eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

211
active users

#sim

0 posts0 participants0 posts today
JdeB<p><a href="https://climatejustice.social/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> <a href="https://climatejustice.social/tags/NeverAgain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NeverAgain</span></a> <a href="https://climatejustice.social/tags/Sim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sim</span></a> Kern</p><p>"“Never Again Means Never Again For Anyone”: An Interview With Sim Kern" [ ± 1-3 min]<br>by Mother Jones<br>----- READ the interview at:<br>---&gt; “‘Never Again’ Means Never Again for Anyone”: An Interview With Sim Kern &lt;-<br>---&gt; motherjones.com/politics/2025/07/sim-kern-genocide-bad-palestine-book/ &lt;-</p><p><a href="https://www.youtube.com/shorts/ALFF3i3u0Gw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/shorts/ALFF3i3u0Gw</span><span class="invisible"></span></a> </p><p>Quote by MJ:<br>"Jul 16, 2025<br>Sim Kern never set out to become a face of anti-Zionist Judaism—the English teacher turned science fiction author and “BookTok”-er was just in the right place at the right time.<br>Facing, as the October 7 attacks unfolded, a social media feed they described as embodying “two contradictory realities” about Palestine, they started posting about it.<br>“If you didn’t give a fuck about what’s happening in Palestine until two days ago,” Kern said in their most viral video, “that is because you see Israelis as people, and you do not see Palestinians as people.”<br>Over the past year and a half, their social media presence has turned into an archive of video shorts breaking down history and misinformation, and covering genocide in Gaza, where Israel’s defense minister recently announced plans to move the remaining population into a closed camp built on the ruins of the city of Rafah. (The United Nations, Amnesty International, and leading Holocaust and genocide scholars have deemed Israel’s war in Gaza genocidal, charges also brought against the country’s government in an ongoing case before the International Court of Justice.)<br>The book, which ties scholarship with memoir in Kern’s distinctive TikTok voice, breaks down nine key talking points used to defend or obscure the Israeli government’s actions and how to respond. <br>“Perhaps the most fundamental and vital labor, of all liberatory organizing,” Kern writes, “is the act of explaining hard truths. In your own words. To your own people. As clearly and compellingly as possible. Over and over and over and over.”</p><p><a href="https://climatejustice.social/tags/NeverAgain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NeverAgain</span></a> <a href="https://climatejustice.social/tags/STOPtheGenocide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>STOPtheGenocide</span></a> <br><a href="https://climatejustice.social/tags/JUSTICEforHindRajab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JUSTICEforHindRajab</span></a> <a href="https://climatejustice.social/tags/JUSTICEforRifaatRadwan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JUSTICEforRifaatRadwan</span></a><br><a href="https://climatejustice.social/tags/LIFEfor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LIFEfor</span></a>#Netanyahu#Gallant#Gvir#Smotrich</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@stman" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stman</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@Sempf" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Sempf</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@LaF0rge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LaF0rge</span></a></span> yes.</p><p>Because physical SIMs, like any <em>"cryptographic chipcard"</em> (i.e. <span class="h-card" translate="no"><a href="https://social.nitrokey.com/@nitrokey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nitrokey</span></a></span> ) did all that fancy public/private crypto on silicon and unless that was compromizeable (which AFAICT always necessistated physical access to the <a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a>, espechally in pre-<a href="https://infosec.space/tags/OMAPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OMAPI</span></a> devices) the SIM wasn't <em>'cloneable'</em> and the weakest link always had been the <a href="https://infosec.space/tags/MNO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MNO</span></a> /.<a href="https://infosec.space/tags/MVNO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MVNO</span></a> issueing (may it be through <a href="https://infosec.space/tags/SocialHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialHacking</span></a> employees into <em><a href="https://infosec.space/tags/SimSwapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SimSwapping</span></a></em> or LEAs showng up with a warrant and demanding <em>"<a href="https://infosec.space/tags/LawfulInterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LawfulInterception</span></a>"</em>):</p><ul><li>These <em>"attack vectors"</em> were known and whilst <em>unfixable</em> they could at least be mitigated by i.e. <em>NEVER</em> using a <a href="https://infosec.space/tags/PhoneNumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhoneNumber</span></a> for anything <em>and/or</em> using anonymously obtained <a href="https://infosec.space/tags/SIMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIMs</span></a>. But more and more services like <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> did <a href="https://infosec.space/tags/regression" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regression</span></a> demanding <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PII</span></a> <em>and</em> more and more nations <em>criminalized</em> <a href="https://infosec.space/tags/AnonymousSimCards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnonymousSimCards</span></a> under utterly <a href="https://infosec.space/tags/cyberfacist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberfacist</span></a> &amp; <a href="https://infosec.space/tags/FalsePretenses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FalsePretenses</span></a>!</li></ul><p>Add to that the <em>regression</em> in flexibility: </p><p>Unlike a <a href="https://infosec.space/tags/SimCard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SimCard</span></a> which was designed as a <em>vendor-independent, <a href="https://infosec.space/tags/MultiVendor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MultiVendor</span></a>, <a href="https://infosec.space/tags/MultiProvider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MultiProvider</span></a>, device agnostic unit to facilitate the the <a href="https://infosec.space/tags/authentification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentification</span></a> and <a href="https://infosec.space/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> in <a href="https://infosec.space/tags/GSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSM</span></a> (and successor standards)</em>, <a href="https://infosec.space/tags/eSIMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIMs</span></a> act to restrict <a href="https://infosec.space/tags/DeviceFreedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeviceFreedom</span></a> and <a href="https://infosec.space/tags/ConsumerChoice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConsumerChoice</span></a>, which with shit like <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KYC</span></a> per <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a> (i.e. <a href="https://infosec.space/tags/Turkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Turkey</span></a> demands it after 90 days of roaming per year) und <a href="https://infosec.space/tags/lMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lMEI</span></a>-based <a href="https://infosec.space/tags/Allowlisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Allowlisting</span></a> (see <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>'s shitty <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> + <a href="https://infosec.space/tags/2G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2G</span></a> &amp; <a href="https://infosec.space/tags/3G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>3G</span></a> shutdown!) are just acts to clamp down on <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://infosec.space/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>.</p><ul><li>And with <a href="https://infosec.space/tags/EID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EID</span></a> being unique per <a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> (like the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a> on top!) there's nothing stopping <a href="https://infosec.space/tags/cyberfacist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberfacist</span></a> regimes like <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>, <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>, <a href="https://infosec.space/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a>, ... from banning <em>"<a href="https://infosec.space/tags/eSIMcards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIMcards</span></a>"</em> (<a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> in SIM card form factor) or entire device prefixes (i.e. all phones that are supported by <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> ), as M(V)NOs see the EID used to deploy/activate a profile (obviously they don't want people to activate eSIMs more than once, <em>unless explicitly allowed otherwise</em>.</li></ul><p>"[…] [Technologies] must <em>always</em> be evaluated for their ability to oppress. […] </p><ul><li>Dan Olson</li></ul><p>And now you know why I consider a <a href="https://infosec.space/tags/smartphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smartphone</span></a> with eSIM instead of two SIM slots not as a <em>real</em> <a href="https://infosec.space/tags/DualSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualSIM</span></a> device because it restricts my ability to freely move devices.</p><ul><li>And whilst German Courts reaffirmed §77 TKG (Telco Law)'s mandate to letting people choose their devices freely, (by declarong <a href="https://infosec.space/tags/fees" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fees</span></a> for reissue of eSIMs illegal) that is only <em>enforceable towards M(V)NOs who are in <a href="https://infosec.space/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a></em>, so <em>'good luck'</em> trying to enforce that against some overseas roaming provider.</li></ul><p>Thus <a href="https://infosec.space/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> attacks in GSM-based networks are easier than ever before which in the age of <em>more skilled than ever</em> <a href="https://infosec.space/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> and <a href="https://infosec.space/tags/Cyberterrorists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberterrorists</span></a> (i.e. <a href="https://infosec.space/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> &amp; <a href="https://infosec.space/tags/Roskomnadnozr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roskomnadnozr</span></a>) puts espechally the average <em><a href="https://infosec.space/tags/TechIlliterate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterate</span></a> User</em> at risk.</p><ul><li>I mean, anyone else remember the <a href="https://infosec.space/tags/Kiddies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kiddies</span></a> that <em>fucked around</em> with <a href="https://infosec.space/tags/CIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIA</span></a> director <a href="https://infosec.space/tags/Brennan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Brennan</span></a>? Those were just using their <em>"weapons-grade <a href="https://infosec.space/tags/boredom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>boredom</span></a>"</em>, not being effective, for-profit cyber criminals!</li></ul><p>And then think about those who don't have <em>privilegued access</em> to <em>protection</em> by their government, but rather <em>"privilegued access" to prosecution</em> by the state <em>because their very existance is criminalized...</em></p> <p>The only advantage eSIMs broight in contrast is <em>'logistical' convenience</em> because it's mostly a <a href="https://infosec.space/tags/QRcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QRcode</span></a> and that's just a way to avoid typos on a cryptic <a href="https://infosec.space/tags/LocalProfileAgent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalProfileAgent</span></a> link.</p>
UK<p><a href="https://www.europesays.com/uk/257901/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/257901/</span><span class="invisible"></span></a> French beginning to surrender on ADSL <a href="https://pubeurope.com/tags/5G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> <a href="https://pubeurope.com/tags/adsl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adsl</span></a> <a href="https://pubeurope.com/tags/arcep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arcep</span></a> <a href="https://pubeurope.com/tags/copper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>copper</span></a> <a href="https://pubeurope.com/tags/Fibre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fibre</span></a> <a href="https://pubeurope.com/tags/Internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Internet</span></a> <a href="https://pubeurope.com/tags/sim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sim</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@LaF0rge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LaF0rge</span></a></span> yeah, that I did figure out with the whole <a href="https://infosec.space/tags/GSMA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSMA</span></a> signing chain.</p><ul><li>The few <em>"vendor independent"</em> options I've seen were mere <em>eSIM management</em> tools at the <a href="https://github.com/EsimMoe/MiniLPA" rel="nofollow noopener" target="_blank">LPA</a> / <a href="https://github.com/creamlike1024/EasyLPAC" rel="nofollow noopener" target="_blank">LPAC</a> level and subsequent <a href="https://infosec.space/tags/Apps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apps</span></a> from companies that sell <a href="https://infosec.space/tags/eSIMcards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIMcards</span></a> (aka. <a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> in Triple-<a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a> form factor) like <a href="https://infosec.space/tags/5ber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5ber</span></a>, <a href="https://infosec.space/tags/EIOTCLUB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EIOTCLUB</span></a>, <a href="https://infosec.space/tags/9e" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>9e</span></a> and others...</li></ul><p>These do in fact work and I guess having something like <a href="https://codeberg.org/lucaweiss/lpa-gtk" rel="nofollow noopener" target="_blank"><code>lpa-gtk</code></a> that can be remotely told to deploy/switch eSIMs is the closest to <a href="https://infosec.space/@kkarhan/114795901857462897" rel="nofollow noopener" target="_blank">what I'm looking for</a> that will be possible in the walled maze that GSMA forces everyone to walk through as they don't allow people to roll their own CI/CA and exercise control.</p><ul><li>Granted as you hinted in your talk the reliance on having public internet access <em>kinda</em> defeats the purpose of a WWAN connectivity like 5G/4G/3G/2G so at best it allows for dynamically (with interruption) switch between eSIMs based off the current traffic pattern (i.e. from a narrowband flatrate or no base rate pay-as-you-go to a broadband flatrate or cheaper per-traffic plan).</li></ul><p>Fortunately I don't even need like <em>legacy services</em> like Voice/SMS and a phone number so it's easy to obtain eSIMs for that which neither expire nor incure standby fees.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> so I guess <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> / <a href="https://infosec.space/tags/Fairphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fairphone</span></a> did not partner with <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> / <a href="https://infosec.space/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> nor did they reverse their <a href="https://infosec.space/tags/FeatureRegression" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FeatureRegression</span></a> since <a href="https://infosec.space/tags/Fairphone3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fairphone3</span></a> (removal of 3,5mm jack, removal of 2nd <a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a> slot because <a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> is not real <a href="https://infosec.space/tags/DualSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualSIM</span></a>!) ?</p>
Andreas Sebayang<p>So, der große SIM-Karten-Reiseführer für Südkorea ist fertig. Wer lieber eine lokale (e)SIM haben möchte, bekommt bei der Einreise viele Angebote. Auch mit Leihrouter. Manchmal sogar Kombiangebote, wenn man länger online bleiben will. Es gibt etwa eine T-Money-Karte oder auch Nudeln. 😁 </p><p><a href="https://chaos.social/tags/reisesim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reisesim</span></a> <a href="https://chaos.social/tags/sim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sim</span></a> <a href="https://chaos.social/tags/esim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>esim</span></a> <a href="https://chaos.social/tags/s%C3%BCdkorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>südkorea</span></a> </p><p><a href="https://www.handyhase.de/magazin/suedkorea-sim-karte-esim/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">handyhase.de/magazin/suedkorea</span><span class="invisible">-sim-karte-esim/</span></a></p>
