52
submitted 2 days ago by [email protected] to c/[email protected]

This should be far more secure and privacy friendly than a Sim card of a cellular connection. Why isn't this done more often? What are the Pros and Cons. I bet the price is similar as well.

you are viewing a single comment's thread
view the rest of the comments
[-] [email protected] 4 points 2 days ago

You can keep your cell number with jmp.chat. Call over wifi or data. They offer eSIM. View text messages on any device/program with XMPP support. 2FA works 100% like normal unlike VoIP. All data, calls, texts are routed through their VPN first, then the cell network. Any other inhouse XMPP chat not going to networks stay within XMPP. I have no affiliation with jmp.chat, I am satisfied with the service.

[-] [email protected] 1 points 17 hours ago

I could see this being a problem for me

Note: While JMP does provide phone numbers and voice/SMS features, it does not provide 911, 112, 999 or other emergency services over voice or SMS.

How do you deal with it?

[-] [email protected] 2 points 9 hours ago

That is true, but there is a good reason. For example, you may call 911 in North America without any cell plan, or without a SIM. As you long as you are within physical range of any cell tower (whether your phone shows bars or not) the 911 call will go through. This is required by law. So, like your quoted text indicates, 911 calls would just need to be routed through your phone's native dialer instead of, let's say, Cheogram's dialer (jmp.chat's phone/message app).

[-] [email protected] 1 points 5 hours ago
[-] [email protected] 2 points 2 days ago

I would switch to jmp immediately if only it were available in Germany.

[-] [email protected] 1 points 2 days ago

Is an eSIM vulnerable to the same security risks as a physical SIM?

[-] [email protected] 4 points 2 days ago

What security risks are you considering for physical SIM?

[-] [email protected] 3 points 2 days ago* (last edited 2 days ago)

SIM cards are a computing device that can execute closed source code on your device, sent from a cell tower

Most of the zero days used by NSO Group that were reported by Citizen Lab only worked if you had a SIM card. By eliminating SIM cards, you decrease the surface area of attack by magnitudes

[-] [email protected] 2 points 1 day ago

Thanks for enlightening me. That is certainly concerning. I am not knowledgable enough to say if eSIM would be outside the scope of that attack. There are some differences in how the tech is implemented, but heck my eSIM still connects to the cell tower at the end of the day (and to multiple carriers, at that, unlike physical SIM). If there is a surface area, there is a chance for attack vectors.

this post was submitted on 19 Sep 2024
52 points (94.8% liked)

Privacy

31279 readers
557 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS