• twix@infosec.pub
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    11 months ago

    Well, on the other hand, do you just understand how simple cards work? I for sure don’t and I don’t see why I would need a chip from my provider to access it’s services, if I can get a digital key instead.

    • Auli@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      11 months ago

      I like that I can switch phones with a physical card. IPhone to android still no way.

      • Clent@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        My understanding of this is that the hardware vendor has a pool eSims that work on their devices. The eSIM “transfer” is actually a new eSIM from the carrier’s pool and their simply transfer the emei over to the new eSIM so there shouldn’t be a reason these cannot be transferred between iPhone and Android other than service providers needing to support it.

    • Empricorn@feddit.nl
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      11 months ago

      As I understand it (I’ve done literally zero research), it’s to prevent spam/spoofing, at least in the US. With a physical card, you can’t just instantly convert your phone to a different number and carrier. Now, with all the robocalls I get, there’s obviously still more work to be done…

      • Auli@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        11 months ago

        Spoofing what? Imei numbers? Phone number spoofing is not solved by this. With VOIP you can literally tell it to send whatever number you want to be its caller I’d.

        • ColeSloth@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          5
          ·
          11 months ago

          Not that simple type of spoofing. The kind where I could set up a phone with your number on your network that the network thinks is yours and then intercept your incoming calls and text messages. Including being able to get your security texts to verify who you are when I would change your passwords, emails, banking info, stock accounts, etc.