Saturday, July 11, 20:01
Home inet FCC: From 2021 users will be checking the authenticity of the calls

FCC: From 2021 users will be checking the authenticity of the calls

The FCC (Federal Communications Community) announced today that all mobile providers and mobile phone owners will have to adopt the STIR / SHAKEN protocol, a policy expected to come into force on June 30, 2021. The regulatory requirement is designed to combat the so-called robocalls, that is to say, auto-recorded messages - voicemails, especially those trying to hide their phone numbers, enabling users to check the authenticity of calls.

Government agency says widespread adoption of STIR / SHAKEN will reduce the effectiveness of illegal counterfeiting (spoofing), will help law enforcement detect any malicious perpetrators and, above all, it will allow mobile phone owners to verify the authenticity of calls and detect spam users before they even call them. The FCC estimates that "sneaky" call programs cost Americans about $ 10 billion a year. FCC President Ajit Pai has begun pushing mobile phone owners to adopt the protocol in 2018, while Congress Also "passed" this technology last year with TRACED Act.

While the regulatory requirement for the adoption of STIR / SHAKEN is a step in the right direction, it will not provide an immediate solution to the issue of robocalls, as it is not only sufficient for mobile phone owners to apply the protocol, but they must also check whether their implementation works with others networks. In other words, it is not something a wireless service provider can simply activate. In addition, mobile phone owners need one device that will display the notice "Caller Verified" when someone calls them. While the majority of modern smartphones supports its operation Caller ID, and other cell phones should receive the necessary patches so that they can support such a function.


Please enter your comment!
Please enter your name here

Every accomplishment starts with the decision to try.


COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...