this post was submitted on 19 Sep 2024
57 points (95.2% liked)
Privacy
31932 readers
911 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You can keep your cell number with jmp.chat. Call over wifi or data. They offer eSIM. View text messages on any device/program with XMPP support. 2FA works 100% like normal unlike VoIP. All data, calls, texts are routed through their VPN first, then the cell network. Any other inhouse XMPP chat not going to networks stay within XMPP. I have no affiliation with jmp.chat, I am satisfied with the service.
I would switch to jmp immediately if only it were available in Germany.
I could see this being a problem for me
How do you deal with it?
That is true, but there is a good reason. For example, you may call 911 in North America without any cell plan, or without a SIM. As you long as you are within physical range of any cell tower (whether your phone shows bars or not) the 911 call will go through. This is required by law. So, like your quoted text indicates, 911 calls would just need to be routed through your phone's native dialer instead of, let's say, Cheogram's dialer (jmp.chat's phone/message app).
Ohh I see.
Is an eSIM vulnerable to the same security risks as a physical SIM?
What security risks are you considering for physical SIM?
SIM cards are a computing device that can execute closed source code on your device, sent from a cell tower
Most of the zero days used by NSO Group that were reported by Citizen Lab only worked if you had a SIM card. By eliminating SIM cards, you decrease the surface area of attack by magnitudes
Thanks for enlightening me. That is certainly concerning. I am not knowledgable enough to say if eSIM would be outside the scope of that attack. There are some differences in how the tech is implemented, but heck my eSIM still connects to the cell tower at the end of the day (and to multiple carriers, at that, unlike physical SIM). If there is a surface area, there is a chance for attack vectors.