from Hacker News

Decap of a Cell Phone SIM card [video]

by mynameislegion on 10/10/16, 3:27 AM with 17 comments

  • by kasbah on 10/10/16, 12:22 PM

    If you want to understand more about what the glitching protection is about Scanlime recently made a very good video where she grabs firmware from a drawing tablet using such an attack.

    https://www.youtube.com/watch?v=TeCQatNcF20

  • by gcb0 on 10/10/16, 6:31 AM

    sim cards are as capable as 80s computers and run the JVM.

    http://www.extremetech.com/computing/161870-the-humble-sim-c...

  • by teekert on 10/10/16, 7:36 AM

    Hmm so even if you can ever buy a secure phone you trust, you need to put another, completely opaque, computer into it to make it function (on cell networks anyway.)
  • by CommanderData on 10/10/16, 10:11 AM

    There was a talk on blackhat or defcon about the abilities of these controllers, running mini java applications and other cool things. I remember it being said finding necessary SDK's were very difficult and sometimes secretive. Makes me wonder.
  • by theGimp on 10/10/16, 5:46 AM

    That is a very well-made video.

    Like the video creator, I'm very surprised the humble SIM card has been made so capable!

  • by ccozan on 10/10/16, 1:44 PM

    Honest question, why there is a need for a ARM based processor on that SIM card? AFAIK, the role of the SIM is to securely store all kind of IDs and PINs and contacts.

    I am quite sure that my first SIM card, 20 years ago, didn't have such setup and worked, quite the same.