<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">

<channel>

  <atom:link href="https://support.sansay.com/rss/category/articles" rel="self" type="application/rss+xml"/>
  <title>Sansay TAC&#32;Articles</title>
  <link>https://support.sansay.com/category/articles/</link>
  <description>General articles related to industry news and trends</description>
  <language>en-us</language>
<ttl>240</ttl>
  <item>
          <title>March 2026: Understanding the new 603+ standard</title>
          <link>https://support.sansay.com/t/35ygygt/march-2026-understanding-the-new-603-standard</link>
          <description><![CDATA[<p style="text-align:start">The new&nbsp;Robocall Call Notification standard (<a href="https://access.atis.org/higherlogic/ws/public/download/67424" rel="nofollow noopener noreferrer" target="_blank">ATIS-1000099</a>), commonly referred to as&nbsp;603+, introduces a consistent way for networks to communicate&nbsp;why&nbsp;a suspected unwanted robocall was blocked. Unlike traditional SIP responses, which often provide little to no context, 603+ enables&nbsp;call treatment transparency&nbsp;by carrying meaningful information&nbsp;back toward the originating party.</p>
<h2>What is 603+?</h2>
<p style="text-align:start">603+ is an industry standard that enhances how SIP networks signal&nbsp;blocked or rejected calls based on analytics for suspected unwanted robocalls. It works in the&nbsp;reverse direction of the call path—from the terminating or intermediate network back toward the originating network—providing insight into:</p>
<ul>
 <li><p>Why a call was blocked</p></li>
 <li><p>Where the blocking occurred</p></li>
</ul>
<p style="text-align:start">In early implementations, multiple SIP response codes were used (e.g., 607, 608, 603). To simplify adoption and ensure consistency, the industry aligned on: &nbsp;SIP 603 with a standardized “Network Blocked” reason phrase and enhanced Reason header.</p>
<p style="text-align:start">SBCs and proxies must preserve the original SIP 603+ response and Reason header end-to-end. Any normalization, remapping, or rewriting of the response may result in loss of diagnostic information and non-compliance with the standard. From a routing standpoint, a call rejected with a 603+ should not be re-attempted; the response represents a definitive call treatment decision and must be returned to the originating side.</p>
<p style="text-align:start">An important clarification is that 603+ applies to explainable (analytics-based) blocking, not deterministic blocking such as Do-Not-Originate (DNO).</p>
<h2>How 603+ Differs from Standard SIP 603</h2>
<p style="text-align:start">A&nbsp;603+ response&nbsp;is distinguished from a traditional SIP 603 (“Decline”) in two key ways:</p>
<h3>1. Status Line Reason Phrase</h3>
<ul>
 <li><p>Standard SIP 603&nbsp;→&nbsp;Decline</p></li>
 <li><p>603+ SIP Response&nbsp;→&nbsp;Network Blocked</p></li>
</ul>
<p style="text-align:start">This provides immediate indication that the rejection is&nbsp;network-driven, not user-driven.</p>
<h3>2. Enhanced Reason Header</h3>
<p style="text-align:start">603+ requires the inclusion of a&nbsp;SIP Reason header&nbsp;(RFC 3326), encoded according to the standard.&nbsp;Any SIP 603 response&nbsp;without valid 603+ Reason header syntax&nbsp;should be treated as a normal 603 response.</p>
<p style="text-align:start">Example 603+ Reason headers:</p>
<blockquote>
 <p style="text-align:start">Reason: Q.850;cause=21;text="v=analytics1;url=https://example.com";location=LN</p>
 <p style="text-align:start">Reason: SIP;cause=603;text="v=analytics1;email=support@example.com";location=RLN</p>
 <p style="text-align:start">Reason: Q.850;cause=21;text="v=analytics1;url=https://example.com;email=support@example.com;tel=+12155551212;id=29016905-3bed-4c98-9423-03041160cc67";location=LN</p>
</blockquote>
<p style="text-align: start;">The Reason header provides structured context about why a call was blocked, improved transparency, and more effective dispute resolution. Here are some real-world Reason headers we are observing:</p>
<blockquote>
 <p style="text-align:start">1482015742;1439765248-39593900@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://voicespamfeedback.com"";location=RLN";</p>
 <p style="text-align:start">1482015743;1439766227-39607490@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://www.att.com/redressC;id=att2"";location=RLN";</p>
 <p style="text-align:start">1482015765;1439767952-39631560@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://www.att.com/redressG;id=att1"";location=RLN";</p>
 <p style="text-align:start">1482015748;1439766671-39613930@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://www.t-mobile.com/responsibility/consumer-info/additional-info/call-blocking-redress"";location=RLN";</p>
 <p style="text-align:start">1482015752;1439766977-39618090@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://reportspam.spectrum.com"";location=RLN";</p>
 <p style="text-align:start">1482015778;1439768720-39641650@[masked-ip];"Reason: SIP;cause=603;text=""v=analytics1;url=https://reportarobocall.com"";location=RLN";</p>
</blockquote>
<p style="text-align: start;">The above shows that the most common context is a website where action can be taken to dispute a rejection. We also see that RLN (i.e. blocking occurred in the network serving the called party) is the most common location of &nbsp;blocking.&nbsp;</p>
<h2 style="text-align: start;">What Problem Does 603+ Solve?</h2>
<p style="text-align:start">Historically, when calls were blocked via analytics:</p>
<ul>
 <li><p>Terminating or transit networks could reject calls silently</p></li>
 <li><p>Transit or originating providers had&nbsp;no visibility into the reason</p></li>
 <li><p>Originating providers could not:</p>
  <ul>
   <li><p>Dispute incorrect blocking</p></li>
  </ul></li>
</ul>
<p>This would lead to legitimate calls being rejected without explanation, and being handled inconsistently between providers.</p>
<p>The adoption of 603+ standardizes call rejection for suspected unwanted robocalls. Each network in the call path is responsible for preserving the rejection and forwarding it to the upstream. From an Originating Service Provider perspective, the 603+ could be a great thing for identifying, diagnosing and as applicable disputing calls being rejected by analytics engines. We wrote a different article <a href="/t/x2ygx88/address-spam-likely-issues-with-certain-carriers" rel="nofollow noopener noreferrer">how the 603+ can facilitate the resolution of calls improperly labeled as spam</a>.</p>
<p>When troubleshooting failed calls, providers should inspect the SIP Reason header within a 603+ response to determine the specific cause of blocking.</p>
<h2 style="text-align: start;">Real-World Example</h2>
<p style="text-align:start">Without 603+</p>
<ol>
 <li><p>Call originates from Carrier A</p></li>
 <li><p>Intermediate Carrier B blocks the call</p></li>
 <li><p>Carrier A sees:</p>
  <ul>
   <li><p>Call failed</p></li>
   <li><p>No explanation</p></li>
  </ul></li>
</ol>
<p>With 603+</p>
<ol>
 <li><p>Carrier B blocks the call</p></li>
 <li><p>Adds Reason header:</p></li>
 <li><p>Carrier A can:</p>
  <ul>
   <li><p>Identify the issue</p></li>
   <li><p>Adjust traffic behavior</p></li>
   <li><p>Work directly with the carrier rejecting the call (or analytics providers)</p></li>
  </ul></li>
</ol>
<h2>VSXi Support for 603+</h2>
<p style="text-align:start">Support for 603+ is available in&nbsp;VSXi 12.3.3.47 and later, with the following enhancements:</p>
<h3>Reason Header Handling Improvements</h3>
<ul>
 <li><p>Reason header will pass through even when SIP Profile's Extraneous Header Hiding setting is enabled.</p></li>
 <li><p>Increased character length ensures full 603+ Reason header is preserved and forwarded.</p></li>
 <li><p>Optional Reason Header CDR logging. Full Reason header stored in a companion CDR file (.cadr) to facilitate investigation.</p></li>
</ul>]]></description>
          <pubDate>Wed, 18 Mar 2026 23:24:52 +0000</pubDate>
          <guid>https://support.sansay.com/t/35ygygt/march-2026-understanding-the-new-603-standard</guid>
          <dc:creator>Carlos Perez</dc:creator>
        </item>

      <item>
          <title>March 2025: The Role of Certificate Revocation and Trust Lists in STIR/SHAKEN</title>
          <link>https://support.sansay.com/t/y4yfpdp/march-2025-the-role-of-certificate-revocation-and-trust-lists-in-stirshaken</link>
          <description><![CDATA[<p>The STIR/SHAKEN ecosystem relies on two critical components to maintain its integrity: the Certificate Revocation List (CRL) and the Trusted CA List. These mechanisms form the backbone of trust and security in STIR/SHAKEN enabled networks.</p>
<p style="text-align:center"><img alt="" class="fb-img" src="https://s3-us-west-2.amazonaws.com/media.forumbee.com/i/7e52c35d-f30b-4463-a8e3-e0d77f61a005/h/547.png" style="" width="599"></p>
<p>&nbsp;</p>
<h2>The Trusted CA List</h2>
<p>The Trusted CA List serves as the anchor of trust for STI (Secure Telephone Identity) certificates. This curated list ensures only verified entities can participate in the STIR/SHAKEN ecosystem.</p>
<h3>Key Characteristics</h3>
<ul>
 <li><strong>Strict Approval Process</strong>: Only approved Certificate Authorities (STI-CAs) can be included in this list.</li>
 <li><strong>Dynamic Nature</strong>: The list is not static but evolves with the deployment of new root certificates or changes in the CA landscape.</li>
</ul>
<p>Before obtaining an STI certificate, Service Providers must present a Service Provider Code (SPC) token to their STI-CA of choice, proving their eligibility. This ensures only authorized Service Providers are able to obtain a valid certificate to sign their calls.&nbsp;</p>
<h2>The Certificate Revocation List</h2>
<p>The Certificate Revocation List (CRL) is a security mechanism that maintains a current list of certificates that are no longer considered trustworthy. Unlike static blacklists, the CRL is a dynamic, carefully managed inventory of compromised or invalidated certificates.</p>
<h3>Reasons for Certificate Revocation</h3>
<p>Certificates can be revoked for various critical reasons:</p>
<ul>
 <li><strong>Security Compromise</strong>: When there's evidence that a private key has been breached.</li>
 <li><strong>Ecosystem Removal</strong>: When a Service Provider is expelled from the STIR/SHAKEN ecosystem.</li>
 <li><strong>Certificate Replacement</strong>: Revoking older certificates when new ones are issued to prevent potential misuse.</li>
 <li><strong>Policy Violations</strong>: Addressing breaches of established operational guidelines.</li>
 <li><strong>Organizational Changes</strong>: Reflecting changes in an organization's structure or operational status.</li>
</ul>
<h3>Revocation Request Process</h3>
<p>The revocation process is rigorous and involves multiple stakeholders:</p>
<ul>
 <li>Revocation requests can be initiated by Service Providers, the Policy Administrator (STI-PA), Certificate Authorities (STI-CA), Governance Administrator (STI-GA), or regulatory bodies.</li>
 <li>Every revocation request undergoes thorough authentication by the STI-PA before being added to the CRL.</li>
</ul>
<h2>How the Revocation and CA List Protect the Network</h2>
<p>STIR/SHAKEN Verification Services (STI-VS), typically operated by Terminating Service Providers, play a crucial role in maintaining network security. These services:</p>
<ul>
 <li>Continuously update the CRL and Trusted CA List.</li>
 <li>Validate STIR/SHAKEN signatures against established criteria.</li>
 <li>Automatically reject calls from revoked certificates.</li>
</ul>
<p>Consider a Service Provider being suspended from the STIR/SHAKEN ecosystem. With a properly integrated STI-VS, such as Sansay NSS, the network can immediately and automatically reject all traffic associated with that provider's revoked certificates, ensuring swift and comprehensive protection.</p>
<p>Another example are certificates with self-signed signatures or a root certificate outside of the Trusted CA List. While the signature of these calls may appear legit, if the certificate was not issued by an authorized CA, then all of this traffic is to be rejected.&nbsp;</p>
<p>The Certificate Revocation List and Trusted CA List are more than administrative tools—they are dynamic systems that protect the integrity of the ecosystem. These lists ensure that the STIR/SHAKEN ecosystem remains secure, reliable, and resilient.</p>]]></description>
          <pubDate>Wed, 26 Mar 2025 16:31:46 +0000</pubDate>
          <guid>https://support.sansay.com/t/y4yfpdp/march-2025-the-role-of-certificate-revocation-and-trust-lists-in-stirshaken</guid>
          <dc:creator>Carlos Perez</dc:creator>
        </item>

      <item>
          <title>February 2025: STIR/SHAKEN and Anonymous Calls</title>
          <link>https://support.sansay.com/t/y4yldbp/february-2025-stirshaken-and-anonymous-calls</link>
          <description><![CDATA[<p>STIR/SHAKEN has revolutionized caller authentication in phone networks, introducing much-needed transparency and accountability to combat fraud and illegal calls. However, it is not uncommon for an Originating Service Provider (OSP) to have issues supporting legitimate calls that request privacy. These anonymous calls may be marked as potential spam or even blocked by some Terminating Service Providers (TSP).&nbsp;</p>
<p>This article has the objective of defining where the disconnect exists and how to solve the issue.</p>
<h2>Understanding SIP and Privacy</h2>
<p>To understand the issues with STIR/SHAKEN implementations and privacy calls it is important to go over the established mechanisms and standards for privacy calling within SIP. Most problems with anonymous calling start with a From header liks this:</p>
<blockquote>
 <p>From: “Anonymous” &lt;sip:Anonymous@annoymous.invalid&gt;; tag=12345</p>
</blockquote>
<p>While the above header is valid, it is the underlying use, or lack thereof, of SIP headers as defined by RFC3323 and RFC3325 that will determine the effective use of privacy in a STIR/SHAKEN enabled network. Let's dive further:</p>
<h3>The role of the P-Asserted-Identity header</h3>
<p>As it names suggests, the P-Asserted-Identity (P is for Private) header (short for PAI) is a mechanism to assert the identity of a user originating a call. The PAI header provides a network-verified and network-asserted identity of the user making a call.</p>
<p>When a user requests Privacy, the user agent client INVITE carries an anonymous From header and can optionally add a P-Preferred-Identity header. The network elements can apply specific treatment to the P-Preferred-Identity header and strip it before it leaves the network having asserted the caller with the insertion of the P-Asserted-Identity header. To properly request privacy a UAC should also include the <em>Privacy: id</em> header.</p>
<p>A call requesting privacy from the user client arrives like:</p>
<pre class="prettyprint">INVITE sip:+14085551212@network.example SIP/2.0
   Via: SIP/2.0/TCP useragent.network.example;branch=z9hG4bK-124
   To: &lt;sip:+14085551212@network.example&gt;
   From: "Anonymous" &lt;sip:anonymous@anonymous.invalid&gt;;tag=9802748
   Call-ID: 245780247857024504
   CSeq: 2 INVITE
   Max-Forwards: 70
   Privacy: id</pre>
<p>A call processed by core network elements is enhanced with a PAI like this:</p>
<pre class="prettyprint">INVITE sip:+14085551212@proxy.pstn.net SIP/2.0
   Via: SIP/2.0/TCP useragent.network.example;branch=z9hG4bK-124
   To: &lt;sip:+14085551212@network.example&gt;
   From: "Anonymous" &lt;sip:anonymous@anonymous.invalid&gt;;tag=9802748
   Call-ID: 245780247857024504
   CSeq: 2 INVITE
   Max-Forwards: 69
   P-Asserted-Identity: &lt;sip:+19995551234@network.example&gt;
   Privacy: id</pre>
<p>While RFC3325 became a standard in 2003, to this date it is not uncommon to see INVITEs with a Remote-Party-ID SIP header (RPID). The RPID header is an older proprietary header used to convey the caller's identity in a network, almost identical to the issue the P-Asserted-Identity resolves and standardized. RPID never became a standard and any modern network should replace RPID with PAI; this is a function network elements like an SBC support. Additionally, the exclusive use of an anonymous From header without a corresponding PAI will not yield the desired outcome.</p>
<p>One more thing is that RFC3325 suggests, <em>it is recommended the the P-Asserted-Identity header fields SHOULT NOT be removed unless local private policies prevent it. Removal of the PAI <strong>may cause services based on Asserted Identity to fail.</strong>&nbsp;&nbsp;</em>This last part connects the dots with the STIR and ATIS standards we will explain shortly.</p>
<h2>Privacy and SHAKEN</h2>
<p>While the P-Asserted-Identity header allows a network to assert caller identity for its users, it lacks the security of cryptographic digital signatures, such as those introduced in a SHAKEN PASSPorT.&nbsp; A SHAKEN PASSPorT contains the originating telephone number (orig TN) as one of different elements to validate the integrity of a call.</p>
<p>As defined in ATIS-1000074 and RFC 8224 (which defines interactions between privacy and STIR standards)&nbsp;<em>The CSCF of the originating service provider (i.e., Service Provider A) adds a P-Asserted-Identity header field asserting the Caller ID of the originating SIP UA. The CSCF then initiates an originating trigger to the STI-AS for the INVITE.&nbsp;&nbsp;</em>This helps clarify the weight of the P-Asserted-Identity over a From when it is present.</p>
<p>The P-Asserted-Identity created by trusted network elements, unlike a From header, holds a definitive identity for the originator. Furthermore, as defined in RFC 8224, the syntax or ABNF for telephone number fields within a SHAKEN PASSPorT is of the form:</p>
<pre class="prettyprint">RFC 8224                      SIP Identity                 February 2018
             tn-spec =  1*tn-char
             tn-char = "#" / "*" / DIGIT</pre>
<p>which means a alpha user such as anonymous, restricted or blocked fall outside the spec. While we have not mentioned it yet, a P-Asserted-Identity will contain a valid user telephone number and in the case of private calls, request privacy through the Privacy: id header. This makes the PAI ideal to meet the requirements of the telephone number claims in a SHAKEN PASSPorT. While STIR/SHAKEN does not changes the nature of privacy, the use of P-Asserted-Identity and Privacy:id as opposed to other mechanisms to request privacy are essential to making calls with privacy work.</p>
<h2>Closing the Gap</h2>
<p>As a Service Provider, it is important to understand how 1) privacy calls are handled in your network prior to call signing (STI-AS) and 2) how calls requesting privacy leave your network.&nbsp;</p>
<p>A best common practice is to follow the rules defined in RFC 3325 in conjunction with RFC 8224 and ATIS 1000074.&nbsp;</p>
<p>Do you need to verify how private calls are made from your network and how they are verified from a STIR/SHAKEN perspective? Give our SHAKEN Echo Number a try: <a href="https://test-shaken.sansay.cloud" rel="nofollow noopener noreferrer" target="_blank">https://test-shaken.sansay.cloud</a>.&nbsp;</p>]]></description>
          <pubDate>Wed, 05 Feb 2025 08:05:08 +0000</pubDate>
          <guid>https://support.sansay.com/t/y4yldbp/february-2025-stirshaken-and-anonymous-calls</guid>
          <dc:creator>Carlos Perez</dc:creator>
        </item>

      <item>
          <title>December 2024: Understanding the FCC&#x27;s Eighth Report &#x26; Order</title>
          <link>https://support.sansay.com/t/y4yzvt9/december-2024-understanding-the-fccs-eighth-report-order</link>
          <description><![CDATA[<p>The FCC's Eighth Report and Order increases the obligations of service providers to implement STIR/SHAKEN, aiming to enhance transparency across the ecosystem. By requiring all originating providers to sign their own calls, the order looks to bolster transparency and trust in voice communications. Additionally, it sets clear guidelines for implementing STIR/SHAKEN, striking a balance between compliance mandates and practical technical considerations.</p>
<h2>How do I know if I'm compliant?</h2>
<p>If you are unsure whether you comply with this order or not, we invite you use our SHAKEN Echo app. Calling our SHAKEN test platform will reveal what OCN and certificate are used to sign your calls. If you see that calls made to our platform have your OCN, you are compliant. To make your tests visit <a href="https://test-shaken.sansay.cloud" rel="nofollow noopener noreferrer" target="_blank">https://test-shaken.sansay.cloud</a></p>
<h2>Implementation Obligations</h2>
<p>The implementation obligation applies to all providers that originate calls and have control over the network infrastructure necessary to implement STIR/SHAKEN.</p>
<blockquote>
 <p>By requiring calls to be signed using the certificate of the provider with the implementation obligation, the STIR/SHAKEN governance model will be able to function as intended by making it easier to identify providers responsible for any authentication information transmitted with a call and facilitating enforcement remedies that may be needed for failures to comply with authentication requirements, including, for example, revocation of a provider’s SPC token by the Secure Telephone Identity Governance Authority (STI-GA).</p>
</blockquote>
<p>All Originating Service Providers (obligated to implement STIR/SHAKEN) need to:</p>
<ol>
 <li>Obtain a&nbsp;STIR/SHAKEN certificate. To obtain a certificate, a Service Provider must: 
  <ol>
   <li>Have a current form 499A on file with the FCC;</li>
   <li>Have&nbsp;an Operating Company Number (OCN) from NECA</li>
   <li>Have certified with the FCC that it has implemented STIR/SHAKEN or complies with the FCC’s Robocall Mitigation Program requirements and is listed in the RMD, or that it has direct access to telephone numbers from the Toll-Free Number Administrator (TFNA).&nbsp;&nbsp;</li>
   <li>Obtain an SPC token.</li>
  </ol></li>
 <li>Certify to complete or partial implementation in the FCC Robocall Mitigation Database only if they have obtained an SPC token and STIR/SHAKEN certificate and sign calls with their certificate; and</li>
 <li>Memorialize and maintain records of any third-party authentication agreement(s) they have entered into, subject to certain limitations.</li>
</ol>
<p>The FCC describes acceptable implementations including 3rd parties under the following rules:</p>
<blockquote>
 <p>The provider with the STIR/SHAKEN implementation obligation: (1) makes all attestation level decisions,<br> consistent with the STIR/SHAKEN technical standards; and (2) ensures that all calls are signed using its<br> own certificate obtained from a STIR/SHAKEN Certificate Authority—not the certificate of a third party.</p>
</blockquote>
<h2>Compliance Deadline</h2>
<p>The eight order was released on November 22, 2024 and establishes the following deadlines:</p>
<ul>
 <li>30 days after publication of this Report and Order in the Federal Register following OMB approval, or&nbsp;</li>
 <li>210 days after release of the Order, whichever is later. The Order was released on November 22, 2024.</li>
</ul>
<p>The tentative compliance deadline is June 20, 2025.</p>
<h2>Technical Implementation</h2>
<p>The permitted third-party authentication rules offer new STIR/SHAKEN Originating Service Providers participants flexibility to to implement STIR/SHAKEN. A third-party authentication implementation looks like this:</p>
<p style="text-align:left"><img alt="" class="fb-img" src="https://s3-us-west-2.amazonaws.com/media.forumbee.com/i/f0137daa-d457-4ce6-a89c-2fd8e95bd045/h/547.png" style="" width="1136"></p>
<ol>
 <li>&nbsp;OSP unsigned traffic arrives at Intermediate Provider. OSP has an an agreement with the Intermedia Provider(s) to perform third-party call signing.</li>
 <li>The Intermediate Provider, on a per-call basis, performs call authentication against the OSP's STI-AS system.&nbsp; The STI-AS system uses the OSP's STIR/SHAKEN certificate obtained from an STI-CA after SPC token procedures from the STI-PA infrastructure.</li>
 <li>All traffic sourced by the OSP and routed through the Intermediate Provider is signed with the OSP's certificate following attestation rules defined by the OSP.</li>
 <li>The Terminating Service Provider (TSP) is performs call verification and despite the Intermedia Provider's efforts to technologically sign the call, sees the OSP in the SHAKEN digital signature as the originator of the call.</li>
</ol>
<h2>Why would a provider want to do 3rd-party call authentication?</h2>
<p>While there are benefits to performing in-network call authentication, a provider trying to obtain compliance may want to opt for 3rd party call authentication for any of the following reasons.</p>
<ol>
 <li><strong>Technical limitations.&nbsp;</strong>The provider's existing infrastructure may not support STIR/SHAKEN yet.</li>
 <li><strong>Limited resources.&nbsp;</strong>There are limited resources available to reach compliance in a timely matter.</li>
 <li><strong>Cost.&nbsp;</strong>3rd-party call authentication may reduce the cost to implement STIR/SHAKEN.</li>
 <li><strong>Minimize risks. </strong>A provider may want to minimize risks associated with the STIR/SHAKEN implementation.</li>
</ol>
<p>Whether you are looking at deploying 1st-party (in-network) or third-party call authentication, Sansay's STIR/SHAKEN solution is highly interoperable. We support SIP and REST interfaces and work with a large list of SBCs, PBXs and Switches.</p>]]></description>
          <pubDate>Fri, 06 Dec 2024 23:18:02 +0000</pubDate>
          <guid>https://support.sansay.com/t/y4yzvt9/december-2024-understanding-the-fccs-eighth-report-order</guid>
          <dc:creator>Carlos Perez</dc:creator>
        </item>

      </channel>
</rss>
