deposit funds to the balance in order to make calls and

send messages. SafeCalls Telecom is a link that performs the function of subscriber billing, i.e.

writes off funds from accounts and makes payments to telecom operators for used communication

channels.

The Fiat part has the form of a centralized USD database with balances and subscriber operations,

which is necessary for the correct calculation of subscriber payments, as well as the calculation of

commissions that are sent to the decentralized part of the SafeCalls Telecom system.

3.1 Infrastructure

19Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 20: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

The decentralized part of SafeCalls Telecom consists of routers-nodes of the network, as well as a

blockchain, which performs several functions: storing the actual rates for communication with

different operators, registering functioning routers in the network, transferring value

(cryptocurrency payments in system tokens), and also performing smart contracts, according to

which the calculation of the volume of user fees to routers in the network.

20Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 21: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

21Decentralized telecommunications network

While a user pays for SafeCalls Telecom services in IBS, conversion to fiat occurs automatically at

the exchange rate, eliminating exchange risks both for the company and for a user.

Fundraising (IEO) SafeCalls Telecom

services and products

payments

Conversion

to the mainnet tokens

once the distributed

system launches

3.2.1 IBS Functions

3.2 Emission

3.1.1 Fiat part: Payments and client services

Fiat (USD) is used by the service for the following operations within the network:

• Calls;

• Mobile traffic;

• Conversion to tokens with subsequent payment of the network commission;

• Anonymity functions:

• Changing / hiding the phone number;

• Voice timbre changes.

At the first stage of the functioning of the system, the acceptance of subscriber payments is

realized according to the traditional for any cellular provider without using cryptocurrency

operations. In the the future, SafeCalls Telecom may enter into a partnership with the

cryptocurrency acquiring service for accepting payments in cryptocurrency and instant crediting

to a Fiat deposit at the exchange rate.

3.1.2 Cryptocurrency part: Irbis Network Tokens (IBS)

IBS tokens provide value transfer in the distributed part of the decentralized cellular network

system (see p. “Infrastructure”). By drawing parallels with existing blockchain solutions, IBS can be

compared with “gas” tokens, which are spent on transactions in the Ethereum blockchain. Tokens

are also needed by the infrastructure holders: for the operation of their routers in their accounts, it

is necessary to block the deposit of tokens.

IRBIS NETWORK CONCEPT

Page 22: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require
Page 23: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Petr MalyukovCEO, CO-FOUNDER

Serial entrepreneur. Talented manager, has created multiple

brands from scratch in high-tech sector. Advertising and PR

expert, has extensive experience of growing startups into big

companies.

SC Telecom co-founder and CEO since 2015.

Vitalii MaliuginCTO, CO-FOUNDER

Telecom and IT expert with +15 years of experience. Worked as

leading expert in one of Russia’s top 3 telecom operators.

Vitaii has profound knowledge of high-load telecom

architectures, hardware and software solutions, as well as traffic

monitoring and routing experience.

3.3 Team

23Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 24: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

There are more than 15 specialists from different areas in out team:

24

Tao Y.Project Manager

Fillip E.PR Manager

Valeria T.SMM Manager

Vinay D.Backend Developer

Anastasia K.UI/UX Designer

Kristian V.Marketing Manager

Manish F.Backend Developer

Kirill G.Blockchain Developer

Sergey M.Hardware Engineer

Yunsu K.Mobile Developer

Jooseok Y.Frontend Developer

Mark H.Data Base Administrator

Alexander M.Frontend Developer

Shikhar M.Backend Developer

Anatoly O.Cryptographic Engineer

Stanislav B.OS Developer

Vadim F.Software Engineer

Jackie W.DevOps Engineer

Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 25: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Australia

Bradley Townsend

Bradley is a sales and business development professional with a strong passion for

blockchain technology. Co-founder and Director of Latitude Blockchain Services Bradley has

built strong relationships throughout the industry and has helped multiple companies

assisting them in business dev, Community Management and IEO introductions.

Korea

Young K Choe

Young Choe is Advisor to many blockchain projects including Evens, EOS Chrome, EcoStart,

Mix.Rent, BeWELL, EdenChain, AmbleX, Platinum Q DAO, Boltt Protocol, GBC Korea, Davinci

Foundation, etc. He was Co-Founder and President/CTO of Color Platform – a fourth

generation blockchain platform empowered with SoC.

He is an editor of “Blockchain Today” magazine. Young is an Expert at ICObench – a global ICO

rating platform – and a Director to OSSF(Open Source Software Foundation). He is Adjunct

Professor at Yonsei University in Korea.

