encrypted-sim

Blog tagged as encrypted-sim

OMERTA ESIM - CONFIGURING YOUR SMARTPHONE TO USE MOBILE DATA

21.06.22 03:12 AM By Craig - Comment(s)

Internet Access – Configuring your Smartphone

If you purchased internet access alongside your encrypted SIM card, it may be necessary to configure your access point. Use the instructions below:

Settings for R profile (standard)

  1. Go to mobile data settings (slide down the top menu & press then hold o...

NOT ALL ENCRYPTED SIMS ARE EQUAL - WHY IS AN OMERTA ESIM SO EXPENSIVE?

24.03.22 01:08 PM By Craig - Comment(s)

A lot of visitors to Omerta question the cost of our Encrypted SIM service, stating they can buy a similar service at a fraction of a cost. Why is this?

Quite simply put - not all services are equal. The Omerta Encrypted SIM card is a high performance security solution designed to protect the user. C...

Half price on encrypted SIMs plus new plans available

26.08.21 05:42 PM By Craig - Comment(s)

We are pleased to announce after years of operating as a reseller of encrypted Sims, that we have cast off the shackles of a middleman meaning we can now offer our encrypted sim card service at half the previous price! Yes, thats entirely correct - this is not an offer; not a limited time deal, but ...

Encrypted SIM Cards - what are they & what do they do?

19.07.20 06:02 AM By Craig - Comment(s)

Introducing the Omerta Encrypted SIM Cards (Omerta eSIM)

Omerta is pleased to announce our own range of encrypted SIM cards (eSIM) to compliment our secure, encrypted phone range. Encrypted SIM cards offer an alternative means to provide secure, encrypted communications.

Whilst the Omerta Smartphone r...

Configuring your Encrypted SIM Card for internet access

21.06.20 06:40 AM By Craig - Comment(s)

The instructions below guide you through configuring your smartphone to work with an Omerta SIM card. The process can be broken into 3 distinct steps:

  1. Changing your profile
  2. Selecting your network provider
  3. Creating an Access Point Name

Each step takes a minute or so to complete and are similar to what mi...

Hi-jacking your SIM - the fallacy of 2 factor authentication

26.07.19 11:27 PM By Craig - Comment(s)

2 step factor authentication - aka 2fa is often touted as the defacto standard for protecting access to your digital life. From Gmail to AMazon & all over in between, its common place to use your mobile phone as part of the login mechanism. Because lets face it - who on earth would have both you...