If you want to understand more about what the glitching protection is about Scanlime recently made a very good video where she grabs firmware from a drawing tablet using such an attack.<p><a href="https://www.youtube.com/watch?v=TeCQatNcF20" rel="nofollow">https://www.youtube.com/watch?v=TeCQatNcF20</a>
sim cards are as capable as 80s computers and run the JVM.<p><a href="http://www.extremetech.com/computing/161870-the-humble-sim-card-has-finally-been-hacked-billions-of-phones-at-risk-of-data-theft-premium-rate-scams" rel="nofollow">http://www.extremetech.com/computing/161870-the-humble-sim-c...</a>
Hmm so even if you can ever buy a secure phone you trust, you need to put another, completely opaque, computer into it to make it function (on cell networks anyway.)
There was a talk on blackhat or defcon about the abilities of these controllers, running mini java applications and other cool things. I remember it being said finding necessary SDK's were very difficult and sometimes secretive. Makes me wonder.
Honest question, why there is a need for a ARM based processor on that SIM card? AFAIK, the role of the SIM is to securely store all kind of IDs and PINs and contacts.<p>I am quite sure that my first SIM card, 20 years ago, didn't have such setup and worked, quite the same.