this post was submitted on 02 May 2026
1012 points (99.4% liked)

Technology

84281 readers
5009 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] stoy@lemmy.zip 46 points 14 hours ago (3 children)

I saw a Defcon talk about SIM cards a few years ago, really interesting stuff.

Most people treat SIM cards as just an ID to get on a carrier's network, but they are soo much more.

When SIM cards were developed, they were designed to be the core of your phone, your handset would be just that, handset that would only run the software on the SIM card.

SIM cards are small computers, they have a CPU, RAM and storage, they can run apps on the SIM card itself and only present the UI to the phone.

With my first phones, I remember the contacts being stored on the SIM card itself, it usually took 30-60 sec to load them after a phone restart. But bloody convenient when switching phones, this was way before iCloud and other similar services, and moving your SIM card moved all your contacts as well.

Since SIM cards are controlled by the operator, they can do stuff that might surprise you, they can act as a trusted source for signing/encrypting/storing data, the user does not have direct access to tamper with the chip, so security apps have been developed to run on SIM cards, I don't know the current status on this, but in countries with limited/older infrastructure, this was used for bank security apps, since the SIM is a locked down system, you can use it to securely store a key, and have the SIM use the key to generate a token, sign requests and even encrypt data, all without the key leaving the SIM.

Here is the talk I mentioned:

https://youtu.be/31D94QOo2gY

[–] lechekaflan@lemmy.world 2 points 5 hours ago

SIM cards are small computers, they have a CPU, RAM and storage, they can run apps on the SIM card itself and only present the UI to the phone.

Someone once managed to contain a very small webserver in it.

[–] MalReynolds@slrpnk.net 6 points 12 hours ago

Also the baseband chip for 4G/5G is yet another self contained computer you don't control. Shit's egregious.

[–] UndulyUnruly@lemmy.world 7 points 14 hours ago

Thanks for the video link.