Indeed, we don't. However, the whole idea is based on the protocol's upgrade, that is to say, that we manage our own traffic that we've been provided the way we consider appropriate, the variety of setups is huge and that's why we are able to deliver our features. Let us be more specific and allow you to test the product, so please e-mail us at ico [at] torqall.com with the reference to this discussion, or PM us here.
Thank you for your offer, but I think this won't help because of some reasons.
First, even if I will see that your product is fully operational I can't explain to the community how exactly it works. As I'm not so influentional person, a few will believe me that product is indeed workking. If you gave such sim to Vitalik Buterin this would lead to great net effects.
Second, every investor is rather a skeptic. And skeptics believe in numbers, schemes and definitions, not in personal opinion.
Third, sending product will take time and we don't have much time in terms of upcoming ICO.
Russian thread already have bunch of "scam" shouts cause people don't understand how is this possible. Please just give some links to related technologies that allow you to provide your major features and this will do fine.
A call starts with an alert signal transmission via FACCH (Fast Associated Control Channel) to the BSS (Base Station Subsystem). Then, it’s sent to MSC (Mobile Switching Center), which forwards Address Complete message to the calling party.
Next step is the calling itself, c’est-à-dire, dial/ringing.
If the number (MSISDN) of one of the subscribers is known, then it is possible to get all the call details from the operator’s billing and the session itself. Meanwhile, it is possible to intercept the session over the air by intercept complexes.
TOR-Q-ALL user after number dialing presses the Call-button – the call is aborted. At the same time the encrypted command is sent through the signal channel to the TOR-Q-ALL Automatic Telephone Station, which in its turn through SS7 requests Visitor Location Register for a temporary number MSRN (Mobile Station Roaming Number) – for these particular SIM and call.
When the operator has allocated MSRN to a SIM, TOR-Q-ALL’s ATS starts calling this number. At this stage the call to TOR-Q-ALL. When the client answers this call, the first leg opens. Then TOR-Q-ALL’s ATS starts calling the destination number. When the second party answers the call, the second leg opens (Call Back technology). This algo for call makes it impossible to get the information from the operator’s billing software, as it is unknown what operator TOR-Q-ALL is registered to, and as a result there is no public identifier - MSISDN by means of which IMSI, Ki and IMEI parameters are obtained. Even if the destination number is wired it is impossible to understand who he’s had a conversation with, for the session consists of two legs, and both legs are separated by TOR-Q-ALL’s server ATS, and as a result, the anonymity is reached by these means.