SOS in Manhattan: How a Cloud Voicemail Stack Met the Cryptographic Wall Inside Every SIM

A voicemail-to-email line is a six-tab setup wizard. A SIM card is a cryptographic handshake with a tower it has never met. The cloud crossed four oceans. The trust anchor did not move.

A voicemail line is a six-tab setup wizard in 2026. Click through a foreign carrier's portal in a language you half-read. Upload a passport scan. Authorize a recurring fee for the privilege of owning a phone number that lives somewhere your body doesn't. Configure MP3-to-email forwarding so the messages land in a New York inbox alongside the Amazon receipts and the Substack newsletters. The carrier sends a confirmation. The dashboard goes green.

Then the iPhone in your hand sits on a desk in Manhattan and shows two letters that nullify all of it.

SOS.

The cloud worked. The radio refused. And that gap is where the architecture lives.

I tried this with four different carriers across four countries β€” Portugal, Germany, Japan, Estonia β€” to see whether the answer was country-specific. It is not. The answer is in the spec, and the spec is the same everywhere. (There's also Italy, but Italy is a different post and I'm not putting it in this one.)

This is a story about a phone that authenticates to the cloud over Wi-Fi in seconds and refuses to authenticate to a tower over its lifetime. About a 128-bit key burned into a chip that costs forty cents to manufacture and that no software in the world can copy. About a perfectly legitimate, RFC-defined escape hatch that exists in the 3GPP spec, is locked by every carrier's provisioning policy, and is hidden inside an iOS toggle you can't see until you've already done the thing the toggle was supposed to help you avoid. Three nested gates, and a fourth one underneath them all that nobody talks about.

The cloud crosses oceans. The trust anchor does not move.


The Account Is Alive. The Plastic Is Dead.

THE PIECES THAT WORK FROM A NEW YORK DESK
-----------------------------------------------------
Web signup            βœ“  Passport KYC accepted
Carrier dashboard     βœ“  Line provisioned, number assigned
Voicemail config      βœ“  Greeting recorded, forwarding rules set
MP3 β†’ email gateway   βœ“  Test message lands as attachment
Identity verification βœ“  EU-style verification flow complete
Account billing       βœ“  Card charged, receipt emailed
-----------------------------------------------------
THE ONE PIECE THAT DOES NOT
-----------------------------------------------------
SIM in physical phone βœ—  SOS
-----------------------------------------------------

The cloud loop is fine. Every modern carrier runs voicemail through an IMS Application Server β€” a Media Resource Function for the audio, a routing AS for the call logic β€” that has no opinion about which access network delivered the call setup. A call arrives. The IMS Core's S-CSCF locates the user's profile in the HSS or UDM. The MRF answers, records the audio, transcodes to MP3, hands it off to an SMTP gateway. Server-side this is just a workflow. You can change the destination email at 2am from a coffee shop and watch the very next test call land in your inbox forty seconds later.

What it cannot do, what no IMS in the world can do, is generate the half-second handshake that needs to happen between the SIM card in your iPhone and a radio tower it has never met. That half-second is the part the architecture refuses to let the internet automate.


SOS Is Not a Vendor Bug

WHAT THE IPHONE IS REPORTING IN SOS-ONLY MODE
------------------------------------------------------------
Status bar              "SOS" (US/CA) or "SOS only" (EU/AU)
Cellular icon           Empty / no bars
Settings β†’ Carrier      Shows carrier bundle name
Modem Firmware          Populated (the radio is fine)
Network Selection       Stuck on "Searching..."
Wi-Fi Calling toggle    HIDDEN (not greyed out β€” gone)
Emergency calling       Available on any nearby PLMN
------------------------------------------------------------

That last line β€” emergency calling works on any nearby network without authentication β€” is the only piece of the cellular trust model that's deliberately optional. 3GPP TS 24.301 Β§5.5.1.2 mandates that any LTE network must accept an emergency-attach from any UE that asks for it, even one whose SIM has never been seen before. This is so a stranger in cardiac arrest with an unactivated phone can dial 112 or 911. Everything else is gated.

