### Notes on eSIM Security Risks and Techniques for Hijacking
#### Overview
- Transitioning from physical SIM cards to eSIMs has created an illusion of security.
- The common belief is that with no physical chip, the risk of theft is reduced. However, this overlooks new digital vulnerabilities.
#### Key Points
1. **Shift in Attack Vector**:
- **Old Threat**: Physical access required for SIM card fraud.
- **New Threat**: Remote access


