87

Compared to regular SIM cards.

SIMs are easier to swap if needing to switch phone, but I only see this as a convenience. I don't see why it would be more private.

I have little knowledge on how eSIMs work, but something in the back of my mind, tells me that somehow, eSIMs are bad for privacy :(

Anybody care to share their views on this?

you are viewing a single comment's thread
view the rest of the comments
[-] PeachMan@lemmy.one 28 points 1 year ago

All of your mobile traffic goes through your carrier. Assume that none of it is private, unless you're taking privacy measures like a trusted VPN.

I don't see how an eSIM is any worse than a SIM.

[-] online@programming.dev 14 points 1 year ago

Totally.

I guess the privacy advantage of a regular SIM is that as soon as you pop out the sim card out of your phone, towers can't track you anymore.

With eSIMs on the other hand, I can never truly trust that an eSIM is de-activated? Feels like you actually just have a permanent sim card in your phone and your phone can just be tracked no matter the status of your eSIM. Or is this not technically possible?

[-] Cheradenine@sh.itjust.works 16 points 1 year ago

Towers can still track you by the IMEI number.

One of the suspects in the Bali bombings was caught because while they frequently changed Sims, they didn't change devices. They were tracked by the IMEI.

[-] nottheengineer@feddit.de 8 points 1 year ago

That's correct. Iphones are especially vulnerable to that since they don't shut down all the way and always keep some radios enabled. Android devices will generally shut down properly.

But in any case, do you really need to worry about tracking by a carrier? Locating a phone is possible but not easy and usually only happens when it's specifically requested by the police.

If that's your threat level, you probably don't want to own a phone at all.

[-] regalia@literature.cafe 5 points 1 year ago

You can erase the eSim. You can also turn it off, but I'm not sure to what extent is it disabled.

[-] OmnipotentEntity@beehaw.org 4 points 1 year ago

If a phone can track you with a deactivated eSIM then it can also track you without a SIM, by just also giving you a secret eSIM for use when your regular SIM is missing, and then simply lying to you about it.

[-] Raisin8659@monyet.cc 4 points 1 year ago

Turn it off and put it in a Faraday-cage bag.

[-] ReversalHatchery@beehaw.org 3 points 1 year ago

And now I have an expensive brick, as I can't use it. Thanks.

[-] oo1@kbin.social 3 points 1 year ago

look on the bright side; if you get a few more, you could build an expensive wall

[-] PeachMan@lemmy.one 3 points 1 year ago* (last edited 1 year ago)

The SIM is just an identifier. There's nothing particularly special on a SIM card, that's why the switch to eSIM has happened so seamlessly. So, you're right; it's totally POSSIBLE that an eSIM could stick around if you delete. But it's also possible that your phone could save the info on a SIM card.

For the record, I don't think that's likely. Your phone's operating system (iPhone or Android) is built by a different company than the carriers that presumably want to track you. I doubt they're secretly colluding with carriers, because Apple and Google (especially Google) have enormous business models built around tracking you, and profiting off your data.

load more comments (6 replies)
this post was submitted on 02 Sep 2023
87 points (100.0% liked)

Privacy Guides

16263 readers
50 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS