Questions tagged [simcard]

A subscriber identity module, or SIM card, is a circuit used to store the IMSI number and associated key used as authentication on mobile telephony devices (for example mobile phones and tablets).

A subscriber identity module, or SIM card, is a circuit used to store the IMSI number and associated key used as authentication on mobile telephony devices (for example mobile phones and tablets).

Related reading

99 questions
35
votes
6 answers

How to protect against SIM swap scammers?

SIM swap occurs where the scammer uses phished information about you to request a SIM card replacement from your cell phone carrier, by tricking them into believing that it is you who is making the request for a SIM card replacement by passing their…
user610620
  • 536
  • 3
  • 10
23
votes
3 answers

A security concern I dicovered with simcard devices

Well, it all started when I wanted to take the sim card out of my tablet and I was about to shut it down so that I could take the simcard out. But then a thought raced through my mind, "What if I take out the simcard before I turn off the tablet and…
Jeffry
  • 231
  • 2
  • 3
23
votes
3 answers

Does the telecom provider need physical access to the SIM card to clone it?

In many dictatorships SIM card cloning is used by the police (working together with the telco) to spy on dissidents, journalists etc. Some people say that you need the authentication key on the SIM card to clone it so that physical access…
Pedro
  • 239
  • 2
  • 3
17
votes
3 answers

Real life examples of malware propagated by SIM cards?

The laptops in use at my company have SIM card slots, which are actually used by some of our users. I am threat modeling our devices, so I was wondering if there are any realistic exploits that can be used on these laptops, no matter if the users…
lauraaaaa
  • 173
  • 1
  • 4
10
votes
1 answer

Communication between SIM, baseband and application processor

I currently examine the hidden components of a smartphone, inspired by the research of Weinmann All your baseband belong to us and Karsten Nohl Rooting Sim Cards. According to Weinmann, the application processor (with Android e.g.) and the baseband…
PeteChro
  • 253
  • 2
  • 6
10
votes
1 answer

esim vs sim card, what is more secure?

I can read many different attack vectors like swapping and porting but not sure if all those attacks are relevant about eSIM, can you please explain what are a security risk and attack vectors that will target eSIM?
Filipon
  • 1,204
  • 10
  • 22
10
votes
3 answers

Can a SIM card propagate malware?

Is it possible that malware can infect a SIM card? What will happen when I insert the SIM card in another phone?
user108810
  • 111
  • 1
  • 1
  • 3
10
votes
3 answers

Why is my phone connection secure without a password when WiFi is not even with a password?

When I talk on the phone or send text messages, I never need to type a userid and password. But when I use WiFi I need to use a password. How is the phone connection secured without a password, and why is that method not used for WiFi?
user82913
9
votes
1 answer

simjacker: which SIMs are vulnerable?

simjacker.com looks like a pretty serious security issue with SIM cards. There's not much technical detail on their website though. And it'd be nice to be able to already know which SIMs are vulnerable. Unfortunately the S@T technical…
the
  • 1,841
  • 2
  • 16
  • 33
7
votes
3 answers

Are SIM proactive commands secure?

A SIM card can initiate some communication with a mobile device with so called "proactive commands" (chapter 6 of http://www.etsi.org/deliver/etsi_gts/11/1114/05.04.00_60/gsmts_1114v050400p.pdf). Using these commands, SIM card applet can request the…
vojta
  • 356
  • 4
  • 16
7
votes
2 answers

Can a caller "Hijack" your SIM information?

We have all heard them, rumors about people randomly calling you on your mobile phone number and asking you to confirm something by typing in a specific combination onto your dial pad (the rumor I'm referring to, specifically states 09# or…
Lighty
  • 2,368
  • 1
  • 23
  • 36
7
votes
2 answers

Can the police track my phone even if I remove the SIM card?

If the Police have your mobile phone number then I understand they can track your mobile phone. Now, I understand the mobile phone number is linked to the sim card but if you simply change the sim card does that stop the Police from tracking you?…
james cagney
  • 71
  • 1
  • 1
  • 2
6
votes
1 answer

SIM card - Cryptography

I would like to have general infos about crypto and commom SIM card in mobile phone(I know there may be different implementations, technos according to the operator...). Is crypto used only for authentication ? Is crypto used also for encryption ?…
crypto-learner
  • 697
  • 1
  • 7
  • 17
6
votes
1 answer

What software can be used to read data from smart cards?

I have recently got this smart card reader. In the description it says that it can be used to read data from fidelity smart cards, library cards, etc. The technical card compatibility support is as follows: Supported Smart card: microprocessor smart…
cybergeek654
  • 181
  • 1
  • 1
  • 4
6
votes
1 answer

I have a conceptual idea for a network that could obfuscate the geolocation of a mobile station. I would appreciate short, critical feedback

I am a student in network engineering, and I have a technical essay due on November 18th. I can choose the topic of the essay myself. I have a conceptual idea of a network that could help obfuscate the geolocation of a mobile device. If you could…
Magnus
  • 377
  • 2
  • 10
1
2 3 4 5 6 7