Le Bottin des Jeux Linux<p>🕹️ Title: Theme Hospital (with CorsixTH engine)<br>🦊️ What's: A satyric-themed hospital management game &amp; a libre engine<br>🏡️ <a href="https://corsixth.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">corsixth.com/</span><span class="invisible"></span></a><br>🐣️ <a href="https://github.com/CorsixTH" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/CorsixTH</span><span class="invisible"></span></a><br>🔖 <a href="https://floss.social/tags/LinuxGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxGaming</span></a> <a href="https://floss.social/tags/ShareYourGames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShareYourGames</span></a> <a href="https://floss.social/tags/Management" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Management</span></a> <a href="https://floss.social/tags/Sim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sim</span></a><br>📦️ <a href="https://floss.social/tags/LibreEngine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibreEngine</span></a> <a href="https://floss.social/tags/CommercialAssets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CommercialAssets</span></a> <a href="https://floss.social/tags/Arch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arch</span></a> <a href="https://floss.social/tags/RPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPM</span></a> <a href="https://floss.social/tags/Deb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deb</span></a> <a href="https://floss.social/tags/Flatpak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flatpak</span></a> <a href="https://floss.social/tags/Snap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Snap</span></a><br>📕️ <a href="https://lebottinlinux.vps.a-lec.org/LO.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lebottinlinux.vps.a-lec.org/LO</span><span class="invisible">.html</span></a></p><p>🥁️ Update: 0.69 Beta2<br>⚗️ Signific. vers. 🦍️💎💎👄️🐞️🐞️<br>📌️ Changes: <a href="https://github.com/CorsixTH/CorsixTH/releases" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/CorsixTH/CorsixTH/r</span><span class="invisible">eleases</span></a><br>🦣️ From: 🛜️ <a href="https://github.com/CorsixTH/CorsixTH/releases.atom" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/CorsixTH/CorsixTH/r</span><span class="invisible">eleases.atom</span></a></p><p>🎲️ <a href="https://www.youtube.com/embed/rP0GMdoHmWM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/embed/rP0GMdoHmWM</span><span class="invisible"></span></a><br>🎲️ <a href="https://www.youtube.com/embed/?list=PLX9TPVcxrORM6UQy8D_FONa6kdXkBn4HT" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/embed/?list=PLX9TP</span><span class="invisible">VcxrORM6UQy8D_FONa6kdXkBn4HT</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fedifreu.de/@cryptgoat" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cryptgoat</span></a></span> ja, nur ist es quasi illegal <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> / <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> <a href="https://infosec.space/tags/anonym" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonym</span></a> (also faktisch nur <a href="https://infosec.space/tags/pseudonym" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pseudonym</span></a>, weil stets korrelierbar qua <a href="https://infosec.space/tags/Rufnummer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rufnummer</span></a> -&gt; <a href="https://infosec.space/tags/ICCID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICCID</span></a> -&gt; <a href="https://infosec.space/tags/IMSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMSI</span></a> -&gt; <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a> -&gt; <a href="https://infosec.space/tags/Location" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Location</span></a>) zu nutzen.</p><ul><li>Seit 07/2017 sind anonyme <a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a>-Karten <em>faktisch illegal</em> und ne SIM mir Rufnummer ist ne <a href="https://infosec.space/tags/Paywall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Paywall</span></a> die faktisch teurer ist als nen <span class="h-card" translate="no"><a href="https://monocles.social/@monocles" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>monocles</span></a></span> - Abo.</li></ul><p>Allein die notwendigen <a href="https://infosec.space/tags/Workarounds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Workarounds</span></a> sind so heftig paywalled dass es eher sinn macht 1h Hands-on - Training zu investieren...</p><ul><li>Von den <a href="https://infosec.space/@kkarhan/114234551915193036" rel="nofollow noopener" target="_blank">Problemen die Signal hat</a> ganz zu schweigen...</li></ul><p><a href="https://fedifreu.de/@cryptgoat/114705198216850106" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fedifreu.de/@cryptgoat/1147051</span><span class="invisible">98216850106</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.coop/@netopwibby" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>netopwibby</span></a></span> OFC <a href="https://infosec.space/tags/FirefoxOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirefoxOS</span></a> would've been a success if people exited about it (like me) and <a href="https://infosec.space/tags/developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developers</span></a> (like <span class="h-card" translate="no"><a href="https://oxytodon.com/@fuchsiii" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fuchsiii</span></a></span>) were ever abke to legally obtain any device with <em>FirefoxOS</em> on it.</p><ul><li>AFAIK the only Firefox OS <a href="https://infosec.space/tags/phone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phone</span></a> offered in the <a href="https://infosec.space/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> was a <a href="https://infosec.space/tags/SimLock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SimLock</span></a>'d / <a href="https://infosec.space/tags/NetLock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetLock</span></a>'d <a href="https://infosec.space/tags/Prepaid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Prepaid</span></a> device sold in <a href="https://infosec.space/tags/Spain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spain</span></a>, where they demanded <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KYC</span></a> for the <a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a>, making it impossible to legally obtain it back then without having to fly down to <a href="https://infosec.space/tags/Spain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spain</span></a>, ID at a store, fly back and then be overcharged for <a href="https://infosec.space/tags/DataRoaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRoaming</span></a>!</li></ul><p>IMHO, <span class="h-card" translate="no"><a href="https://mastodon.cc/@Mozilla" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Mozilla</span></a></span> / <a href="https://infosec.space/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> cannot be trusted <em>at all</em>!</p>
PrivacyDigest<p>A Researcher Figured Out How to Reveal Any <a href="https://mas.to/tags/PhoneNumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhoneNumber</span></a> Linked to a <a href="https://mas.to/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Account</p><p>Phone numbers are a goldmine for <a href="https://mas.to/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a> swappers. A researcher found how to get this precious piece of information through a clever brute-force attack.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.wired.com/story/a-researcher-figured-out-how-to-reveal-any-phone-number-linked-to-a-google-account/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/a-researcher-f</span><span class="invisible">igured-out-how-to-reveal-any-phone-number-linked-to-a-google-account/</span></a></p>
happy<p>"Biggest threat": EU Council leaders want to ban anonymous SIM cards | heise online<br><a href="https://www.heise.de/en/news/Biggest-threat-EU-Council-leaders-want-to-ban-anonymous-SIM-cards-10326735.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Biggest-threa</span><span class="invisible">t-EU-Council-leaders-want-to-ban-anonymous-SIM-cards-10326735.html</span></a></p><p><a href="https://fosstodon.org/tags/Anonymit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anonymität</span></a> <a href="https://fosstodon.org/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://fosstodon.org/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://fosstodon.org/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a>-Rat <a href="https://fosstodon.org/tags/Mobiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mobiles</span></a> <a href="https://fosstodon.org/tags/Mobilfunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mobilfunk</span></a> <a href="https://fosstodon.org/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzpolitik</span></a> <a href="https://fosstodon.org/tags/Prepaid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Prepaid</span></a>-Karten <a href="https://fosstodon.org/tags/Regulierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Regulierung</span></a> <a href="https://fosstodon.org/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a>-Karte <a href="https://fosstodon.org/tags/Whistleblower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whistleblower</span></a></p>
Kuketz-Blog 🛡<p>Die vierteilige Artikelserie von <span class="h-card" translate="no"><a href="https://social.tchncs.de/@rufposten" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rufposten</span></a></span> ist gestartet!</p><p>Du brauchst eine Wegwerfnummer für Registrierungen? Im ersten Teil der Serie beantworten wir allgemeinen Fragen zu Sinn, Anbietern und Verifizierung. 👇</p><p><a href="https://www.kuketz-blog.de/einleitung-und-tipps-wegwerfnummern-teil-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kuketz-blog.de/einleitung-und-</span><span class="invisible">tipps-wegwerfnummern-teil-1/</span></a></p><p><a href="https://social.tchncs.de/tags/wegwerfnummer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wegwerfnummer</span></a> <a href="https://social.tchncs.de/tags/datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datenschutz</span></a> <a href="https://social.tchncs.de/tags/privat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privat</span></a> <a href="https://social.tchncs.de/tags/telefon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telefon</span></a> <a href="https://social.tchncs.de/tags/nummer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nummer</span></a> <a href="https://social.tchncs.de/tags/sim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sim</span></a> <a href="https://social.tchncs.de/tags/simkarte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>simkarte</span></a></p>
Petrichor ᚄᚔᚅᚐᚁᚆᚃᚒᚔᚂ<p><a href="https://mastodon.ie/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a> help please - when my phone runs out of juice, as it does all the time (thanks for the replaced battery, not, <a href="https://mastodon.ie/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a>), it takes an age to come up with the "unlock SIM" message. Is there any way to go straight to it in Settings or whatever? <br><a href="https://mastodon.ie/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/SKTelecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SKTelecom</span></a> cyberattack: Free <a href="https://mastodon.thenewoil.org/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a> replacements for 25 million customers</p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SouthKorea</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/SKTelecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SKTelecom</span></a> <a href="https://mas.to/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> : Free <a href="https://mas.to/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a> replacements for 25 million customers<br> <br><a href="https://mas.to/tags/SouthKorean" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SouthKorean</span></a> mobile provider SK Telecom has announced free SIM card replacements to its 25 million mobile customers following a recent <a href="https://mas.to/tags/USIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USIM</span></a> data breach, but only 6 million cards are available through May.</p><p>SK Telecom is the country's largest <a href="https://mas.to/tags/mobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobile</span></a> network operator, serving roughly half of the domestic mobile phone market</p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/</span></a></p>
Terence Eden’s Blog<p><strong>That's Not How A SIM Swap Attack Works</strong></p><p><a href="https://shkspr.mobi/blog/2025/04/thats-not-how-a-sim-swap-attack-works/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/04/thats</span><span class="invisible">-not-how-a-sim-swap-attack-works/</span></a></p><p>There's <a href="https://www.theguardian.com/money/2025/apr/15/ee-was-unapologetic-after-i-tried-to-stop-a-sim-swap" rel="nofollow noopener" target="_blank">a disturbing article in The Guardian</a> about a person who was on the receiving end of a successful cybersecurity attack.</p><blockquote><p>EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did so immediately. Twenty-four hours later, my mobile stopped working and money was withdrawn from my bank account.</p><p><strong>With their alien sim, the ­fraudster infiltrated my handset and stole details for every account I had.</strong> Passwords and logins had been changed for my finance, retail and some social media accounts. </p></blockquote><p>(Emphasis added.)</p><p>I realise it is in the consumer rights section of the newspaper, not the technology section, and I dare-say some editorialising has gone on, but that's <em>nonsense</em>.</p><p>Here's how a SIM swap works.</p><ol><li>Attacker convinces your phone company to reassign your telephone number to a new SIM.</li><li>Attacker goes to a website where you have an account, and initiates a password reset.</li><li>Website sends a verification code to your phone number, which is now in the hands of the attacker.</li><li>Attacker supplies verification code and gets into your account.</li></ol><p>Do you notice the missing step there?</p><p>At no point does the attacker "infiltrate" your handset. Your handset is still in your possession. The SIM is dead, but that doesn't give the attacker access to the phone itself. There is simply <strong>no way</strong> for someone to put a new SIM into their phone and automatically get access to your device.</p><p>Try it now. Take your SIM out of your phone and put it into a new one. Do all of your apps suddenly appear? Are your usernames and passwords visible to you? No.</p><p>There are ways to transfer your data from an <a href="https://support.apple.com/en-gb/HT210216" rel="nofollow noopener" target="_blank">iPhone</a> or <a href="https://support.google.com/android/answer/13761358?hl=en" rel="nofollow noopener" target="_blank">Android</a> - but they require a lot more work than swapping a SIM.</p><p>So how did the attacker know which websites to target and what username to use?</p><p><strong>What (Probably) Happened</strong></p><p>Let's assume the person in the article didn't have malware on their device and hadn't handed over all their details to a cold caller.</p><p>The most obvious answer is that the attacker <em>already</em> knew the victim's email address. Maybe the victim gave out their phone number and email to some dodgy site, or they're listed on their contact page, or something like that.</p><p>The attacker now has two routes.</p><p>First is "hit and hope". They try the email address on hundreds of popular sites' password reset page until they get a match. That's time-consuming given the vast volume of websites.</p><p>Second is targetting your email. If the attacker can get into your email, they can see which sites you use, who your bank is, and where you shop. They can target those specific sites, perform a password reset, and get your details.</p><p>I strongly suspect it is the latter which has happened. The swapped SIM was used to reset the victim's email password. Once in the email, all the accounts were easily found. At no point was the handset broken into.</p><p><strong>What can I do to protect myself?</strong></p><p>It is important to realise that <a href="https://shkspr.mobi/blog/2024/03/theres-nothing-you-can-do-to-prevent-a-sim-swap-attack/" rel="nofollow noopener" target="_blank">there's nothing you can do to prevent a SIM-swap attack</a>! Your phone company is probably incompetent and their staff can easily be bribed. You do not control your phone number. If you get hit by a SIM swap, it almost certainly isn't your fault.</p><p>So here are some practical steps anyone can take to reduce the likelihood and effectiveness of this class of attack:</p><ul><li>Remember that <a href="https://shkspr.mobi/blog/2020/03/its-ok-to-lie-to-wifi-providers/" rel="nofollow noopener" target="_blank">it's OK to lie to WiFi providers</a> and other people who ask for your details. You don't need to give someone your email for a receipt. You don't need to hand over your real phone number on a survey. This is the most important thing you can do.</li><li>Try to hack yourself. How easy would it be for an attacker who had stolen your phone number to also steal your email address? Open up a private browser window and try to reset your email password. What do you notice? How could you secure yourself better?</li><li>Don't use SMS for two-factor authentication. If you are given a choice of 2FA methods, use a dedicated app. If the only option you're given is SMS - contact the company to complain, or leave for a different provider.</li><li>Don't rely on a <a href="https://bsky.app/profile/scientits.bsky.social/post/3lmz2zaxkf22k" rel="nofollow noopener" target="_blank">setting a PIN for your SIM</a>. The PIN only protects the physical SIM from being moved to a new device; it does nothing to stop your number being ported to a new SIM.</li><li>Finally, realise that professional criminals only need to be lucky once but you need to be lucky all the time.</li></ul><p>Stay safe out there.</p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/2fa/" target="_blank">#2fa</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/cybersecurity/" target="_blank">#CyberSecurity</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/mfa/" target="_blank">#MFA</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/security/" target="_blank">#security</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/sim/" target="_blank">#sim</a></p>

