Study Exposes How Travel ESIMs Reroute Data Through China
19 hours ago
- #Privacy
- #eSIM
- #Cybersecurity
- Many travel eSIM providers route user data through China and other unexpected countries without disclosure, raising privacy and surveillance concerns.
- A study found that eSIM profiles often reroute traffic through third-party countries, with Chinese carriers appearing frequently.
- Security vulnerabilities in eSIM technology include unauthorized applet installation and cloned profiles hijacking subscriber identities.
- eSIM fraud, such as SIM-swap attacks, has surged, with significant financial losses reported.
- Certain eSIM profiles engage in silent, proactive behavior, initiating connections without user action, raising transparency and privacy issues.
- The barrier to becoming an eSIM reseller is very low, with minimal oversight, exposing users to potential risks.
- Experts recommend choosing transparent providers, enabling strong authentication, using VPNs, and updating devices to mitigate risks.
- Silent eSIM behavior can lead to loss of control, exposure to surveillance, data leakage, fraud, and hidden costs for travelers.
- The market is shifting towards transparency and control, with some providers offering selectable routing options.
- Future competitive advantages in the eSIM market will favor providers that document routing, offer local breakout options, and ensure security compliance.