irbis network - safecalls.io · increased pressure on existing networks, coupled with the need to...
TRANSCRIPT
Version WP 1.2 | 17.05.2019
Decentralized telecommunications network
(IBS)
IRBIS
NETWORK
1. Modern State of Mobile Telecom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1 Market Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Economic Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1 Multiple Intermediaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2 Excessive expenditures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3 Telecom Oligopoly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 Telecom Security Breaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.1 Data Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.2 SMS Interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.3 Wiretapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4 Mobile telecom: Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2. SafeCalls Telecom Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1 Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Development Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.1 SafeCalls SIM-cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.2 VoIP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.3 @SafeCallsBot for Telegram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4 How does SafeCalls differ from traditional mobile telecom? . . . . . . . . . . . . . . . . . . . . .
3. Irbis Network Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1 Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.1 Fiat part: Payments and client services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.2 Cryptocurrency part: Irbis Network Tokens (IBS) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Emission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2.1 IBS Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2.2 Fundraising and IEO Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.4 Advisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4. Legal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.1 Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Risks of the project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4
5
6
6
7
7
8
8
9
10
11
12
13
13
14
14
14
15
16
18
19
21
21
21
21
22
23
25
28
29
30
2Decentralized telecommunications network
Contents
In the Press
3Decentralized telecommunications network
CH
AP
TE
R
4Decentralized telecommunications network
MODERN
STATE
OF MOBILE
TELECOM
Today, telecommunications industry accounts for more than 4% of world GDP, amounting to more
than $3 trillion. More than 32 million jobs around the world are directly or indirectly connected to
the world of telecommunications.
Despite the widespread penetration of communications around the world, the world market is still
far from saturation, in particular, in the field of mobile communications. According to GSMA
statistics, global mobile penetration reaches 63%, i.e. almost 3 billion people in the world have
never used a cell phone. The main regions with high growth potential will be emerging markets
such as China and Brazil, as well as countries in the African continent. Judging by the pace of
infrastructure development in these countries today, it is safe to forecast that by 2020 the level of
penetration of mobile communication in those countries will be comparable with similar indicators
in developed countries.
Even if the lagging regions are completely saturated with traditional cellular communications, the
mobile telecom sector will not exhaust its growth potential. The reason for this is technical
progress and the emergence of new trends in the global economy. One of these development
triggers is the digitization of the economy, due to which the number of connected devices (incl. IoT
hardware) will increase from 18 billion to about 50 billion by 2020 and to 100 billion by 2025.
Increased pressure on existing networks, coupled with the need to implement networks of the fifth
and sixth generations in the coming years will require the largest telecommunications companies
to invest $900 billions in infrastructure modernization in the long term of 5-6 years.
In this context we at SafeCalls Telecom see our mission as to compete with big telecom
companies by means of cost-effective traffic routing, lowering costs on marketing needs and
making all communication of our customers secure, which will ultimately result in higher quality
services which cost less than in traditional telecom.
5Decentralized telecommunications network
1.1 Market Size
MODERN STATE OF MOBILE TELECOM
Because of the fact that voice calls cannot be mixed with internet traffic, the information can’t be
sent via the most optimal and cost-effective way, which would solve the issue with excessively
expensive roaming phone calls. Overall, a common user may overpay up to 10 times for an
international call in comparison of what he pays for a home region call.
1.2.1 Multiple Intermediaries
As it was mentioned above, mobile telecom still uses technologies that stem back to 1970s.
Technological restrictions lay in the base of today’s communication process: it means that every
mobile provider should route voice traffic from one user to the other using a queue of
intermediaries, if users have different providers or, moreover, if they make international mobile
phone calls.
6Decentralized telecommunications network
MODERN STATE OF MOBILE TELECOM
1.2 Economic Challenges
7Decentralized telecommunications network
MODERN STATE OF MOBILE TELECOM
1.2.2 Excessive expenditures
Traditional telecom companies have turned into billion-cap companies not only because their
intensive investments in hardware and telecom know-how, but rather heavily spending money on
marketing, boasting expenditures which are not directly connected with their primary activity. The
major part of them is paid by users paying their phone bills — after all, such service demand has
very low elasticity, which sometimes enables big telecom to spend their profits on side projects
with remarkably bad financials.
