This should be far more secure and privacy friendly than a Sim card of a cellular connection. Why isn’t this done more often? What are the Pros and Cons. I bet the price is similar as well.

      • @delirious_owl@discuss.online
        link
        fedilink
        3
        edit-2
        3 months ago

        SIM cards are a computing device that can execute closed source code on your device, sent from a cell tower

        Most of the zero days used by NSO Group that were reported by Citizen Lab only worked if you had a SIM card. By eliminating SIM cards, you decrease the surface area of attack by magnitudes

        • @NomenCumLitteris@lemmy.ml
          link
          fedilink
          23 months ago

          Thanks for enlightening me. That is certainly concerning. I am not knowledgable enough to say if eSIM would be outside the scope of that attack. There are some differences in how the tech is implemented, but heck my eSIM still connects to the cell tower at the end of the day (and to multiple carriers, at that, unlike physical SIM). If there is a surface area, there is a chance for attack vectors.