The reason the iPhone shows SOS instead of a carrier name is that the baseband modem completed its first job β€” Layer 1 RF acquisition β€” and failed at the second one: cryptographic mutual authentication with the home network. The radio is fine. The chemistry of trust between the SIM and the carrier's HSS hasn't been established yet, and 3GPP doesn't permit a workaround.

This is not a Portuguese or German or Japanese or Estonian quirk. The same modem firmware runs in every market. The same TS 33.501 governs every 5G core. The same MILENAGE algorithms (TS 35.205, TS 35.206) sit on every SIM. When you see "SOS" on the screen of an iPhone holding a brand-new foreign SIM, you are watching the most boring success case in international telecom: every piece of the stack is doing exactly what the standards body wrote down twenty years ago.

The system isn't broken. The system is too well-defined to be tricked.


The Captcha That Needs the Phone It's Verifying

You want to test the line. Your US carrier blocks international outbound calls to Europe and Asia unless you've enabled a paid international add-on, and even then they rate-limit destinations they consider high-fraud-risk. Fine. You turn to web-based VoIP tools β€” Twilio, Telnyx, Vonage, a half-dozen browser-based AI voice callers β€” and you hit the wall that has reorganized the entire web's signup flow.

EVERY MODERN BROWSER VOIP / AI VOICE TOOL β€” 2026
------------------------------------------------------------
1.  Sign up with email                           [easy]
2.  Verify email                                 [easy]
3.  Add payment method                           [easy]
4.  Verify identity via SMS to a PSTN number     [???]
    └─ VoIP-originated numbers rejected
    └─ Number reputation scored against block-lists
    └─ Toll-fraud risk model evaluates carrier OCN
------------------------------------------------------------

The reason is not paranoia. The FCC's TRACED Act in the US and the parallel European frameworks turned voice fraud into a regulator-attention problem, and STIR/SHAKEN (RFCs 8224/8225/8226, ATIS SHAKEN profile) became the carrier-side attestation system voice traffic now flows through. The TNS 2026 Robocall Investigation Report shows 85% of Tier-1 inter-carrier traffic now carries a signed Identity header β€” but only 17.5% of smaller-carrier traffic does, and up to 13% of bad traffic still gets a fraudulent A-level attestation. The economics of fraud shifted to international toll-revenue-share scams: a fraudster triggers SMS or voice OTPs to premium ranges they own, the cloud calling service eats the toll, the fraudster collects their share. Twilio publicly disclosed $62.7M saved by their Verify Fraud Guard between June 2022 and October 2024. SMS pumping is its sibling against unprotected /verify endpoints.

So every signup demands an SMS to a number the service believes is real and not VoIP-originated. The list of services that gate signup this way includes every credible cloud voice provider, every AI voice cloning tool, and most of the consumer messaging apps. Most explicitly refuse VoIP-originated numbers β€” they keep block-lists keyed on carrier OCN and run risk-scoring on number provenance.

You wanted to test the line. To test it, you need a tool. The tool wants an SMS. The SMS has to go to a real, non-VoIP number. The number you actually have is the one you're trying to test. That number is in SOS.

This is not a bug. It is a perfectly rational anti-fraud regime closing every gap in the right order. It just happens to close them around you while you're standing in one of them.


Four Countries, Same Fortress

I tried four. Each one revealed a different facet of the same wall.

Portugal, where MEO and NOS run modern IMS stacks with full Wi-Fi Calling published in their support documentation, while Vodafone Portugal as of 2024 still does not offer VoWiFi at all (search their own forum and you'll find threads dating back five years asking when). The asymmetry inside a single country is the lesson here: VoWiFi is a feature carriers ship when their IMS Core is ready and their operations team has decided to support a new failure mode. The 3GPP spec doesn't compel them. NOS publishes a perfectly clean FAQ on the topic. Vodafone PT's support staff explain politely that the service is not yet available. Neither answer is wrong. They are different products of the same standards body.

PORTUGAL β€” VOWIFI STATUS
---------------------------------
MEO          Yes  (launched after 2024 trials)
NOS          Yes  (Wi-Fi Calling FAQ published)
Vodafone PT  No   (forum threads going back to 2019)
---------------------------------
First-registration via VoWiFi: cellular attach
still required regardless of which carrier.
---------------------------------

Germany, where Deutsche Telekom, Vodafone DE, TelefΓ³nica O2, and 1&1 all support VoWiFi β€” Telekom gates it behind a customer opt-in, Vodafone DE includes it in most contracts (€2.99/mo otherwise), O2 auto-enables it for everyone including their Drillisch sub-brands, and 1&1 enables it but deactivates it automatically when cellular signal is strong. The German market is the most thoroughly Wi-Fi Calling-instrumented in Europe, and the one where the architecture's seriousness about handover, signal quality, and emergency-address binding is most visible. The handover logic is also where the carriers want a cellular relationship in the first place: they want to know where you are for E112 compliance, and they want to know before they hand you an IMS profile. The rigor is not vendor sloppiness. It's the same compliance posture that makes German tax-residency paperwork famously specific. Each piece is doing exactly what the lawyers told the engineers to do.

GERMANY β€” VOWIFI ROLLOUT
---------------------------------
Deutsche Telekom  Yes  (customer must opt in)
Vodafone DE       Yes  (included in most contracts; €2.99 add-on otherwise)
TelefΓ³nica O2     Yes  (auto-enabled across all brands)
1&1               Yes  (auto-deactivates on strong cellular;
                        RAN is Rakuten/Mavenir Open RAN)
---------------------------------

Japan, where Rakuten Mobile launched in 2020 as the first fully cloud-native, fully virtualized, container-based Open RAN MNO on the planet. As of March 2026, Nokia's IMS Core, Subscriber Data Management (modern HSS/UDM), Cloud Signaling Director, Mediation, and Certificate Manager all run as cloud-native network functions on Rakuten Cloud in live production. Their RAN is disaggregated into Centralized Unit, Distributed Unit, and Radio Unit on commodity x86 servers with O-RAN open interfaces between them. They serve around 8.5 million subscribers. They license the entire stack out as Rakuten Symphony to operators in other markets β€” 1&1 in Germany runs on it, Cisco partners on it, Airspan and Tech Mahindra signed onto the Real Open RAN Licensing Program in February 2025.

This is the deepest version of "the network is software" that anyone has shipped. Everything in the core is a container. Everything in the RAN above the antenna is a container. The MME, AMF, S-GW, UPF, HSS, UDM, P-CSCF, ePDG: containers, scheduled by Kubernetes, deployed by GitOps, observable in Grafana like any other piece of cloud infrastructure.

And the K key still sits on a physical SIM card manufactured by Thales, a French defense contractor that has been etching SIM secure elements since the 1990s. The most software-defined network on Earth still draws its trust anchor from a chip you cannot read with software.

Software ate every layer of the stack. It stopped at the chip.

Estonia, where Telia and Elisa both publish clean VoLTE/VoWiFi support pages and have for years. Estonia is the country that solved digital identity β€” e-Residency, the X-Road data exchange, the cross-border digital signature regime that makes a Tallinn-incorporated company manageable from Manhattan with nothing but a USB smartcard. The country that arguably built the most coherent digital sovereignty stack in the world has the same SIM-first-registration requirement as every other carrier on this list. The lesson is not that Estonia missed something. The lesson is that the cellular trust anchor was a different architecture problem, designed by a different standards body, twenty years earlier, with different threat models β€” and even a country obsessed with making identity portable did not get to redesign it.

JAPAN + ESTONIA β€” VOWIFI STATUS
---------------------------------
NTT Docomo       Yes
SoftBank         Yes
Rakuten Mobile   Yes  (Nokia IMS on cloud-native core,
                       most-virtualized stack on Earth)
Telia EE         Yes  (telia.ee/volte-and-vowifi)
Elisa EE         Yes  (elisa.ee/en/volte-and-vowifi)
---------------------------------
First-registration via VoWiFi without prior cellular attach:
not part of regular consumer activation at any of these.
---------------------------------

Four countries. Four different carrier postures. One identical wall. The wall is not a coincidence. The wall is the spec.


Layer 3 Cannot Lie to Layer 1

So you ask the question every engineer asks at the end of this story: can we just spoof the cell tower? Build something that pretends to be a Portuguese eNodeB sitting on a Manhattan desk? Run a VPN tunnel that mimics the radio access network?

It's the right architectural question. It arrives at exactly the frontier where this gets hard. And it doesn't work, for a reason deeper than the firewall.

# 3GPP AKA β€” Authentication and Key Agreement (TS 33.102 Β§6.3, schematic)
# What actually happens between SIM and network, in ~half a second.

import secrets
from milenage import f1, f2, f3, f4, f5   # operator-chosen, default MILENAGE (TS 35.205/206)

# ── The shared secret ──────────────────────────────────────
# K  : 128-bit root key. Lives in exactly two places:
#      (a) the tamper-resistant secure element on the SIM
#      (b) the operator's AuC behind the HSS / UDM-ARPF
#      It does NOT exist in any third place. Ever.
# OPc: 128-bit operator variant (derived from OP + K). Same residency.
K   = ...   # not knowable from outside SIM or AuC
OPc = ...   # not knowable from outside SIM or AuC

# ── Network β†’ SIM ──────────────────────────────────────────
SQN  = next_sequence_number()        # replay protection
RAND = secrets.token_bytes(16)       # 128-bit challenge
AMF  = b"\x80\x00"                   # auth management field
AK   = f5(K, RAND, OPc)              # anonymity key, conceals SQN on the air
MAC  = f1(K, SQN, RAND, AMF, OPc)    # network's proof-of-knowledge
AUTN = (SQN_xor_AK := bytes_xor(SQN, AK)) + AMF + MAC

# Network sends (RAND, AUTN). Anyone listening sees them in cleartext.
# That's fine β€” without K, they're noise.

# ── SIM verifies the network ───────────────────────────────
sqn_recv = bytes_xor(AUTN[:6], f5(K, RAND, OPc))
xmac     = f1(K, sqn_recv, RAND, AUTN[6:8], OPc)
assert xmac == AUTN[8:]              # network authenticated to SIM
assert sqn_in_window(sqn_recv)       # not a replay

# ── SIM responds ───────────────────────────────────────────
RES = f2(K, RAND, OPc)               # SIM's proof-of-knowledge, returned to network
CK  = f3(K, RAND, OPc)               # cipher key   (derived, never leaves)
IK  = f4(K, RAND, OPc)               # integrity key (derived, never leaves)

# Network compares RES to its precomputed XRES.
# Match    β†’ mutually authenticated. CK / IK derived on both sides.
# Mismatch β†’ attach rejected. The phone shows SOS.
#
# Note what's missing from every line above:
#   - K never appears on a wire.
#   - K never appears in a log.
#   - K never appears in software memory outside the SIM die.
#   - There is no API that returns K. There is no debug mode that prints K.
#   - The SIM exposes only the OUTPUTS of f1..f5. The inputs are sealed.

This is mutual authentication. The network proves it knows K to the SIM (via MAC) and the SIM proves it knows K to the network (via RES), without either side transmitting K. They exchange the products of a one-way function applied to K. Listen on the air all you want β€” without K, the products are noise.

A VPN does nothing here, because a VPN operates at Layer 3 of the OSI model and the AKA exchange is happening below it. The radio modem in the iPhone never reaches Layer 3 until after the AKA succeeds. Encrypted tunnels carry IP packets. AKA carries RF symbols across the air interface before the device has an IP address. You cannot tunnel a packet that does not exist yet.

The right way to think about this: the cellular network does not trust IP. It does not trust DNS. It does not trust certificates. It trusts a 128-bit number etched into a chip in your hand and an identical number in a database it controls. Everything else in the network β€” the gNB, the AMF, the SMF, the UPF, the IMS Core β€” is downstream of that trust, and none of it can be made to extend trust to anything that doesn't pass the AKA gate.

5G modernizes a few things. The HSS splits into the UDM (subscriber data), the ARPF (the part that actually holds K and runs MILENAGE), and the AUSF (which orchestrates the authentication policy, RFC 5448 EAP-AKA' or the classic 5G-AKA flow). The long-term subscriber identifier (IMSI in 4G) is no longer transmitted in the clear β€” it's encrypted with the home network's ECIES public key into a SUCI, closing the gap that fed twenty years of IMSI-catcher research and a fair amount of the work Clutch was built to detect.

None of that changes the part that matters: K still sits on a chip. ARPF still holds the only other copy. The function f1 still has to validate. The signature on the chip is the signature on the database. There is no third place. There is no key escrow. There is no master key.

HACK LOVE BETRAY
COMING SOON

HACK LOVE BETRAY

Mobile-first arcade trench run through leverage, trace burn, and betrayal. The City moves first. You keep up or you get swallowed.

VIEW GAME FILE β†’

This is the most boring cryptographic system in modern infrastructure, and that's the point. The boring part is what makes it impossible to spoof.


The Cell Tower You'd Have to Build

So the question becomes: fine, don't tunnel. Build the actual tower.

This is not science fiction. The hardware exists, runs in academic labs and private deployments, and ships at prices that are genuinely low. The bill of materials for a working LTE testbed that an iPhone will actually attach to looks like this:

THE PRIVATE LTE TESTBED β€” 2026 STREET PRICES
------------------------------------------------------------
HARDWARE (pick one SDR)
  LimeSDR Mini 2.0       10 MHz – 3.5 GHz   30.72 MHz BW     $399
  BladeRF 2.0 micro xA4  47 MHz – 6 GHz     56 MHz BW        $480
  BladeRF 2.0 micro xA9  47 MHz – 6 GHz     56 MHz BW        $720    (bigger FPGA)
  USRP B210              70 MHz – 6 GHz     56 MHz BW, 2Γ—2   $2,165
  USRP X310              10 MHz – 6 GHz     160 MHz BW       $9,924

SOFTWARE
  srsRAN Project         LTE eNB + 5G gNB                    free
  Open5GS                EPC + 5G Core (MME/AMF/SMF/UPF/…)    free
  OpenAirInterface       full L1/L2/L3 + 5GC                 free
  Magma (LF Networking)  access-agnostic packet core         free

SIM
  sysmoUSIM-SJS1                                              ~€10–25 each
  Open Cells programmable SIMs                                ~€15–25 each
  Real carrier SIM (Vodafone / Docomo / Telia / MEO / …)      UNATTACHABLE
                                                              (you do not have K)
------------------------------------------------------------

srsRAN gives you the radio stack, Open5GS gives you the core. Pair them with a BladeRF or a B210 and you have a working LTE network in your apartment. A 2024 academic comparison (arXiv:2406.01485) recommends srsRAN as the most approachable starting point; OpenAirInterface is more customizable but steeper. Magma covers the rural and private-network angle.

Two walls stand between you and a working private cell.

The first is legal. Cellular bands in the US are exclusively licensed under 47 CFR Parts 22/24/27, and transmitting on them without authorization triggers FCC enforcement. The only realistic legal path for a US private LTE/5G testbed is CBRS β€” band 48 in LTE, n48 in 5G, in the 3.55–3.7 GHz range β€” with a three-tier sharing model: Navy radar as the incumbent, Priority Access Licenses auctioned in 10 MHz slices, and free General Authorized Access registered through a Spectrum Access System. Stock iPhones support band 48 on most modern SKUs but not all. The EU has parallel local light-licensed bands.

The second wall is the cryptographic one. You can stand the whole stack up. You can light the tower. You can broadcast a perfectly legal SIB1 announcement on a CBRS channel. And no commercial carrier SIM will attach to it, because the SIM's AKA challenge will return a MAC that your testbed's HSS cannot validate, and the SIM will reject your AUTN as a forged network. That's not a bug. That's the architecture working.

The only SIMs that will attach to your testbed are sysmoUSIMs and Open Cells SIMs β€” programmable test SIMs where you choose K and OPc yourself and provision matching values in Open5GS's HSS database. Fifteen euros each. They work beautifully. They do not, and cannot, impersonate a Vodafone SIM or a Docomo SIM or a Telia SIM, because impersonating those requires their K β€” etched into chips you do not own, sitting in tamper-resistant secure elements designed by Thales and Giesecke+Devrient to physically destroy themselves under invasive probing.

You can build the matrix. You cannot read the key.


The Standards-Compliant Escape Hatch

Here is the part that almost solves it.

3GPP designed an escape hatch for exactly the scenario where a UE can't reach a tower. It has been in the standards since the early 2010s, and every modern carrier core supports it. It's called Wi-Fi Calling, which is the consumer name; the engineering name is untrusted non-3GPP access via the ePDG.

The architecture (TS 23.402, GSMA IR.51): the carrier exposes an Evolved Packet Data Gateway to the public internet. The UE establishes an IPsec tunnel to it using IKEv2 β€” the interface is called SWu. Inside the IKEv2 handshake, the UE runs EAP-AKA (or EAP-AKA'), which is the exact same AKA challenge/response that would have run over the air on the cellular link, just encapsulated in an internet protocol instead. The K key sitting on the SIM responds to the network's challenge over the internet. The HSS validates. Tunnel established. The UE is now attached to the carrier's IMS via the ePDG as if it were on a normal access network. IMS registration follows. Voice and SMS work.

There is even a deterministic, GSMA-published way to find the ePDG. It's a DNS lookup. The FQDN format from TS 23.003 Β§19:

epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org

T-Mobile US  (MCC 310, MNC 260):
  ss.epdg.epc.mnc260.mcc310.pub.3gppnetwork.org
                  ^^^ ^^^
       MNC zero-padded to 3 digits.
       Some carriers prepend geographic load-balancer prefixes
       (ss., pp., etc.) to direct traffic to the nearest gateway.

This is exactly the "VPN that mimics a tower" the engineer's intuition points at. It exists. It's defined in the spec. It's open-source-implementable today. fasferraz/SWu-IKEv2 is a Python IKEv2 client that does the whole SWu interface. strongSwan with the eap-aka-3gpp plugin can act as either UE or ePDG side. The "Worth Doing Badly" blog has a practical writeup of running strongSwan against a real iPhone. The academic hw5773/vowifi-ue-testing-framework is a UE-side fuzzer for security research.

Look at what every one of these tools requires as input.

# fasferraz/SWu-IKEv2 β€” minimum required parameters
config = {
    "imsi":         "...",   # the subscriber identity
    "k":            "...",   # the 128-bit root key
    "opc":          "...",   # the operator variant
    "mcc":          "...",
    "mnc":          "...",
    "apn":          "ims",
    "epdg_address": "epdg.epc.mnc<MNC>.mcc<MCC>.pub.3gppnetwork.org",
}
# Without (K, OPc) you cannot complete EAP-AKA.
# Without EAP-AKA you cannot bring up the IPsec tunnel.
# Without the tunnel the carrier's IMS will never see you.
#
# The escape hatch escapes the radio. It does not escape the cryptography.

The escape hatch is a Layer 3 IP tunnel. The cryptography it carries inside is still the same MILENAGE challenge/response against the same K key etched into the same chip. The tunnel doesn't get you around the SIM. It just gets you around the antenna.

This is the architectural beauty of the design. 3GPP did not build a perimeter that could be bypassed by going around it. They built a single cryptographic gate and then routed multiple access paths through the same gate. The Wi-Fi access path is genuinely real. The crypto check is non-negotiable. If you own the SIM β€” you do, you signed up, the K is sitting in the plastic in your pocket β€” you can in principle use the escape hatch. If you don't (you're trying to spoof someone else's number), the escape hatch doesn't help, because it is just a different door into the same lock.

And here is the part that closes the loop and gets architecturally beautiful in the way only telecom can.

Carriers, almost universally, gate VoWiFi behind a prior successful cellular attach. The reason isn't 3GPP β€” the spec permits Wi-Fi-only first registration. The reason is operational. IMS provisioning (the carrier IMS configuration XML the device pulls down) is normally triggered by a successful LTE attach. Anti-fraud rules want device-to-tower binding before they hand out IMS profiles. E112 and E911 emergency-address registration wants the network to have geolocated you at least once. The OSS pipelines that pre-load IMEI bindings and device-capability databases all run from cellular events. So even though VoWiFi is fully standards-compliant from a Wi-Fi-only cold start, every major commercial carrier on this list β€” MEO, NOS, Telekom, Vodafone DE, O2, 1&1, Docomo, SoftBank, Rakuten, Telia, Elisa β€” requires the SIM to have completed at least one cellular attach before they'll provision IMS over VoWiFi. The single well-documented exception is Google Fi in the US, which built a customized activation flow specifically to support Wi-Fi-first.

That's gate two.

Gate three, on iOS specifically, is the most quietly elegant piece of the whole architecture: the Wi-Fi Calling toggle in Settings β†’ Cellular β†’ Wi-Fi Calling on This iPhone is not displayed to the user until the IMS provisioning payload has arrived from the carrier β€” which arrives during the cellular attach. The escape hatch exists in the standards. The escape hatch works in iOS. The toggle to enable it is invisible until the moment you no longer need it.

THE THREE GATES (and the one underneath)
-------------------------------------------------------------
Gate 1  3GPP spec       Permits VoWiFi-only first registration.
Gate 2  Carrier policy  Forbids it. Cellular attach required first.
Gate 3  iOS UI          Hides the toggle until IMS provisioning lands.
-------------------------------------------------------------
Gate 0  K in silicon    Makes the upper three architectural rather than essential.
                        Even if you opened all three, you still need the key
                        on the chip. Especially if you opened all three.
-------------------------------------------------------------

The system is not closed by accident. It is closed by every layer agreeing to close at the same place.


The Italian Solution Stays in the Drawer

There is a fifth country in this story, and I'm not going to put it in this post. It's the one I learned the whole architecture on, twice now, between the SAML federation behind digital identity and the stolen patent that started the entire telephony stack. The solution to the same SIM-in-SOS problem there is its own piece. The carrier is fine. The engineers know exactly what they're doing. The fix is interesting enough to deserve its own post, and the post will arrive when the post is ready. If you've been reading along, you can already guess the shape of it.

That's all I'll say about that one.


The Cloud Doesn't Need the Plastic

The MP3 voicemail bridge in Lisbon, Berlin, Tokyo, and Tallinn still works. The cloud loop never broke. A call to that Portuguese, German, Japanese, or Estonian number β€” placed from any other phone in the world that can complete an international PSTN call to that range β€” arrives at the carrier's IMS, gets answered by an MRF, gets transcoded to MP3, hits an SMTP gateway, lands in a New York Gmail inbox. The fact that the SIM in the iPhone on the Manhattan desk is showing SOS does not enter the loop. The IMS Application Server does not know and does not care.

This is the architecture working exactly as designed. Cloud presence and physical presence are separate concerns. The legal identity attaches to the IMS subscriber profile. The IMS subscriber profile gets reached by any access network that can satisfy the AKA gate. If the user's specific SIM is currently failing AKA against the radio in Manhattan because there is no Portuguese or German or Japanese or Estonian radio in Manhattan, that is a property of the user's handset, not a property of their number. The number lives in the network. The handset is one of many possible access devices the network would have accepted. It just happens to be the one in the user's pocket.

Move to that country tomorrow and the SIM will register on its first contact with a tower in the home PLMN. The IMS profile waits. The cloud has been waiting the whole time. The plastic just hasn't been in the room.

In the meantime, every MP3 arrives. Every voicemail forwards. Every legal entity in those four countries that needs to reach the New York inbox can reach it, asynchronously, in a language and a process those institutions are built to handle. The user's handset is in eternal SOS. The user's line is in perfect health.

Software ate the network. It ate the core, the RAN, the BSS, the OSS, the policy engine, the charging system, the signaling, the media. The one piece it could not eat was the trust anchor β€” the 128-bit key etched into a SIM die by a company most consumers have never heard of, validated against a database the carrier guards as carefully as a central bank guards its vault keys. The cryptography is the silicon. The silicon is the boundary. The boundary holds.

For the layer of this story that's about how the cellular network around you behaves when somebody else is interfering with it β€” IMSI catchers, cell-site simulators, forced encryption downgrades, the family of attacks that turn the same trust model into a surveillance environment when somebody weaponizes it β€” Clutch was built to detect them. The repo is here. The cellular layer is mostly invisible until you build a way to watch it.

The cloud crossed four oceans. The trust anchor did not move.

That is the architecture, and it is doing what the architecture says.


GhostInThePrompt.com // Software ate the network. It stopped at the chip.