1.2.3 Telecom Oligopoly
Because of the fact that telecom operation requires some intensive capital investing to have
business up and running, it makes an exceptionally high entry barrier into the sector. Such
investments can’t be equally distributed in time: a bare minimum for telecom launch includes
hardware datacenters, telecom towers network, high-load software for operation, etc.
All the issues mentioned above result in what economists call oligopoly — a market of a few
companies which sometimes are not interested or just can’t create full-blown market competition,
because the demand of the service is constantly raising, and it does not lead to any significant
changes in the market position of companies already present in the sector.
Cellular service in the modern world is an essential means of two-way data exchange. Transfer of
information through its channels is carried out in various areas of human activity and often requires
compliance with an increased confidentiality.
Nevertheless, a significant number of leaks from state, municipal, commercial and non-profit
organizations prove vulnerability of the system. Telecommunications networks are still not
particularly perfect and have a number of security breaches, among which is an outdated SS7
technology.
SS7 also referred to as the Signaling System #7, was introduced about 40 years ago (in 1970s) and
in those years has been a breakthrough in terms of security.
The problem requires publicity and urgent action, as numerous telecom operators keep on using
this signaling system internationally, while some cases of real attacks have already been reported1.
SafeCalls has created various telecom solutions bearing it in mind and fixing all possible security
breaches, which are described below in more detail.
1.3.1 Data Acquisition
To commit an attack, a hacker needs to obtain an international mobile subscriber identity (or
“IMSI”). This can be done by delivering text message from external “network” emulated on the
computer. In response to request, home network reports the MSC/VLR address, which helps find
out whether the subscriber is at home or in roaming; and if in roaming, which network he/she is
using (in order to send SMS there). At the same time transmission of IMSI occurs that is also
necessary for message routing.
1.3 Telecom Security Breaches
8Decentralized telecommunications network
MODERN STATE OF MOBILE TELECOM
1 For more information on the topic read our research SS7
Since SMS requests from MSC/VLR delivery of confirmation, attacker has several options:
• to send to the sender confirmation on the message delivery,
• send confirmation to the sender and a modified message to subscriber, or
• do not send confirmation to the sender, intercept the message to his/her address and
request to resend this message to subscriber.
As a result, an attacker obtains the subscriber’s IMSI to control parameters of his/her “profile”, HLR
address where these parameters are stored, as well as the MSC/VLR address (information about
what region (country) this subscriber is currently in).
1.3.2 SMS Interception
Interception of text messages is carried out after blocking subscriber’s services. No additional
actions are required for this attack.
9Decentralized telecommunications network
MODERN STATE OF MOBILE TELECOM
10Decentralized telecommunications network
2 For more cases (e.g. wiretapping, profile spoofing etc.) read our research SS7 ENG
MODERN STATE OF MOBILE TELECOM
Such manipulation is carried out in a few seconds, and interlocutors do not have time to
suspect that there is someone third between them2.
If desired, an attacker can specify his/her MSC/VLR address and start receiving the victim’s traffic:
read all message history or request one-time SMS passwords for authorization on various online
services.
1.3.3 Wiretapping
Using profile spoofing, hacker can change address of the balance platform and specify an address
of equipment that is under his/her control. Then call forwarding will go to the number of attacker,
who will illegally interfere into conversation.
Technological
lagging:
widely spread signalling system 7 is
outdated and has numerous security
breaches which allow unlawful activities
with the private data of mobile users
Telecom
Oligopoly:
the entry barrier is very high in terms of
investments, so the market suffers from
the lack of service providers, making
telecom a sector which is not enough
competitive
Excessive
expenditures:
telecom companies are heavily
spending money on marketing, boasting
expenditures which are not directly
connected with their primary activity —
all of this is out their users’ pockets
Multiple
intermediaries:
conventional voice calls can’t be mixed
with internet traffic, the information
can’t be sent via the most optimal and
costeffective way, which would solve
the issue with excessively expensive
roaming phone calls
To cap it all, modern mobile telecom has a number of issues and inefficiencies which are paid for
by its users. We at SafeCalls Telecom are going to tackle the following problems:
1.4 Mobile telecom: Problem Statement
11Decentralized telecommunications network
MODERN STATE OF MOBILE TELECOM
To be done:
• Distributed Irbis Network
• Network nodes
• Main network launch
• SIM for IoT
• VPN Network
2020
Telegram bot launch
To be done:
• Sale of Internet SIM
• IEO Round (Q2)
• Release of secure SafeCallsOS-based smartphone (Q4)
• Sale of eSIM connected to Telegram bot (Q4)
2019
Secure VoIP launch2018
Launch of a secure GSM network via SIM2017
SafeCalls Telecom is a distributed mobile communication service that uses a ready-made mobile
network infrastructure together with their new nodes that are developed and supported by
community members.
SafeCalls Telecom is based on the technology of routing mobile traffic and voice calls in such a way
that information is received and transmitted through the most advantageous channel, taking into
account the cost of using it and the quality of the connection itself.
SafeCalls Telecom system is designed in such a way it removes the inherent costs of cellular
operators on marketing from users' subscription fees, increases competition in the market of
cellular operators, eliminates excessive mobile roaming expenses, and improves mobile
communications security.
2.1 Business Overview
2.2 Development Timeline
13Decentralized telecommunications network
SAFECALLS TELECOM PROJECT
2.3.2 VoIP Service
SC.VoIP is a basic product provided to SafeCalls Telecom
subscribers.
The main difference between VoIP SafeCalls and other
VoIP-providers:
• proprietary communication protocol;
• encrypted traffic (audio / video / text);
• substitution of outgoing numbers;
Subscriber protection in GSM communications is a comprehensive mechanism that includes:
• dynamic identifiers (IMSI + Ki, hidden MSISDN);
• SIM-card encryption (signaling encryption);
• SIM card data protection from third parties (self-destruction);
• forced encryption of GSM traffic using the A5 algorithm;
• a ban on the transfer of subscriber geodata;
• incoming virtual numbers of 224 countries (> 10 numbers on 1 SIM card);
• lack of billing (third parties will not be able to get an extract on calls);
• substitution of CLI numbers (you can change the outgoing number for the call);
• voice change (hiding the real voice of the subscriber);
• secure mobile Internet (works via VPN communication channel);
• anonymous connection of the subscriber to the network (without identification).
2.3.1 SafeCalls SIM-cards
Work on any phones through the towers of mobile operators in 150
countries of the world. No internet connection is required. A SIM
card is required to use this connection. Subscribers can use
anonymous mobile Internet via SIM cards.
Thanks to the built-in protection at the operator level and the SIM
card level, SafeCalls subscribers use secure communication in 150
countries of the world.
2.3 Products
14Decentralized telecommunications network
SAFECALLS TELECOM PROJECT
• change of voice according to phonetic features;
• virtual numbers of different countries;
• payment by cryptocurrency;
• anonymous connection.
Works wherever there is Internet. One can connect to a secure connection through an application
on a smartphone / tablet / PC.
In order to use VoIP, a subscriber needs to:
• sign up;
• replenish the balance (USD);
• use the app to make calls;
• OR purchase a separate VoIP phone.
VoIP is the main technology of SafeCalls Telecom, which allows to further develop other
products of the company and create a distributed network.
2.3.3 @SafeCallsBot for Telegram
Our Telegram-bot uses the same infrastructure as VoIP. At the
moment, both VoIP and the bot are already functioning, and they
will continue to expand their functionality. The bot allows users to
make anonymous calls to any phone numbers, substitute their
number, change the voice timbre. The product is in open beta.
The SafeCalls bot is a convenient service for making secure calls
and getting familiar with SafeCalls Telecom products. In the future,
the user can buy a SafeCalls Telecom SIM card and / or become a
VoIP subscriber.
