SIM Security EXPOSED: Simjacker, SIM Swap & the eSIM Threat Model
Автор: KingTech
Загружено: 2025-12-26
Просмотров: 18
Welcome back to KingTech.#CyberSecurity #SIMSecurity #eSIM #MobileSecurity
In this video, we completely deconstruct the SIM card — not as a simple piece of plastic, but as a hardware root of trust and a full secure microcomputer that underpins global mobile identity.
This is a deep technical breakdown designed for cybersecurity professionals, mobile security researchers, telecom engineers, and anyone serious about digital identity protection.
What you’ll learn in this video:
🔹 How the UICC (SIM card) actually works internally
🔹 Why the SIM is a secure element, not passive storage
🔹 Java Card OS vs proprietary SIM operating systems
🔹 The cryptographic authentication process (Ki, RAND, SRES, KC)
🔹 Why the secret key never leaves the SIM
🔹 How the SIM Application Toolkit (STK) expands the attack surface
🔹 How Simjacker abused the S@T browser via silent binary SMS
🔹 Why this attack bypassed Android & iOS completely
🔹 SIM-based attacks vs SIM swapping (administrative compromise)
🔹 Why SMS-based 2FA is still a catastrophic weak point
🔹 Detection strategies: rapid MNC rotation, OTP anomalies, SIM farms
🔹 How telecom-grade threat intelligence actually works
🔹 The architectural shift from UICC → eSIM (eUICC)
🔹 Why remote SIM provisioning (RSP) is the new attack surface
🔹 Security domains inside eSIM (ISD-R, ISD-P) explained
🔹 The hidden risks inside GSMA’s provisioning model
🔹 Why trust didn’t disappear — it just moved
This video shows a critical truth in modern cybersecurity:
Even hardware roots of trust are only as secure as the software, processes, and humans surrounding them.
If you work in cybersecurity, telecom security, digital forensics, OSINT, or identity protection, this knowledge is essential.
👍 Like the video if you value deep technical breakdowns
🔔 Subscribe to KingTech for advanced cybersecurity content
💬 Comment your thoughts — SIM, eSIM, or iSIM: which is safer long-term?
Stay sharp. Stay skeptical.
— KingTech
#CyberSecurity #SIMSecurity #eSIM #MobileSecurity #Infosec#TelecomSecurity #SIMSwap #Simjacker #DigitalIdentity#RootOfTrust #HardwareSecurity #SecureElement #GSMA#ThreatModel #SecurityArchitecture #MobileHacking#PrivacyEngineering #CyberDefense #KingTech
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: