Compared to regular SIM cards.

SIMs are easier to swap if needing to switch phone, but I only see this as a convenience. I don’t see why it would be more private.

I have little knowledge on how eSIMs work, but something in the back of my mind, tells me that somehow, eSIMs are bad for privacy :(

Anybody care to share their views on this?

12 points

All of your mobile traffic goes through your carrier. Assume that none of it is private, unless you’re taking privacy measures like a trusted VPN.

I don’t see how an eSIM is any worse than a SIM.

permalink
report
reply
6 points

Totally.

I guess the privacy advantage of a regular SIM is that as soon as you pop out the sim card out of your phone, towers can’t track you anymore.

With eSIMs on the other hand, I can never truly trust that an eSIM is de-activated? Feels like you actually just have a permanent sim card in your phone and your phone can just be tracked no matter the status of your eSIM. Or is this not technically possible?

permalink
report
parent
reply
3 points

You can erase the eSim. You can also turn it off, but I’m not sure to what extent is it disabled.

permalink
report
parent
reply
2 points

Turn it off and put it in a Faraday-cage bag.

permalink
report
parent
reply
9 points

Towers can still track you by the IMEI number.

One of the suspects in the Bali bombings was caught because while they frequently changed Sims, they didn’t change devices. They were tracked by the IMEI.

permalink
report
parent
reply
2 points
*

The SIM is just an identifier. There’s nothing particularly special on a SIM card, that’s why the switch to eSIM has happened so seamlessly. So, you’re right; it’s totally POSSIBLE that an eSIM could stick around if you delete. But it’s also possible that your phone could save the info on a SIM card.

For the record, I don’t think that’s likely. Your phone’s operating system (iPhone or Android) is built by a different company than the carriers that presumably want to track you. I doubt they’re secretly colluding with carriers, because Apple and Google (especially Google) have enormous business models built around tracking you, and profiting off your data.

permalink
report
parent
reply
2 points

Really not helpful

permalink
report
parent
reply
1 point

OP disagrees

permalink
report
parent
reply
3 points

The only thing it improves is data security which can in some extent resist against identity theft, financial fraud, etc. Does having an eSIM card improve my data security?

Yes, there are significant security benefits. An eSIM card cannot be stolen without stealing the phone, whereas removable SIM cards are sometimes stolen, and used in port out scams. That’s when identity thieves fraudulently swap stolen SIM cards into different phones to gain access to the victim’s calls and text messages. The thieves may then try to reset credentials and gain access to the victim’s financial and social media accounts.

For more information about SIM swapping, port out scams, cell phone cloning and subscriber fraud, see our consumer guide on cell phone fraud. https://www.fcc.gov/consumers/guides/esim-cards-faq

permalink
report
reply

Privacy Guides

!privacyguides@lemmy.one

Create post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

Community stats

  • 2

    Monthly active users

  • 177

    Posts

  • 553

    Comments