15Decentralized telecommunications network
SAFECALLS TELECOM PROJECT
Only we provide:
• dynamic identifiers
(IMSI + Ki, hidden MSISDN);
• incoming virtual numbers
of 224 countries
(> 10 numbers on 1 SIM card);
• lack of billing (third parties will not
be able to get an extract on calls);
• substitution of CLI numbers
(you can change the outgoing
number for the call);
• voice change (hiding the real
voice of the subscriber);
• each new call is randomly routed
through a different voice traffic
provider;
• secure mobile Internet (works via
VPN communication channel);
• anonymous connection
of the subscriber to the network
(without identification).
Every provider has:
• static identifiers
(IMSI + Ki, public MSISDN);
• identification of the subscriber;
• high prices for roaming calls
and Mobile Internet;
• connection via one voice
communication channel.
16Decentralized telecommunications network
SAFECALLS TELECOM PROJECT
2.4 How does SafeCalls differ
from traditional mobile telecom
SС Telecom users are protected from interception of mobile data and listening to calls:
The described communication scheme gives users several advantages over traditional cellular
communication:
• In SafeCalls Telecom there is no - concept
of roaming as such, respectively, the
prices for calls within one country and for
international calls are comparatively
inexpensive;
• Smartphones SafeCalls equipped with
hardware encryption function calls, text
messages and Internet traffic;
• Complicated routing of communication
channels eliminates the ability to track
where the call was made or the message
was sent;
• All network infrastructure is on servers of
many countries. Its development is not
controlled by the central government, but
proceeds according to the laws of the
market.
17Decentralized telecommunications network
SAFECALLS TELECOM PROJECT
Contributors participating in the Irbis Network token sale channel their money in developing
software, equipment for network nodes and community growth around the world. Such
contributions will also help to create so-called "out of the box solutions" for a distributed network,
so you can easily deploy new nodes and new that will lead to the rapid growth of the entire SC
Telecom distributed network. It is also worth mentioning that contributors can also maintain their
own infrastructure nodes, increasing their profits from participation in the work of Irbis Network.
Thus, the cost of communication services of a distributed network consists of payment for the
used channel and commission of the routing node. Despite the existence of a commission,
infrastructure holders and contributors, communication services from SC Telecom are competitive
in price for national communications and are an order of magnitude more advantageous than
traditional international roaming.
The entire economy of the project is divided into 2 parts: fiat and cryptocurrency parts. The
functionality of the fiat part allows users to deposit funds to the balance in order to make calls and
send messages. SafeCalls Telecom is a link that performs the function of subscriber billing, i.e.
writes off funds from accounts and makes payments to telecom operators for used communication
channels.
The Fiat part has the form of a centralized USD database with balances and subscriber operations,
which is necessary for the correct calculation of subscriber payments, as well as the calculation of
commissions that are sent to the decentralized part of the SafeCalls Telecom system.
3.1 Infrastructure
19Decentralized telecommunications network
IRBIS NETWORK CONCEPT
The decentralized part of SafeCalls Telecom consists of routers-nodes of the network, as well as a
blockchain, which performs several functions: storing the actual rates for communication with
different operators, registering functioning routers in the network, transferring value
(cryptocurrency payments in system tokens), and also performing smart contracts, according to
which the calculation of the volume of user fees to routers in the network.
20Decentralized telecommunications network
IRBIS NETWORK CONCEPT
21Decentralized telecommunications network
While a user pays for SafeCalls Telecom services in IBS, conversion to fiat occurs automatically at
the exchange rate, eliminating exchange risks both for the company and for a user.
Fundraising (IEO) SafeCalls Telecom
services and products
payments
Conversion
to the mainnet tokens
once the distributed
system launches
3.2.1 IBS Functions
3.2 Emission
3.1.1 Fiat part: Payments and client services
Fiat (USD) is used by the service for the following operations within the network:
• Calls;
• Mobile traffic;
• Conversion to tokens with subsequent payment of the network commission;
• Anonymity functions:
• Changing / hiding the phone number;
• Voice timbre changes.
At the first stage of the functioning of the system, the acceptance of subscriber payments is
realized according to the traditional for any cellular provider without using cryptocurrency
operations. In the the future, SafeCalls Telecom may enter into a partnership with the
cryptocurrency acquiring service for accepting payments in cryptocurrency and instant crediting
to a Fiat deposit at the exchange rate.
3.1.2 Cryptocurrency part: Irbis Network Tokens (IBS)
IBS tokens provide value transfer in the distributed part of the decentralized cellular network
system (see p. “Infrastructure”). By drawing parallels with existing blockchain solutions, IBS can be
compared with “gas” tokens, which are spent on transactions in the Ethereum blockchain. Tokens
are also needed by the infrastructure holders: for the operation of their routers in their accounts, it
is necessary to block the deposit of tokens.
IRBIS NETWORK CONCEPT
Petr MalyukovCEO, CO-FOUNDER
Serial entrepreneur. Talented manager, has created multiple
brands from scratch in high-tech sector. Advertising and PR
expert, has extensive experience of growing startups into big
companies.
SC Telecom co-founder and CEO since 2015.
Vitalii MaliuginCTO, CO-FOUNDER
Telecom and IT expert with +15 years of experience. Worked as
leading expert in one of Russia’s top 3 telecom operators.
Vitaii has profound knowledge of high-load telecom
architectures, hardware and software solutions, as well as traffic
monitoring and routing experience.
3.3 Team
23Decentralized telecommunications network
IRBIS NETWORK CONCEPT
There are more than 15 specialists from different areas in out team:
24
Tao Y.Project Manager
Fillip E.PR Manager
Valeria T.SMM Manager
Vinay D.Backend Developer
Anastasia K.UI/UX Designer
Kristian V.Marketing Manager
Manish F.Backend Developer
Kirill G.Blockchain Developer
Sergey M.Hardware Engineer
Yunsu K.Mobile Developer
Jooseok Y.Frontend Developer
Mark H.Data Base Administrator
Alexander M.Frontend Developer
Shikhar M.Backend Developer
Anatoly O.Cryptographic Engineer
Stanislav B.OS Developer
Vadim F.Software Engineer
Jackie W.DevOps Engineer
Decentralized telecommunications network
IRBIS NETWORK CONCEPT
Australia
Bradley Townsend
Bradley is a sales and business development professional with a strong passion for
blockchain technology. Co-founder and Director of Latitude Blockchain Services Bradley has
built strong relationships throughout the industry and has helped multiple companies
assisting them in business dev, Community Management and IEO introductions.
Korea
Young K Choe
Young Choe is Advisor to many blockchain projects including Evens, EOS Chrome, EcoStart,
Mix.Rent, BeWELL, EdenChain, AmbleX, Platinum Q DAO, Boltt Protocol, GBC Korea, Davinci
Foundation, etc. He was Co-Founder and President/CTO of Color Platform – a fourth
generation blockchain platform empowered with SoC.
He is an editor of “Blockchain Today” magazine. Young is an Expert at ICObench – a global ICO
rating platform – and a Director to OSSF(Open Source Software Foundation). He is Adjunct
Professor at Yonsei University in Korea.
He is a software and blockchain professional, an executive, and a professor having broad
experiences from development to top management, from theories to practices at various global
companies and organizations including NVIDIA, Samsung Electronics, SK Hynix, North Carolina
State University, BMC Software, Sungkyunkwan University, 3Ksoftware, KBIPA (Korea
Blockchain Industry Promotion Association), and CE Linux Forum. He has expertise in software
engineering, compiler and language technology, cryptography, and blockchain.
He holds advanced degrees in computer science from North Carolina State University and is a
member of Executive Blockchain Program at Draper University in California. He has also
experience in crypto-investment, M&A, Revised ICO/IEO, Reverse-ICO’s.
Young currently leads a crypto-finance & cybersecurity company (3KFinance) as CSO and a
Blockchain/AI/DeFi/Cryptocurrency company (Crypto Valley Lab, Inc.) as CEO & Founder.
3.4 Advisors
25Decentralized telecommunications network
IRBIS NETWORK CONCEPT
Maria Lapuk
Mariya has over 10 years of experience in digital PR and marketing transformation. She is one of
the most recognized PR leaders in the Russian Federation and Baltic States, having been awarded
"PR Profile of the Year 2015" at Internet Initiatives Development Fund, The Initiator of Venture
awards that turned into the favorite of Russian Startup Communities starting 2013, "Most
Influential Networker 2013" at Odnoklassniki, "PR Professional of the Year 2012" at MTC).
Mariya is currently a professional PR consultant for Fortune 500 companies based in Moscow
where she coaches, consults, and engages in operational planning of strategic key chains of a
variety of commercial entities to help them grow locally and regionally and allow them to earn six
digit revenues.
Russia
Israel
Mikhail Zhukov
Member of the Board in Russia - Hong Kong Business Association.
Mikhail is one of pioneers of Chinese-Russian business, who saw its potential back in the 90s.
Serial entrepreneur, he has business connections and personal relationships with many chinese
businessmen, top managers of state owned corporations and officials.
Mikhail is an expert of trade and customs regulations, legal and financial system, government
structure of China. He has expertise in chinese SMM: Wechat activities, PR and Chinese Media.
USA
Zach Daniels
Zach Daniels is a network engineer with over 12 years of experience in the IT industry. Zach’s
expertise in security, networking and architecture provides a strategic approach to growth and
value creation within the blockchain industry. He has worked and advised on multiple projects in
the cryptocurrency and blockchain space, and regularly speaks around the world regarding the
practical applications of the technology, as well as advises startups on business and ICO strategy.
His passions consist of developing business strategies within the tech industry, as well as serving
as a community advocate for computer security, blockchain technology & cryptocurrency, and
educating individuals on wealth creation through the trading and investing of digital assets.
26Decentralized telecommunications network
IRBIS NETWORK CONCEPT
Princess Svetlana Lydia Von Pommern-Peglow
Svetlana von Pommern-Peglow is a strategic risk lawyer and founder/CEO of Fermion Q Alpha
group which develops quantitative solutions and platforms for the hedging/management of
tail/litigation/regulatory risks, in particular for fintech, trading and licensing.
She is also a respected projects facilitator and investor/government relations manager in particular
when projects involve cross-border issues.
In her capacity as international advocate with more than 20 years of experience in Moscow,
Frankfurt, Singapore, London and Zurich, she has also been involved in high profile market
manipulation cases (layering/HFT/DMA) and follows academic research in this area. Currently, she
is developing the pioneering Q-Alpha platform as a separate tail risk SPV.
Additionally Svetlana is a fundraiser and strong of fintech, musical, art and fashion talents.
United Kingdom
Before becoming a solo PR strategic consultant, Mariya was the Head of the Media Department at
Internet Initiatives Development Fund (IIDF) that allowed her to network with 20% of the most
influential Russian Venture capitalists, C-level executives, and regional government leaders. Simply
put, they were the meat and potatoes that gave her a green light to become a “must talk to” PR
expert.
Prior to this role, she was Vice President of the PR Department at Odnoklassniki (part of Mail.Ru
Group), leading brand positioning, communications, and PR operations. During her professional
career with Mail.Ru Group, Mariya appeared in a number of traditional and digital media consulting
startups, engaging with numerous Russian SMEs and iconic companies, such as Yandex, MTC,
Samsung, Ferrari, Vodka, and dozens of others.
Today, Mariya is open to thought-provoking projects, regardless scale, location, and industry. She
always gives a hand to help a starting entrepreuner-spirited collegue and couterparts to make the
seemingly impossible task.
27Decentralized telecommunications network
IRBIS NETWORK CONCEPT
The information contained in this White Paper may not be complete. The content of the document
does not imply any elements of the contractual relationship, is not mandatory for the Company
and may be changed in the future as the design and development of the IBS system is in progress.
The White Paper does not contain investment, legal, tax, regulatory, financial, accounting or other
recommendations.
The technical document should not be considered as the only correct and comprehensive basis for
evaluating the acquisition transactions of IBS.
Nothing in this official document can be considered as a request for investment, and in no way
should be considered as an offer to buy any securities in any state jurisdiction.
This document does not fall under the jurisdiction of any state that prohibits or in any other way
restricts operations with cryptocurrency.
A number of statements, estimates and financial data contained in this technical document are
forecasts and not actual information.
In general, the totality of unknown risks and other uncertainties associated with the project, its
actual performance may differ from the forecasts given in this document.
4.1 Disclaimer
29Decentralized telecommunications network
LEGAL
Inability to return
The company is not obliged to redeem
IBS or otherwise refund the funds to the
holders of the coins for any reason. IBS
does not provide any guarantees of
value, including their inherent value of
coins. Therefore, the return of invested
funds may be impossible. In addition, it
may be restricted by laws and
regulations other than those applicable
to the holder of IBS.
Risk of losing
private keys
IBS coins can be stored in a digital wallet
or vault, for access to which a digital key
or combination of digital keys is
required. Loss of keys associated with a
digital wallet or vault will result in loss of
access to its balance. In addition, a third
party who has gained access to private
keys that the holder uses to access the
wallet or the vault will get access to the
IBS coins located in them. Company
entities are not responsible for the losses
that this may entail.
Speculative risks
Evaluation of cryptocurrency in the
secondary market is often opaque. The
cost of IBS can fluctuate dramatically
over a short period of time.
Risk of loss of value
There is a significant risk that the holder
of IBS coins may lose their entire value
as a result of their depreciation. The
company does not guarantee the value
of IBS and does not predict its liquidity.
The company is not and should not be
responsible for the market value of IBS,
or its liquidity.
Acquisition of IBS is associated with a high degree of risk. A number of factors can have a
significant negative impact both on the cost of IBS and on the entire distributed network. The
following list of risks and uncertainties that IBS holders may encounter is not exhaustive.
4.2 Risks of the project
30Decentralized telecommunications network
LEGAL
Risk from
the state regulator
The industry in which the Company
operates is new and may be subject to
increased supervision and control. The
property of the Company and its
operations are governed by regulations
of various government agencies and are
subject to annual inspections. Inspection
bodies may conclude that the Company
has violated laws, decrees or rules and
cannot refute these findings or promptly
eliminate violations. Decisions of state
bodies, requirements, sanctions - any
increase in state regulation of the
Company's activities may increase the
expenses of the Company and adversely
affect its operations.
Lack of
infrastructure
Hackers, other groups and organizations
may attempt to intervene in a smart
contract or other aspects of the
operation of IBS in various ways,
including, but not limited to, malware
attacks, denial of service attacks and
other common methods of disrupting
the normal operation of digital services.
Insufficient
regulatory
framework
The legal status of cryptographic tokens,
cryptocurrencies, other digital assets
and blockchain technology remains
unidentified in many countries.
Predicting how soon and 21 how
government agencies will begin to
regulate the distribution and use of
listed assets, as well as blockchain
technology, is not possible.
31Decentralized telecommunications network
LEGAL
Secure GSM network
https://safecalls.io
Secure VoIP
https://safecalls.io/voip/
Secure Telegram Bot
https://safecallsbot.com
IEO
https://safecalls.io/ieo/
Smart contract (ERC20)
https://etherscan.io/token/0x94534caebd1887be3d57179728a670a3436bb443
Official corporate website
https://sctelecom.org
Telegram Chat
https://t.me/sccommunity
Telegram Channel
https://t.me/sctelecomchannel
https://twitter.com/SCTelecomORG
https://www.facebook.com/safecalls
https://www.linkedin.com/company/sctelecom
https://www.reddit.com/r/SCTelecom
Community
32Decentralized telecommunications network