Acceptable Use Policy
Last updated: February 08, 2026
This Acceptable Use Policy governs your use of the Multi-RAT Network Simulator ("the Service"). It is designed to ensure the Service remains a safe, constructive, and lawful educational resource for all users.
Important: The Service includes simulations of real-world mobile network security vulnerabilities (such as IMSI catching, downgrade attacks, and cipher cracking). These simulations are provided exclusively for educational purposes to help users understand and defend against such threats. Misuse of this knowledge against real-world systems is illegal and strictly prohibited.
1. Permitted Use
You may use the Service to:
- Learn about cellular network architectures (2G, 3G, 4G, 5G) and their protocols.
- Study security concepts and understand vulnerabilities in mobile network design.
- Complete interactive quizzes and use the glossary for educational self-assessment.
- Use the simulations as a teaching or study aid in academic or professional training contexts.
- Gain knowledge to support legitimate security research, with proper authorisation.
2. Prohibited Activities
You must not use the Service or any knowledge gained from it to:
- Attempt to intercept, monitor, or disrupt real-world telecommunications networks or signals.
- Build, deploy, or operate rogue base stations (IMSI catchers, fake eNodeBs/gNodeBs, or similar devices) outside of an authorised and controlled testing environment.
- Conduct attacks against cellular infrastructure, mobile devices, or subscribers without explicit legal authorisation.
- Violate any applicable local, national, or international telecommunications laws and regulations.
- Attempt to gain unauthorised access to any system, network, or data.
- Share, redistribute, or repackage the Service's educational content for commercial purposes without permission.
- Use automated tools, bots, or scripts to access the Service in a manner that degrades performance for other users.
- Create multiple accounts to circumvent rate limits or access restrictions.
- Harass, impersonate, or harm other users of the Service.
3. Security Research Guidelines
If you intend to apply knowledge gained from this Service to security research, you must:
- Obtain explicit written authorisation from the owner of any system you test.
- Conduct research only in controlled, isolated environments (e.g., shielded test labs, software-defined radio sandboxes).
- Comply with responsible disclosure practices when reporting vulnerabilities.
- Follow all applicable laws, including but not limited to the Computer Fraud and Abuse Act (US), Computer Misuse Act (UK), and equivalent legislation in your jurisdiction.
4. Account Responsibilities
You are responsible for all activity that occurs under your account. You must:
- Keep your login credentials confidential and not share them with others.
- Use a strong, unique password as required by the Service's password policy.
- Log out of your account when using shared or public devices.
5. Reporting Violations
If you become aware of any misuse of the Service or violations of this policy, please report it through learn-mobile.com. We take all reports seriously and will investigate promptly.
6. Consequences of Violation
Violations of this Acceptable Use Policy may result in:
- Temporary or permanent suspension of your account.
- Removal of access to the Service without refund or compensation.
- Reporting to relevant law enforcement authorities where appropriate.
7. Changes to This Policy
We may update this Acceptable Use Policy at any time. Changes will be reflected by the "Last updated" date at the top of this page. Continued use of the Service following changes constitutes your acceptance of the revised policy.