Our valued sponsor

Anonymous SIM Cards

Interesting, but they list that disadvantage of classic sim from operator is that operator can run attacks at your device:
(...) your local mobile network provider to run various attacks, that are easy with ordinary mobile subscribers, such as:
- SimToolKit attack. Using a special service SMS and a secret Ki key attacker can control subscriber's SIM card (or eSIM chip) and, using a special surveillance interface built into every GSM phone, eavesdrop on the subscriber during calls or standby.(...)
So now, when using their SIM, probably they can run those attacks. And they seem 1000x times more shady than normal operator. So perhaps caution needs to be exercised (e.g. when using device with this, assume that it's constantly listening). Also it needs to be considered that this could be law enforcement operation, such as Anom ("privacy phone" made by FBI) - as if this indeed allows to make such attacks at phones from operator's channel [which they claim are possible from normal operator], this would be excellent idea.
 
Good to know, thread moved!
 
So now, when using their SIM, probably they can run those attacks. And they seem 1000x times more shady than normal operator. So perhaps caution needs to be exercised (e.g. when using device with this, assume that it's constantly listening).

These risks are present with any phone company. SIM cards run Java and can run applications that the mobile company can deliver to the card at any time without your knowledge.

I would remove the microphones and cameras from the phone (if you have the skillset to do it), and only use it for data. Optionally use Wireguard to move the IP risks elsewhere as well. Any good VPN company worth its salt accepts Monero.

Do your voice and text communications using an app thet encrypts end-to-end. There are many to choose from. Always choose open source when possible.

Also it needs to be considered that this could be law enforcement operation, such as Anom ("privacy phone" made by FBI) - as if this indeed allows to make such attacks at phones from operator's channel [which they claim are possible from normal operator], this would be excellent idea.

Sure.

That's why you mitigate risks by using the advice above.

The trusted 5-star mobile company that you currently use can be hacked or co-opted by glowies using a court order (or not - depends on your jurisdiction) at any time as well.

The point of my initial post was to show that such a service exists and what is possible while staying anonymous.
 
Optionally use Wireguard to move the IP risks elsewhere as well. Any good VPN company worth its salt accepts Monero.
Wireguard / vpn helps in nothing if your device is already compromised through this SIM channel. Attacker will force it to make a connection without Wireguard / vpn.


Do your voice and text communications using an app thet encrypts end-to-end. There are many to choose from. Always choose open source when possible.
Same: it helps in nothing when your device is already compromised through this SIM channel (or other malware, e.g. famous Pegasus). Attacker will see your messages like you on your screen, and the fact that in transit they will be super-hyper encrypted is irrelevant.

The trusted 5-star mobile company that you currently use can be hacked or co-opted by glowies using a court order (or not - depends on your jurisdiction) at any time as well.
Yes, but here we have some unknown guys selling sim cards for Monero. So who is more risky, normal operator or these guys? IMO, by nature of this service, as it attracts people who wanted anonymity, it more likely that:
1) They will be attacking your device as they described (more likely than normal operator)
2) They will get hacked (as probably they are less sophisticated then normal operator, and also have users which are nice target: crypto users who want to stay anonymous)
3) They already might be LE honeypot like Anom

The point of my initial post was to show that such a service exists and what is possible while staying anonymous.
Cool!
 
Another option is to connect to the internet using a portable router with a SIM card purchased “by a friend”, and use a safe encrypted device.
I'm using these devices MikroTik for example
very stable, from more than 60 pieces I have one LTE module and one power adapter died during 3 years - not bad
two sim card slots for transparent failover, just load it, establish WireGuard tunnel anywhere and you're happy

nevertheless, I like your post OP
 
  • Like
Reactions: JohnLocke
Another option is to connect to the internet using a portable router with a SIM card purchased “by a friend”, and use a safe encrypted device.

Sure, and for certain setups this is preferred. You can carry a secured laptop and a portable router.

However, if you want the form factor of a phone and the convenience of portability, a device that looks like a boring smartphone offers better stealth. :)

Wireguard / vpn helps in nothing if your device is already compromised through this SIM channel. Attacker will force it to make a connection without Wireguard / vpn.

If your adversary is the NSA you will lose no matter what you do. They can possibly escape the baseband and infect the linux (android) kernel running on the application processor to do anything they want.

For most normal people looking for privacy and want to carry a device that looks normal. This is a decent fit.

Same: it helps in nothing when your device is already compromised through this SIM channel (or other malware, e.g. famous Pegasus). Attacker will see your messages like you on your screen, and the fact that in transit they will be super-hyper encrypted is irrelevant.

Yes yes.. and there are 0days for everything that are sold to the governments. We know.

This is why I advocate for Graphene OS because it actually has most of the exploit mitigations turned on, hardware attestation, OpenBSD's memory allocator, etc.

For the average jet setter who needs to stay in contact with business associates and family this is overkill.

If you are Pablo Escobar you'll need something even more hardened.

1) They will be attacking your device as they described (more likely than normal operator)

You can't say that for certain. You are talking out of your @ss.

2) They will get hacked (as probably they are less sophisticated then normal operator, and also have users which are nice target: crypto users who want to stay anonymous)

Sure, bring it on. That's why you harden the endpoint.

3) They already might be LE honeypot like Anom

Sure. Spy all you want. Wireguard, Signal, microphone and cameras removed. Purchased with cash.

As with everything you need to do proper threat modelling.

You don't have to outrun the bear - you just have to be faster than the slowest camper.
 
Last edited:
  • Like
Reactions: troubled soul
@OffshoreMonero: No need to talk about NSA / 0days. They openly admit that operator (so this means "they" when you are using their sim card) can successfully attack your device. So no magic tricks or NSA required, this is already solved issue.

VPN / Wireguard works on different layer (already internet layer, so this means that cellular connection is established and operator has details about this connection, e.g. where it's originating from). Moreover, as I wrote earlier, encryption in transit either with VPN or E2E apps is irrelevant when you have malware on your device (delivered by this SIM-channel) - as malware will work on unencrypted data on your device, not try to decrypt it in transit.

So, you are just mentioning random keywords about hardening in ways which are completely irrelevant in this case. If you truly think like that (and not just advertising the service), then it nicely shows why this attack could be very successful and is a such a nice idea: People will think "omg I will install VPN and signal and be safe due to super encryption" - nope, as malware on your device makes this irrelevant.
 
They openly admit that operator (so this means "they" when you are using their sim card) can successfully attack your device.

What are you talking about?

VPN / Wireguard works on different layer (already internet layer, so this means that cellular connection is established and operator has details about this connection, e.g. where it's originating from). Moreover, as I wrote earlier, encryption in transit either with VPN or E2E apps is irrelevant when you have malware on your device (delivered by this SIM-channel) - as malware will work on unencrypted data on your device, not try to decrypt it in transit.

That's not how the baseband and application processors work on the Google Pixel 7.

So, you are just mentioning random keywords about hardening in ways which are completely irrelevant in this case. If you truly think like that (and not just advertising the service), then it nicely shows why this attack could be very successful and is a such a nice idea: People will think "omg I will install VPN and signal and be safe due to super encryption" - nope, as malware on your device makes this irrelevant.

You didn't read anything I wrote, did you?
 
That's obvious.

Any mobile device can be tracked by the carrier and those who have access to the data (such as governments).
practically speaking it's very difficult for everyone - using VPN server (as a gateway to the internet) in country A using the sim card from operator based in country B in country C is pretty strong setup - SIM card in roaming uses local operator to find the way home and from there to your vpn server - if you choose the right countries and pay for the services the right way... good luck to anyone to track what and from where you're doing...
 
practically speaking it's very difficult for everyone - using VPN server (as a gateway to the internet) in country A using the sim card from operator based in country B in country C is pretty strong setup - SIM card in roaming uses local operator to find the way home and from there to your vpn server - if you choose the right countries and pay for the services the right way... good luck to anyone to track what and from where you're doing...

Your main carrier sees that your sim card connected in foreign country using another operator. And they have all information about details of this connection (enough to locate it, and some operator APIs for IoT SIMs even have easy way of locating connections of your own sim cards as a feature provided to the users), they see contents of sent and received SMSs (e.g. bank verification codes could be important for shady operator), connections you made (to whom and how long they took), how much internet data you uploaded and downloaded etc. This is on the lower layer than internet connection (as this is on cellular connection layer), so VPN will not help with it.

Often your internet connections go through your main carrier proxy, even when connecting from abroad with different operator (you can verify this by using some IP-location tool when you will be abroad - most likely it will display IP from your main country and location in your main country, as traffic will be exiting through your main operator). So, while your connections through the internet will be encrypted by you, this also provides some interesting metadata and additional attack surface.

This is all in normal setting with normal operator. In situation when you are using shady operator and they will try to hack your device and succeed, of course it's much worse.
 
Last edited:
Your main carrier sees that your sim card connected in foreign country using another operator. And they have all information about details of this connection (enough to locate it, and some operator APIs for IoT SIMs even have easy way of locating connections of your own sim cards as a feature provided to the users), they see contents of sent and received SMSs (e.g. bank verification codes could be important for shady operator), connections you made (to whom and how long they took), how much internet data you uploaded and downloaded etc. This is on the lower layer than internet connection (as this is on cellular connection layer), so VPN will not help with it.

Often your internet connections go through your main carrier proxy, even when connecting from abroad with different operator (you can verify this by using some IP-location tool when you will be abroad - most likely it will display IP from your main country and location in your main country, as traffic will be exiting through your main operator). So, while your connections through the internet will be encrypted by you, this also provides some interesting metadata and additional attack surface.

This is all in normal setting with normal operator. In situation when you are using shady operator and they will try to hack your device and succeed, of course it's much worse.
I didn't say impossible, I said "difficult" which I still stand behind
 
Yes, but can you buy it without showing your face to a security camera?
Yes you can. I wouldnt trust these esim provider either.
Already activated simcards in certain type of shops are almost impossible to trace back to who bought it. You pay cash and the shop owners dont register the sale with the simcard number. If they even register the sale at all. Simcards are activated with internet packages even before you enter the store. These stores produce this type of simcards with activated packages on bulk.
About cctv cameras there are even some stores which dont have cameras but for these you need to search a bit.

With such type of existent offer there is no need for those esim provider. Its less traceable and even cheaper.
 

Latest Threads