Thank you. I think my confusion on concern stemmed from some opinions I held:
- Any key of mine should be copyable by me.
- Any key of mine (or copy thereof) should be usable as I see fit*.
- If someone had physical access to a device, we can assume they control it and have all information and communications on it, potentially forever due to the layered architecture of modern hardware systems.
- If someone compromised a network provider, we can assume they control all configuration and communication, potentially forever on the existing devices, for the same reasons.
* - though I obviously wouldn't want to use them in a way that illegally hurts people, like driving drunk and getting into an accident
The thing with eSIMs and SIM cards before is that they aren't keys of yours, network carriers like to own them instead. Everything about mobile communications is oriented towards that. The tamper-proof chips, "secure" firmware etc.
- Any key of mine should be copyable by me.
- Any key of mine (or copy thereof) should be usable as I see fit*.
- If someone had physical access to a device, we can assume they control it and have all information and communications on it, potentially forever due to the layered architecture of modern hardware systems.
- If someone compromised a network provider, we can assume they control all configuration and communication, potentially forever on the existing devices, for the same reasons.
* - though I obviously wouldn't want to use them in a way that illegally hurts people, like driving drunk and getting into an accident