🆕 blog! “That's Not How A SIM Swap Attack Works”

There's a disturbing article in The Guardian about a person who was on the receiving end of a successful cybersecurity attack.

EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did …

👀 Read more: shkspr.mobi/blog/2025/04/thats

#2fa #CyberSecurity #MFA #security #sim

Terence Eden’s Blog · That's Not How A SIM Swap Attack Works
More from Terence Eden

If you change your #phone #sim temporarily, i.e. use a new phone number, #Signal keeps working as before. #WhatsApp stops working if you change your sim i.e. phone number. Signal knocks the socks off whatsapp for staying in touch while travelling, when your normal sim and phone number have malfunctioned (my new #telekom cellular provider cancelled my old SIM & provider & sent me their new SIM for new contract: while I was abroad, without asking me if this date suits). Signal rocks. Use signal.

Follower-Power:

Fürs @kuketzblog will ich mal Anbieter und Lösungen vergleichen, um sich regelmäßig, günstig und komfortabel mit einer #Wegwerf-Mobilnummer (#SIM oder #eSIM) zu versorgen.

- Maximal 20€, besser <=5€ pro Monat
- Nummernwechsel ohne erneuten ID-Nachweis.

Aktuell habe ich nur Spezial-/Profidienste im Rennen (seven.io, Sipgate, etravelsim.com). Die meisten Prepaid-Anbieter bieten wohl keinen bequemen Nummernwechsel-/Zubuchung, höchstens per Hotline und teuer.

Habt ihr Tipps?

"Biggest threat": EU Council leaders want to ban anonymous SIM cards.

The Polish Council Presidency has proposed new EU regulations on mandatory registration of prepaid SIM cards.

This is provided for in a draft by the Polish Presidency of the EU Council of Ministers, as reported by the British civil rights organisation Statewatch.

mediafaro.org/article/20250324

Heise Online · "Biggest threat": EU Council leaders want to ban anonymous SIM cards.By Stefan Krempl
#SIM#Privacy#EU