← back to blog

cloud phone glossary: 50 terms every buyer should know

May 07, 2026

cloud phone glossary terms get thrown around in vendor pitches, comparison articles, and Reddit threads as if everyone already knows what they mean. they often do not. the terminology around cloud phones touches mobile networking, Android internals, fraud detection, and SaaS billing, and most buyers come from one of those backgrounds rather than all four.

this article defines 50 terms a cloud phone buyer should know. each definition is short and practical, biased toward “what you need to make a buying decision” rather than encyclopedic accuracy. terms are grouped loosely by topic.

device and hardware

Android

the open-source operating system developed by Google that runs on most non-Apple smartphones. cloud phones run real Android, not a simulator or emulator.

AOSP

Android Open Source Project. the public codebase Google releases that vendors customize for their devices. cloud phones may run AOSP, vendor-customized Android (Samsung One UI, MIUI), or vendor-stripped builds.

Build properties

system constants exposed by Android via Build.HARDWARE, Build.MODEL, Build.MANUFACTURER. used by apps to identify the device type. real devices have consistent values; emulators often have telltale strings like “ranchu”.

IMEI

International Mobile Equipment Identity. 15-digit unique identifier baked into a device’s cellular hardware. real cloud phones have real IMEIs allocated to real device manufacturers.

Magisk

a popular Android root tool that hides root status from apps. cloud phones generally do not need Magisk because they run unrooted Android by default.

Play Integrity

Google’s hardware-backed device attestation API. apps use it to verify they are running on real, untampered Android hardware. cloud phones pass Play Integrity; emulators usually do not.

Play Protect

Google Play’s built-in malware scanner. it can flag and uninstall apps it considers risky, including some sideloaded APKs. operators sometimes disable it for specific workloads.

root

elevated privileges on Android, equivalent to administrator on a desktop OS. rooted devices are over-represented in fraud datasets and detected by many serious apps.

sideload

installing an APK directly without going through the Play Store. sideloaded apps trip more detection signals than Play Store installs.

Samsung Galaxy

a popular line of Android devices from Samsung. many cloud phone providers use Galaxy devices because they are widely deployed and platforms expect to see them.

networking

APN

Access Point Name. the configuration that tells a phone how to connect to its carrier’s data network. real SIMs use real APNs; virtualized networking does not.

ASN

Autonomous System Number. unique identifier for a network on the internet. fraud systems classify IPs by ASN type (mobile, ISP, datacenter, VPN).

CGNAT

Carrier-Grade Network Address Translation. allows many subscribers to share one public IP. normal for mobile networks. mobile IPs without CGNAT look unusual.

datacenter IP

an IP from a cloud or hosting provider (AWS, DigitalOcean). easy for platforms to identify. usually low-trust for fraud detection.

IMSI

International Mobile Subscriber Identity. unique identifier on a SIM card. encodes country (MCC) and carrier (MNC).

MCC

Mobile Country Code. first 3 digits of an IMSI, identifies the country. e.g. 525 is Singapore.

MNC

Mobile Network Code. 2 or 3 digits after MCC, identifies the carrier within that country.

MNO

Mobile Network Operator. owns the actual cellular infrastructure. examples: Singtel, AIS, Verizon Wireless.

MVNO

Mobile Virtual Network Operator. resells capacity from an MNO under a different brand. e.g. Mint Mobile (US), Circles.Life (Singapore).

residential IP

depends on usage. originally meant home broadband ISP IPs. now also used loosely for “non-datacenter” IPs including some mobile IPs.

SIM

Subscriber Identity Module. the chip that authenticates a device on a cellular network. cloud phones with real SIMs expose real mobile carrier IPs.

TLS fingerprint

the unique pattern of a TLS handshake from a specific client stack. used to identify what software is making a connection. emulators sometimes have non-standard TLS fingerprints.

VPN

Virtual Private Network. routes OS-level traffic through a remote server. changes IP only. does not change device fingerprint.

detection and fingerprinting

anti-detect browser

a desktop or mobile browser that creates isolated profiles, each with its own fingerprint. examples: Multilogin, Dolphin Anty, AdsPower.

attestation

cryptographic proof that a device is real and untampered. hardware-backed attestation uses keys baked into the device’s secure element.

device fingerprint

a composite identifier built from hardware, system, sensor, network, and behavior signals. used to identify a device across sessions.

emulator

software that runs the actual phone OS on a host machine. easier to detect than a real device. examples: Android Studio emulator, BlueStacks.

fingerprinting

the process of collecting signals from a device to build a unique identifier. modern apps fingerprint aggressively at startup and during use.

GPU vendor

the manufacturer of a device’s graphics processor (Mali, Adreno, PowerVR). real devices have real GPU vendor strings; emulators often expose SwiftShader or ANGLE.

root detection

apps checking whether a device is rooted. common in banking, fintech, and some social platforms.

SafetyNet

predecessor to Play Integrity. now deprecated.

simulator

software that mimics a phone OS at a high level without running real OS code. example: iOS Simulator on macOS.

cloud phone specifics

admin dashboard

the web interface a cloud phone administrator uses to manage devices, users, and policies.

bulk provisioning

provisioning many cloud phones at once via a CSV or API call. used by teams launching campaigns or onboarding new users at scale.

cloud phone

a real Android device in a datacenter, controlled remotely. distinct from emulator (software) and simulator (high-level mimic).

device pool

a group of cloud phones shared across multiple users. typically used by QA teams. users check out a device, use it, return it.

lease

the period during which a user has exclusive access to a cloud phone from a shared pool. typically 1 to 24 hours.

provisioning

setting up a new cloud phone with the right OS version, locale, apps, and account assignments.

session recording

video capture of a cloud phone session, optionally with metadata streams for QA review.

snapshot

a point-in-time backup of a cloud phone’s state. usually takes seconds to minutes. used for restore after a bad change.

template

a saved configuration profile (locale, time zone, apps, settings) that can be applied to many cloud phones consistently.

tier

a pricing level for a cloud phone, typically defined by device specs, included bandwidth, and feature access.

utilization

session hours divided by available hours. measures how much of a device’s capacity is actually being used.

operations

account warming

the practice of using a new account gently for days or weeks before driving heavy traffic, to build trust signals with the platform.

audit log

a record of every action taken on a cloud phone fleet (provision, delete, login, settings change). used for compliance and forensics.

fleet

the set of cloud phones an admin manages.

multi-account

operating multiple accounts on the same platform. requires per-account device and IP isolation in 2026.

RBAC

Role-Based Access Control. system for assigning permissions based on user roles (admin, user, viewer).

seat

a user account with access to the cloud phone fleet. usually billed per seat per month.

SLA

Service Level Agreement. the vendor’s contractual commitment on uptime and support response.

try a cloud phone

if you have made it to the end of the glossary, the easiest next step is to actually use one. cloudf.one offers a one-hour free trial on a real Singapore Android device, no credit card required. you will encounter several of these terms in the dashboard.

start the free trial →

cloud phone vs simulator vs emulator: a 2026 framework and cloud phone vs VPN vs proxy: stack guide for 2026 are the next-deepest reads on the comparison terms in this glossary.

the Android Developers fundamentals documentation is the authoritative reference for the Android-side terminology.

frequently asked questions

what is the most important term for a buyer to understand?

ASN. it is what platforms check first when classifying an IP. mobile carrier ASN is what cloud phones with real SIMs expose, and it is what makes the value proposition work.

is “residential IP” the same as “mobile IP”?

different. residential IP usually means home broadband ISP. mobile IP means cellular carrier. both are “real user IPs” but they are different categories.

what is the difference between fingerprinting and Play Integrity?

fingerprinting is collecting signals to identify a device. Play Integrity is a specific cryptographic attestation API that proves the device is real hardware. Play Integrity is one input to broader fingerprinting.

what is the difference between a snapshot and a backup?

interchangeable in casual use. technically, a snapshot is a point-in-time delta against the previous snapshot (cheap and fast). a backup is usually a complete copy (larger and slower).

why does CGNAT matter?

it is what makes mobile IPs trustworthy. CGNAT shares one public IP across many real subscribers, so platforms cannot blanket-ban a mobile IP without affecting real users.