pull down to refresh

Follow-up (-ish) to #1087756 in the case of eSIMs

Convenient tech brings big bundle of security and privacy risks.

A security study has unearthed security concerns for travel embedded subscriber identity modules (eSIMs), showing that many providers route user data through foreign telecommunications networks without disclosing to customers that this is happening.
The list:
ProviderOriginPublic IPGeolocISP
AiraloUS/Singapore206.0.71.14Texas, USWEBBING USA, INC.
AIRSIMeHong Kong38.86.196.203Texas, USTelecom North America Inc
AlosimCanada147.28.187.8Texas, USEquinix Services, Inc.
Better RoamingUK146.88.208.55NY, USTruephone Inc
BNESIMHong Kong38.86.196.254Texas, USTelecom North America Inc
BreatheSIMIsle of Man195.10.99.99Isle of ManManx Telecom
CMLink eSIMChina223.118.51.111ChinaChina Mobile International Limited
DENTBritish Virgin Islands37.248.246.98PolandSPARKS
eSIM AccessChina206.0.69.143Texas, USWEBBING USA, INC.
EskimoSingapore111.65.35.51SingaporeSingTel Mobile
FlexiroamMalaysia206.0.69.106Texas, USWebbing USA
GigskyUS193.88.50.248DenmarkTDC NET
GoogleFiUS172.56.199.56User LocationT-Mobile
HolaflyIreland223.118.51.96ChinaChina Mobile International Limited
Maya MobileUS38.86.196.229Texas, USTelecom North America Inc
MTX ConnectLuxembourg45.153.104.4Oslo, NorwayNexthop AS
NomadUS192.178.240.193VA, USGoogle LLC
NumeroSpain154.54.12.114GermanyCogent Communications
RedTeaGoChina91.223.100.68EnglandO2 (UK)
SailyLithuania94.156.229.223NY, USSaily Inc.
T-mobileUS172.59.9.77UST-Mobile
UbigiFrance140.174.33.144NY, USTransatel
USIMSSwitzerland140.174.33.128NY, USTransatel
VoyeIsrael206.0.69.170Texas, USWEBBING USA, INC.
YesimSwitzerland37.248.248.86PolandSPARKS

There are many providers in here that I've been seeing ads for, most notably: Holafly is extensively marketed on European airlines and routes all traffic through China (!!!).
This looks like a surveillance nightmare!
Perhaps stackers can collaborate, as some of us use different providers not in scope of this research (I do so myself too) and we might be able to add valuable information.

PS: Cool eSIM comms capture device from the PDF:
Setup for capturing proactive communication: (a) iPhone 13, (b) sysmoEUICC1 for downloading the eSIM, (c) SIMtrace2 for capturing communication between the phone and the eSIM profile.
100 sats \ 2 replies \ @Scoresby 6h
I was wondering about something like this when you mentioned travel esims the other day.
might be able to add valuable information.
I've used esims from some of the providers who accept bitcoin. What sort of information would be helpful and how might I get started collecting it?
(Also, thanks for posting this article)
reply
102 sats \ 1 reply \ @optimism OP 6h
Since I've posted this, I've been looking for android traceroute apks but it looks like this has been blocked since android 10. I'm thinking of developing an APK for this myself if I can without needing root get ICMP packets.
reply
I think we can do this (for android)
reply
100 sats \ 1 reply \ @BlokchainB 7h
I don’t understand the threat here? Especially if I am an American.
reply
See the discussion I had with @Scoresby on his "trust ISP" post.
Without too much LARPing:
Imagine that you're a US normie and you use Gigsky, a US company, for your vacay to Mexico, because prepaid T-Mobile US is super-expensive outside of the US. Gigsky routes all traffic through Denmark. Now the EU logs all your metadata because that's an EU directive.
Do you use encrypted DNS? Does every app you have on your phone actually use proper encryption and not leak cleartext data? You're literally now being surveilled in Europe.
LARP time: Remember which EU country the US has threatened war against? Denmark, over Greenland. Unless you have such disdain for European people that you agree with Mr. Vance that they are all completely retarded, maybe they will pay extra attention to anyone from a country that has actively threatened their sovereignty with invasion?
reply
234 sats \ 1 reply \ @anon 6h
silent.link is missing - this is an israeli spysim
reply
That's why I put the little CTA... It shouldn't be too hard to get intel. I just want to know "how far" we can measure before I hack together an APK and public crowd sourced dataset
reply
100 sats \ 1 reply \ @m0wer 4h
Fuck...
What does LNVPN use in the back?
reply
Will test soon.
APN is sky.com Reverse IP for me goes to skybroadband.com (UK)
reply
100 sats \ 2 replies \ @Artilektt 4h
Thanks for this! I've mostly used HolaFly in the past but I think I'm gonna switch to Saily from nordvpn
reply
75 sats \ 1 reply \ @optimism OP 4h
Of course! Would still recommend using a VPN other than NordVPN on top (mullvad, proton)
reply
100 sats \ 0 replies \ @Artilektt 4h
Yup I run mullvad anyway 👍
reply
100 sats \ 3 replies \ @SwapMarket 6h
I am sure this is a result of more completive pricing. Just use a VPN you trust and only visit https sites, the networks won't see what you are doing.
reply
And don't install apks that you haven't reviewed the source for or at least ran through pcap for a while
reply
100 sats \ 1 reply \ @SwapMarket 6h
Why is this relevant for eSIMs? This is a generally sound advice. But even in Play Store there can be fraudulent apps, so better keep installs to a bare minimum and use web apps instead....
reply
It's relevant because you don't know what it's sending in cleartext.
reply
100 sats \ 0 replies \ @Kayzone 6h
That’s really concerning, convenience shouldn’t come at the cost of secretly exposing user data.
reply