• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Legal to Unlock Cell Phones Since November 2006

April 11, 2007

Views: 15,982

[ad]

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider.

Before that it was illegal to unlock your phone but finally in November 2006 it came out in court that it’s ok now.

Most cell phones in the United States are purchased as part of a service plan. The phone itself is cheap or free, but it must be bought as part of a one-year or two-year service contract. Phones can also be purchased separately, but are often hundreds of dollars more expensive then the phones that come with service plans. This is because phone companies take a loss on the phone up front and hope to make up that loss over the life of the contract in monthy fees.

Nearly all of the phones purchased as part of a service plan (and even some that are purchased separately) are SIM locked to only work with that phone companies network. The phone’s software will reject SIM cards from competing phone networks. Phones bought from T-Mobile only work with T-Mobile, phones bought from Cingular only work with Cingular, etc. This way the phone company can be certain that a customer is stuck and they will make back their investment.

The fact is the protection was frequently broken and many people were unlocking their owns anyway. The US made a smart decision this time to legitimize the dodgy unlocking market and make it straight forward. It also gives the consumers back the rights they should have anyway.

Yesterday, the Library of Congress announced six new exceptions to DMCA rules. Among those was the declaration that breaking SIM locks will not be considered a DMCA violation starting on Monday:

5. Computer programs in the form of firmware that enable wireless telephone handsets to connect to a wireless telephone communication network, when circumvention is accomplished for the sole purpose of lawfully connecting to a wireless telephone communication network.

Library of Congress Rulemaking Statement

This has the potential to legitimize the shady market of cell phone unlockers. It also has the potential to change how cell phone companies do business. If awareness of these rules spreads and legitimate cell phone unlocker services appear, the current cell phone business model might not make as much sense. It is also likely to further frustrate “pay as you go” cell phone providers who have been trying to stop resellers who purchase their phones and then sell them overseas for a profit.

So please, feel free to and unlock your phone, it’s no longer a DMCA violation!

Source: Uninnovate

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hardware Hacking, Legal Issues, Telecomms Hacking Tagged With: dmca



Reader Interactions

Comments

  1. Sandeep Nain says

    September 4, 2007 at 11:53 pm

    Wowwwww…. I hope it becomes legal everywhere else too… No doubt it is in favour of consumers….

    One of the good decisions made by US govt..

  2. Jeff Baker says

    May 19, 2008 at 4:24 pm

    I travel frequently in the US with an unlocked phone. Is there a supplier of SIM cards in the US who will allow me to save on the horrendous roaming cvharges levied by my UK network when I both make and receive calls? This is simple in both Australia and New Zeland.

  3. eM3rC says

    May 19, 2008 at 10:32 pm

    Although buying the SIM cards themselves is probably illegal, you could always go with a pay as you go phone. Their pretty cheap and sound like something your looking for.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 322

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 616

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 567

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 604

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 458

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 687

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,297,997)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,104)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,640)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,691)
  • Password List Download Best Word List – Most Common Passwords (933,528)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,171)
  • Hack Tools/Exploits (673,300)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,184)

Search

Recent Posts

  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy