Compared to regular SIM cards.

SIMs are easier to swap if needing to switch phone, but I only see this as a convenience. I don’t see why it would be more private.

I have little knowledge on how eSIMs work, but something in the back of my mind, tells me that somehow, eSIMs are bad for privacy :(

Anybody care to share their views on this?

@PeachMan@lemmy.one
link
fedilink
English
281Y

All of your mobile traffic goes through your carrier. Assume that none of it is private, unless you’re taking privacy measures like a trusted VPN.

I don’t see how an eSIM is any worse than a SIM.

@HughJanus@lemmy.ml
link
fedilink
English
41Y

Really not helpful

@PeachMan@lemmy.one
link
fedilink
English
11Y

OP disagrees

@Scolding7300@lemmy.world
link
fedilink
English
4
edit-2
1Y

What other info can help distinguish between regular sims and esims in terms of privacy?

Or alternatively what’s missing from thecomments?

Asking, not trying to challenge you, I’m honestly trying to learn

@HughJanus@lemmy.ml
link
fedilink
English
11Y

What other info can help distinguish between regular sims and esims in terms of privacy?

Don’t know but OP asked a very specific question and this person gave a very generic answer that didn’t address the question that was asked at all.

@online@programming.dev
creator
link
fedilink
English
141Y

Totally.

I guess the privacy advantage of a regular SIM is that as soon as you pop out the sim card out of your phone, towers can’t track you anymore.

With eSIMs on the other hand, I can never truly trust that an eSIM is de-activated? Feels like you actually just have a permanent sim card in your phone and your phone can just be tracked no matter the status of your eSIM. Or is this not technically possible?

@PeachMan@lemmy.one
link
fedilink
English
3
edit-2
1Y

The SIM is just an identifier. There’s nothing particularly special on a SIM card, that’s why the switch to eSIM has happened so seamlessly. So, you’re right; it’s totally POSSIBLE that an eSIM could stick around if you delete. But it’s also possible that your phone could save the info on a SIM card.

For the record, I don’t think that’s likely. Your phone’s operating system (iPhone or Android) is built by a different company than the carriers that presumably want to track you. I doubt they’re secretly colluding with carriers, because Apple and Google (especially Google) have enormous business models built around tracking you, and profiting off your data.

@Raisin8659@monyet.cc
link
fedilink
English
41Y

Turn it off and put it in a Faraday-cage bag.

And now I have an expensive brick, as I can’t use it. Thanks.

oo1
link
fedilink
31Y

look on the bright side; if you get a few more, you could build an expensive wall

regalia
link
fedilink
English
51Y

You can erase the eSim. You can also turn it off, but I’m not sure to what extent is it disabled.

Towers can still track you by the IMEI number.

One of the suspects in the Bali bombings was caught because while they frequently changed Sims, they didn’t change devices. They were tracked by the IMEI.

That’s correct. Iphones are especially vulnerable to that since they don’t shut down all the way and always keep some radios enabled. Android devices will generally shut down properly.

But in any case, do you really need to worry about tracking by a carrier? Locating a phone is possible but not easy and usually only happens when it’s specifically requested by the police.

If that’s your threat level, you probably don’t want to own a phone at all.

If a phone can track you with a deactivated eSIM then it can also track you without a SIM, by just also giving you a secret eSIM for use when your regular SIM is missing, and then simply lying to you about it.

Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 4 users / day
  • 34 users / week
  • 91 users / month
  • 1.14K users / 6 months
  • 1 subscriber
  • 661 Posts
  • 11.1K Comments
  • Modlog