Apple Watch owners had to deal with the issue of the electronic SIM card relatively early. A few years ago, anyone who wanted to fully use the Apple Watch with the red crown could not avoid activating the virtual SIM card. If telecom customers initially benefited from the new SIM card, the eSIM (embedded SIM) was gradually further integrated into the market. In this article, we want to take a closer look at the possibilities that eSIM reveals and how the SIM card of the future will work.
eSIM- This is how the soldered SIM card works
The eSIM was introduced seven years ago. One of the pioneers here is Apple. At that time, the group had to fight again with a small shit storm. “If it is not bad enough that the batteries in the iPhone and Co are firmly glued, it can now continue with the SIM card”, so the possible tenor. Seven years later, the eSIM is no longer uncommon, especially in smartphones in the upper price categories. Increasingly, use is also expected to shift to the middle class sector. The advantages of the eSIM are obvious. The mere fact that no slot for the SIM card is required not only allows greater device design leeway, but also makes the device less prone to mechanical defects, according to the manufacturers.
When an eSIM-supported device is delivered, the SIM card is already firmly inside as a component. As a result, the data, which can also be found on conventional SIM cards, is simply downloaded over the Internet. That was the big magic. According to the global industry association of mobile communications providers (GSMA), by 2025 just under a third l of the smartphones used around the world should be equipped with an eSIm. Although the providers are helped and mail can be avoided, the support of the eSim is still progressing a bit sluggishly. With a majority of the mobile phone providers and also with smart prepaid card tariffs, the embedded SIM cards can often even be exchanged free of charge or requested in addition. A creeping revolution that is worthwhile. Why? This is shown by a look at the possibilities of the virtual SIM card.
Graphene Layer Enables Hard Disks With A Capacity Of 100 Tbytes
The eSIM can enable many functions in the future
The eSIM not only makes it easier to change devices or mobile network providers, it can also save data, such as electronic ID cards. Since more and more devices are able to establish a connection to the Internet, eSIMs are also useful where the module with the corresponding kit group is not so easy to reach, so changing the SIM card is quite difficult. Larger industrial plants but also household appliances or motor vehicles would be conceivable. The soldered-on SIM card is then much easier to use. With a large number of IoT devices (internet of things), the eSIM is now indispensable. As a result, the classic SIM card has increasingly become obsolete. The electronic driver’s license or token for locking systems are further application scenarios.
Risk of SIM swapping
However, the eSIM technology also has a bitter aftertaste. As with many innovations that can be realized via the Internet, hackers are also on board. A very recent phenomenon is so-called SIM swapping. Here, hackers pretend to be their victims and use previously spied data to commit theft of the mobile phone number. Why steal the cell phone number? Because online banking accounts, shopping profiles and some other sensitive data are often linked to this. The hackers either get the data on the victims via social networks (social engineering), buy it on the DarkNet or use phishing emails. If the required data is available, the customer center of the mobile phone provider is informed that either the mobile phone, including SIM card have been lost or the existing contract is terminated and a new one with phone number portability is to be concluded. In both cases the number would almost be gone.
However, with a normal SIM card, the hackers would first have to wait for the post while the eSIM is activated via the Internet. The post with the conventional SIM can possibly result in an additional trace. How to protect yourself is explained The post with the conventional SIM can possibly result in an additional trace. How to protect yourself is explained The post with the conventional SIM can possibly result in an additional trace. How to protect yourself is explainedthe computer week was pretty good . In this case, the mobile network providers are obliged to close this security gap.
Leave a Reply