cloud phone glossary: 50 terms every buyer should know
cloud phone glossary terms get thrown around in vendor pitches, comparison articles, and Reddit threads as if everyone already knows what they mean. they often do not. the terminology around cloud phones touches mobile networking, Android internals, fraud detection, and SaaS billing, and most buyers come from one of those backgrounds rather than all four.
this article defines 50 terms a cloud phone buyer should know. each definition is short and practical, biased toward “what you need to make a buying decision” rather than encyclopedic accuracy. terms are grouped loosely by topic.
device and hardware
Android
the open-source operating system developed by Google that runs on most non-Apple smartphones. cloud phones run real Android, not a simulator or emulator.
AOSP
Android Open Source Project. the public codebase Google releases that vendors customize for their devices. cloud phones may run AOSP, vendor-customized Android (Samsung One UI, MIUI), or vendor-stripped builds.
Build properties
system constants exposed by Android via Build.HARDWARE, Build.MODEL, Build.MANUFACTURER. used by apps to identify the device type. real devices have consistent values; emulators often have telltale strings like “ranchu”.
IMEI
International Mobile Equipment Identity. 15-digit unique identifier baked into a device’s cellular hardware. real cloud phones have real IMEIs allocated to real device manufacturers.
Magisk
a popular Android root tool that hides root status from apps. cloud phones generally do not need Magisk because they run unrooted Android by default.
Play Integrity
Google’s hardware-backed device attestation API. apps use it to verify they are running on real, untampered Android hardware. cloud phones pass Play Integrity; emulators usually do not.
Play Protect
Google Play’s built-in malware scanner. it can flag and uninstall apps it considers risky, including some sideloaded APKs. operators sometimes disable it for specific workloads.
root
elevated privileges on Android, equivalent to administrator on a desktop OS. rooted devices are over-represented in fraud datasets and detected by many serious apps.
sideload
installing an APK directly without going through the Play Store. sideloaded apps trip more detection signals than Play Store installs.
Samsung Galaxy
a popular line of Android devices from Samsung. many cloud phone providers use Galaxy devices because they are widely deployed and platforms expect to see them.
networking
APN
Access Point Name. the configuration that tells a phone how to connect to its carrier’s data network. real SIMs use real APNs; virtualized networking does not.
ASN
Autonomous System Number. unique identifier for a network on the internet. fraud systems classify IPs by ASN type (mobile, ISP, datacenter, VPN).
CGNAT
Carrier-Grade Network Address Translation. allows many subscribers to share one public IP. normal for mobile networks. mobile IPs without CGNAT look unusual.
datacenter IP
an IP from a cloud or hosting provider (AWS, DigitalOcean). easy for platforms to identify. usually low-trust for fraud detection.
IMSI
International Mobile Subscriber Identity. unique identifier on a SIM card. encodes country (MCC) and carrier (MNC).
MCC
Mobile Country Code. first 3 digits of an IMSI, identifies the country. e.g. 525 is Singapore.
MNC
Mobile Network Code. 2 or 3 digits after MCC, identifies the carrier within that country.
MNO
Mobile Network Operator. owns the actual cellular infrastructure. examples: Singtel, AIS, Verizon Wireless.
MVNO
Mobile Virtual Network Operator. resells capacity from an MNO under a different brand. e.g. Mint Mobile (US), Circles.Life (Singapore).
residential IP
depends on usage. originally meant home broadband ISP IPs. now also used loosely for “non-datacenter” IPs including some mobile IPs.
SIM
Subscriber Identity Module. the chip that authenticates a device on a cellular network. cloud phones with real SIMs expose real mobile carrier IPs.
TLS fingerprint
the unique pattern of a TLS handshake from a specific client stack. used to identify what software is making a connection. emulators sometimes have non-standard TLS fingerprints.
VPN
Virtual Private Network. routes OS-level traffic through a remote server. changes IP only. does not change device fingerprint.
detection and fingerprinting
anti-detect browser
a desktop or mobile browser that creates isolated profiles, each with its own fingerprint. examples: Multilogin, Dolphin Anty, AdsPower.
attestation
cryptographic proof that a device is real and untampered. hardware-backed attestation uses keys baked into the device’s secure element.
device fingerprint
a composite identifier built from hardware, system, sensor, network, and behavior signals. used to identify a device across sessions.
emulator
software that runs the actual phone OS on a host machine. easier to detect than a real device. examples: Android Studio emulator, BlueStacks.
fingerprinting
the process of collecting signals from a device to build a unique identifier. modern apps fingerprint aggressively at startup and during use.
GPU vendor
the manufacturer of a device’s graphics processor (Mali, Adreno, PowerVR). real devices have real GPU vendor strings; emulators often expose SwiftShader or ANGLE.
root detection
apps checking whether a device is rooted. common in banking, fintech, and some social platforms.
SafetyNet
predecessor to Play Integrity. now deprecated.
simulator
software that mimics a phone OS at a high level without running real OS code. example: iOS Simulator on macOS.
cloud phone specifics
admin dashboard
the web interface a cloud phone administrator uses to manage devices, users, and policies.
bulk provisioning
provisioning many cloud phones at once via a CSV or API call. used by teams launching campaigns or onboarding new users at scale.
cloud phone
a real Android device in a datacenter, controlled remotely. distinct from emulator (software) and simulator (high-level mimic).
device pool
a group of cloud phones shared across multiple users. typically used by QA teams. users check out a device, use it, return it.
lease
the period during which a user has exclusive access to a cloud phone from a shared pool. typically 1 to 24 hours.
provisioning
setting up a new cloud phone with the right OS version, locale, apps, and account assignments.
session recording
video capture of a cloud phone session, optionally with metadata streams for QA review.
snapshot
a point-in-time backup of a cloud phone’s state. usually takes seconds to minutes. used for restore after a bad change.
template
a saved configuration profile (locale, time zone, apps, settings) that can be applied to many cloud phones consistently.
tier
a pricing level for a cloud phone, typically defined by device specs, included bandwidth, and feature access.
utilization
session hours divided by available hours. measures how much of a device’s capacity is actually being used.
operations
account warming
the practice of using a new account gently for days or weeks before driving heavy traffic, to build trust signals with the platform.
audit log
a record of every action taken on a cloud phone fleet (provision, delete, login, settings change). used for compliance and forensics.
fleet
the set of cloud phones an admin manages.
multi-account
operating multiple accounts on the same platform. requires per-account device and IP isolation in 2026.
RBAC
Role-Based Access Control. system for assigning permissions based on user roles (admin, user, viewer).
seat
a user account with access to the cloud phone fleet. usually billed per seat per month.
SLA
Service Level Agreement. the vendor’s contractual commitment on uptime and support response.
try a cloud phone
if you have made it to the end of the glossary, the easiest next step is to actually use one. cloudf.one offers a one-hour free trial on a real Singapore Android device, no credit card required. you will encounter several of these terms in the dashboard.
cloud phone vs simulator vs emulator: a 2026 framework and cloud phone vs VPN vs proxy: stack guide for 2026 are the next-deepest reads on the comparison terms in this glossary.
the Android Developers fundamentals documentation is the authoritative reference for the Android-side terminology.
frequently asked questions
what is the most important term for a buyer to understand?
ASN. it is what platforms check first when classifying an IP. mobile carrier ASN is what cloud phones with real SIMs expose, and it is what makes the value proposition work.
is “residential IP” the same as “mobile IP”?
different. residential IP usually means home broadband ISP. mobile IP means cellular carrier. both are “real user IPs” but they are different categories.
what is the difference between fingerprinting and Play Integrity?
fingerprinting is collecting signals to identify a device. Play Integrity is a specific cryptographic attestation API that proves the device is real hardware. Play Integrity is one input to broader fingerprinting.
what is the difference between a snapshot and a backup?
interchangeable in casual use. technically, a snapshot is a point-in-time delta against the previous snapshot (cheap and fast). a backup is usually a complete copy (larger and slower).
why does CGNAT matter?
it is what makes mobile IPs trustworthy. CGNAT shares one public IP across many real subscribers, so platforms cannot blanket-ban a mobile IP without affecting real users.