Computer plans, in the shape of firmware or computer software, that empower utilized wi-fi phone handsets to connect with a wi-fi telecommunications network, when circumvention is initiated with the proprietor of your duplicate of the computer program exclusively so as to connect with a wireless telecommunications network and entry to the community