BlackBerry Workaround Details

Saturday, December 10, 2005

BlackBerry Work-Around Finally Revealed

Written By: Enterprise Spy
Posted By: IT Management Press

RIM’s new “Push-a-Link” Push-Pull configuration likely will make NTP nervous and BB users breathe a little easier.

First review

There are a few dozen companies that have seen the RIM work-around and the specification under an NDA, I included. I won’t elaborate on when, where or details that might give away my ID but I will attempt to give you enough information to set your heart at ease that the BlackBerry work-around isn’t such a big deal at all – IMO.


There are (as far as I have seen) two versions. One is indistinguishable from the current service (The StealthBerry) and the other is far more interesting and introduces more features (dubbed “The Blackcherry or The StrawBerry”) that will be integrated into future models if a settlement is not reached with NTP. I’ll attempt to describe the latter product first.

Appearance, Function, Ease of use of the BlackCherry

After the standard alert, I picked up the prototype and the preview screen looked very traditional. It included a list of email headers. The headers contained the name of the sender, the subject, date and time received, an attachment indicator and an importance level indicator. I believe (but do not recall for certain) that there was an indicator for the type of email (Fax, Video, Gif, etc.) or I could have been looking at the attachment file header itself. Either way, it was very informative and if anything it was an improvement as far as a preview screens goes.

At the preview screen were several soft key options. They were: view, forward, reply, move, and delete all. The view key (after selecting a header) brought up the selected email. I noticed a slight delay before the first page was displayed (almost 2 seconds). The forward key allowed for forwarding an email to another recipient. The reply allowed for replying before viewing the email (not sure why anyone would do that), the move key is provided for moving an email to another folder (never tried that), and finally, the delete key deleted the header and the email on our corporate server (ability to delete spam while waiting at the airport). All-in-all, the demo BlackCherry service was the same or better than before, except for the slight delay after selecting the view key. There are only minor user interface changes (mostly positive) and the learning curve is negligible. Personally, I don’t believe updated instructions will be required. The updated Blackberry service is still very intuitive, maybe even more so.

Required updates

There are no software updates required to convert a BlackBerry into StealthBerry handset. The new BlackCherry will ship with new firmware. The BES remains unchanged (no updates). The work-around is actually preformed at the NOC in Canada. My understanding is, the NOC update is very minor. I’ll talk more about that later.


As presented, there are absolutely no changes to any security features or security specifications whatsoever.

Technical Description

This is (in my opinion) the best part. The only change at the NOC is – The email headers are pushed to the handset in the form of a link vs. the headers and the first page or two of the email body being pushed to the handset. The resulting effect is the Blackberry recipient receives a notification of an email (i.e. who it's from, the subject, the description and a ton of other information describing the email but not the actual email. Then, based on information displayed within the header, the subscriber determines an appropriate function, such as view the selected message. When the subscriber selects view, the body of the email is retrieved and then displayed (a process that takes 1-2 seconds). The effect is indistinguishable from the current Blackberry service. In other words it’s a push – pull system. The headers are pushed and the body is pulled. Believe it or not, it’s that simple and the result is invisible to the subscriber.

Market Trials

From what I have been able to ascertain, more than 160,000 subscribers are currently and unknowingly experiencing the Stealth service. The actual market trials are being conducted in countries other than the U.S. Only 0.5% of these subscribers have voiced any dissatisfaction relevant to the slight delay introduced during retrieval of the email - No other noticeable differences at all. Better than 99% seem to go on with their Blackberry life as usual – According to the perfectly honed speech.

The Work-Around

The NTP patents have (at the very least) a singular weakness. They are all limited to a one-way (push) email systems. At the time the NTP Patents were filed, two-way pagers had yet to be invented and they were not contemplated by the NTP patents. Hence, NTP’s inventions do not cover a two-way pager or system that would be required to push only the header (not the actual email message) to the pager and enable retrieval of remotely stored email based on a transmission from the pager – One-way pagers cannot transmit anything.

Information regarding the NTP one-way paging system can be found at the links below.

Information regarding RIM's "Push a Link" messaging technology revealed in this RIM document.

Why the Wait?

I have no idea what they are waiting for. Perhaps they have filed their own patents on the push-pull system and they are waiting for them to get approved or there is some other strategic reasoning.

How to tell when you get Stealthed

When you view a new email on the StealthBerry the first time, the handset communicates with the mail server and downloads the email in a second or two. Once downloaded, everything functions the same way as before. However, if you try to view (download) an email for the first time when you are out of range it won’t download until you are in range again. When you are in range again the desired email will automatically be downloaded and ready to view. This is no big deal considering you can’t receive email on any device when you are out of range.

Final review ***** 5 stars

The above review, descriptive texts, parodies, spoofs, fiction, literary works, and/or academic study material, are presented herein according to fair use provisions of the United States copyright law. The authenticity of this document is neither expressed nor implied. Descriptive trademarks and Tradenames are owned by their respective companies. This document may be freely copied only if this notice is attached thereto.