He is a software and blockchain professional, an executive, and a professor having broad

experiences from development to top management, from theories to practices at various global

companies and organizations including NVIDIA, Samsung Electronics, SK Hynix, North Carolina

State University, BMC Software, Sungkyunkwan University, 3Ksoftware, KBIPA (Korea

Blockchain Industry Promotion Association), and CE Linux Forum. He has expertise in software

engineering, compiler and language technology, cryptography, and blockchain.

He holds advanced degrees in computer science from North Carolina State University and is a

member of Executive Blockchain Program at Draper University in California. He has also

experience in crypto-investment, M&A, Revised ICO/IEO, Reverse-ICO’s.

Young currently leads a crypto-finance & cybersecurity company (3KFinance) as CSO and a

Blockchain/AI/DeFi/Cryptocurrency company (Crypto Valley Lab, Inc.) as CEO & Founder.

3.4 Advisors

25Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 26: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Maria Lapuk

Mariya has over 10 years of experience in digital PR and marketing transformation. She is one of

the most recognized PR leaders in the Russian Federation and Baltic States, having been awarded

"PR Profile of the Year 2015" at Internet Initiatives Development Fund, The Initiator of Venture

awards that turned into the favorite of Russian Startup Communities starting 2013, "Most

Influential Networker 2013" at Odnoklassniki, "PR Professional of the Year 2012" at MTC).

Mariya is currently a professional PR consultant for Fortune 500 companies based in Moscow

where she coaches, consults, and engages in operational planning of strategic key chains of a

variety of commercial entities to help them grow locally and regionally and allow them to earn six

digit revenues.

Russia

Israel

Mikhail Zhukov

Member of the Board in Russia - Hong Kong Business Association.

Mikhail is one of pioneers of Chinese-Russian business, who saw its potential back in the 90s.

Serial entrepreneur, he has business connections and personal relationships with many chinese

businessmen, top managers of state owned corporations and officials.

Mikhail is an expert of trade and customs regulations, legal and financial system, government

structure of China. He has expertise in chinese SMM: Wechat activities, PR and Chinese Media.

USA

Zach Daniels

Zach Daniels is a network engineer with over 12 years of experience in the IT industry. Zach’s

expertise in security, networking and architecture provides a strategic approach to growth and

value creation within the blockchain industry. He has worked and advised on multiple projects in

the cryptocurrency and blockchain space, and regularly speaks around the world regarding the

practical applications of the technology, as well as advises startups on business and ICO strategy.

His passions consist of developing business strategies within the tech industry, as well as serving

as a community advocate for computer security, blockchain technology & cryptocurrency, and

educating individuals on wealth creation through the trading and investing of digital assets.

26Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 27: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Princess Svetlana Lydia Von Pommern-Peglow

Svetlana von Pommern-Peglow is a strategic risk lawyer and founder/CEO of Fermion Q Alpha

group which develops quantitative solutions and platforms for the hedging/management of

tail/litigation/regulatory risks, in particular for fintech, trading and licensing.

She is also a respected projects facilitator and investor/government relations manager in particular

when projects involve cross-border issues.

In her capacity as international advocate with more than 20 years of experience in Moscow,

Frankfurt, Singapore, London and Zurich, she has also been involved in high profile market

manipulation cases (layering/HFT/DMA) and follows academic research in this area. Currently, she

is developing the pioneering Q-Alpha platform as a separate tail risk SPV.

Additionally Svetlana is a fundraiser and strong of fintech, musical, art and fashion talents.

United Kingdom

Before becoming a solo PR strategic consultant, Mariya was the Head of the Media Department at

Internet Initiatives Development Fund (IIDF) that allowed her to network with 20% of the most

influential Russian Venture capitalists, C-level executives, and regional government leaders. Simply

put, they were the meat and potatoes that gave her a green light to become a “must talk to” PR

expert.

Prior to this role, she was Vice President of the PR Department at Odnoklassniki (part of Mail.Ru

Group), leading brand positioning, communications, and PR operations. During her professional

career with Mail.Ru Group, Mariya appeared in a number of traditional and digital media consulting

startups, engaging with numerous Russian SMEs and iconic companies, such as Yandex, MTC,

Samsung, Ferrari, Vodka, and dozens of others.

Today, Mariya is open to thought-provoking projects, regardless scale, location, and industry. She

always gives a hand to help a starting entrepreuner-spirited collegue and couterparts to make the

seemingly impossible task.

27Decentralized telecommunications network

IRBIS NETWORK CONCEPT

Page 28: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require
Page 29: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

The information contained in this White Paper may not be complete. The content of the document

does not imply any elements of the contractual relationship, is not mandatory for the Company

and may be changed in the future as the design and development of the IBS system is in progress.

The White Paper does not contain investment, legal, tax, regulatory, financial, accounting or other

recommendations.

The technical document should not be considered as the only correct and comprehensive basis for

evaluating the acquisition transactions of IBS.

Nothing in this official document can be considered as a request for investment, and in no way

should be considered as an offer to buy any securities in any state jurisdiction.

This document does not fall under the jurisdiction of any state that prohibits or in any other way

restricts operations with cryptocurrency.

A number of statements, estimates and financial data contained in this technical document are

forecasts and not actual information.

In general, the totality of unknown risks and other uncertainties associated with the project, its

actual performance may differ from the forecasts given in this document.

4.1 Disclaimer

29Decentralized telecommunications network

LEGAL

Page 30: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Inability to return

The company is not obliged to redeem

IBS or otherwise refund the funds to the

holders of the coins for any reason. IBS

does not provide any guarantees of

value, including their inherent value of

coins. Therefore, the return of invested

funds may be impossible. In addition, it

may be restricted by laws and

regulations other than those applicable

to the holder of IBS.

Risk of losing

private keys

IBS coins can be stored in a digital wallet

or vault, for access to which a digital key

or combination of digital keys is

required. Loss of keys associated with a

digital wallet or vault will result in loss of

access to its balance. In addition, a third

party who has gained access to private

keys that the holder uses to access the

wallet or the vault will get access to the

IBS coins located in them. Company

entities are not responsible for the losses

that this may entail.

Speculative risks

Evaluation of cryptocurrency in the

secondary market is often opaque. The

cost of IBS can fluctuate dramatically

over a short period of time.

Risk of loss of value

There is a significant risk that the holder

of IBS coins may lose their entire value

as a result of their depreciation. The

company does not guarantee the value

of IBS and does not predict its liquidity.

The company is not and should not be

responsible for the market value of IBS,

or its liquidity.

Acquisition of IBS is associated with a high degree of risk. A number of factors can have a

significant negative impact both on the cost of IBS and on the entire distributed network. The

following list of risks and uncertainties that IBS holders may encounter is not exhaustive.

4.2 Risks of the project

30Decentralized telecommunications network

LEGAL

Page 31: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Risk from

the state regulator

The industry in which the Company

operates is new and may be subject to

increased supervision and control. The

property of the Company and its

operations are governed by regulations

of various government agencies and are

subject to annual inspections. Inspection

bodies may conclude that the Company

has violated laws, decrees or rules and

cannot refute these findings or promptly

eliminate violations. Decisions of state

bodies, requirements, sanctions - any

increase in state regulation of the

Company's activities may increase the

expenses of the Company and adversely

affect its operations.

Lack of

infrastructure

Hackers, other groups and organizations

may attempt to intervene in a smart

contract or other aspects of the

operation of IBS in various ways,

including, but not limited to, malware

attacks, denial of service attacks and

other common methods of disrupting

the normal operation of digital services.

Insufficient

regulatory

framework

The legal status of cryptographic tokens,

cryptocurrencies, other digital assets

and blockchain technology remains

unidentified in many countries.

Predicting how soon and 21 how

government agencies will begin to

regulate the distribution and use of

listed assets, as well as blockchain

technology, is not possible.

31Decentralized telecommunications network

LEGAL

Page 32: IRBIS NETWORK - SafeCalls.io · Increased pressure on existing networks, coupled with the need to implement networks of the fifth and sixth generations in the coming years will require

Secure GSM network

https://safecalls.io

Secure VoIP

https://safecalls.io/voip/

Secure Telegram Bot

https://safecallsbot.com

IEO

https://safecalls.io/ieo/

Smart contract (ERC20)

https://etherscan.io/token/0x94534caebd1887be3d57179728a670a3436bb443

Official corporate website

https://sctelecom.org

Email

[email protected]

Telegram Chat

https://t.me/sccommunity

Telegram Channel

https://t.me/sctelecomchannel

Twitter

https://twitter.com/SCTelecomORG

Facebook

https://www.facebook.com/safecalls

Linkedin

https://www.linkedin.com/company/sctelecom

Reddit

https://www.reddit.com/r/SCTelecom

Community

32Decentralized telecommunications network