eSIM Technology Explained: How It Works and Why It Matters
Is eSIM more secure than a physical SIM?The physical SIM card has been a fixture of mobile devices for over three decades. Its replacement, the eSIM, has been quietly built into hundreds of millions of devices and is now the default connectivity solution for most flagship smartphones. Yet despite its widespread adoption, the underlying technology remains poorly understood outside of telecom engineering circles. This article explains how eSIM works, what makes it different from its predecessor, and why the shift matters for consumers, developers, and the broader mobile ecosystem.
The Problem with Physical SIM Cards
To understand why eSIM exists, it helps to understand what physical SIM cards were designed to solve and where they fall short.
The SIM, or Subscriber Identity Module, was introduced in 1991 as a secure way to authenticate a mobile subscriber on a GSM network. It stores a unique identifier called the IMSI, an authentication key, and carrier-specific data. When you insert a SIM into a phone, the device reads these credentials and uses them to register on the carrier network.
The physical format worked well for decades but created friction in several contexts. Travelers had to source local SIMs at each destination, often navigating language barriers and incompatible form factors. Manufacturers had to accommodate SIM trays that consumed space and created dust ingress points. Devices like smartwatches and IoT sensors needed connectivity but had no practical way to accept a physical card. The eSIM addresses all of these constraints.

What Is an eSIM?
An eSIM, short for embedded SIM, is a programmable SIM chip soldered directly onto a device’s circuit board. Unlike a physical SIM that stores a single carrier profile on a removable chip, an eSIM implements the eUICC standard, which stands for embedded Universal Integrated Circuit Card, defined by the GSMA. The eUICC standard allows the chip to store multiple carrier profiles simultaneously and switch between them remotely without any physical intervention.
The key innovation is not the hardware itself but the software stack that manages it. An eSIM-capable device runs a Local Profile Assistant, or LPA, which handles the downloading, installing, activating, and deleting of carrier profiles. The LPA communicates with remote servers operated by carriers and eSIM providers using a standardized protocol defined in the GSMA SGP.22 technical specification.
How eSIM Provisioning Works
When a user purchases an eSIM plan, the provider generates a profile containing the subscriber credentials, network authentication keys, and carrier configuration data. This profile is stored on a secure server called an SM-DP+, which stands for Subscription Manager Data Preparation Plus.
The activation process follows these steps. First, the user receives an activation code, typically delivered as a QR code or alphanumeric string. Second, the device’s LPA reads the activation code and establishes a secure TLS connection with the SM-DP+ server. Third, the SM-DP+ authenticates the device using its embedded certificate, which is provisioned during manufacturing by the eUICC manufacturer. Fourth, the profile is downloaded and installed on the eUICC chip in encrypted form. Fifth, the user activates the profile and the device registers on the carrier network using the downloaded credentials.
The entire process takes between one and five minutes under normal network conditions. Once installed, the profile persists on the chip and can be reactivated without re-downloading, though some providers limit reactivation to a single device.
The Security Architecture of eSIM
Security was a primary design requirement of the eUICC standard. The threat model for physical SIM cards included SIM swapping, where an attacker convinces a carrier to transfer a subscriber’s number to a new SIM, and physical theft, where a SIM is removed and used in another device.
The eSIM architecture addresses both. Each eUICC chip contains a root certificate provisioned by the eUICC manufacturer, called the EUM certificate, which cannot be extracted or cloned. The SM-DP+ server performs mutual authentication with the device during profile download, verifying that the receiving device is a legitimate eUICC rather than a software emulator attempting to intercept credentials. Profiles are transmitted encrypted end-to-end and stored encrypted on the chip, inaccessible to the device’s operating system or any application layer code.
The result is that eSIM profiles are cryptographically bound to specific hardware. A profile downloaded to one device cannot be transferred to another without explicit support from the provider, which significantly raises the bar for credential theft compared to physical SIM attacks.
Multiple Profiles and Dual SIM Operation
One of the most practical features of modern eSIM implementations is the ability to store and manage multiple profiles on a single device. The GSMA specification does not define a maximum number of profiles, leaving this to device manufacturers. Current iPhone models support up to eight stored eSIM profiles with two active simultaneously. Google Pixel 7 and later support dual eSIM operation without a physical SIM slot, making them effectively SIM-free devices that operate entirely on downloaded profiles.
Dual SIM operation allows users to run two active lines simultaneously: one for a domestic number and one for a travel data plan, for example. On iOS, this is managed through the Cellular settings, where each line can be assigned specific functions including data, calls, and SMS. On Android, the SIM Manager application handles the same configuration.
For developers building applications that need to handle multi-SIM devices, Android’s SubscriptionManager API and iOS’s CoreTelephony framework provide programmatic access to SIM information, though carrier profile management itself remains outside the application sandbox for security reasons.
eSIM in IoT and Enterprise Applications
Consumer smartphones represent only one segment of eSIM adoption. The M2M, or machine-to-machine, variant of the eUICC standard predates the consumer version and is widely deployed in connected vehicles, industrial sensors, point-of-sale terminals, and medical devices.
The M2M variant differs from the consumer standard in one important respect: profile management is controlled by the operator rather than the end user. A connected car manufacturer, for example, can provision and update cellular profiles across an entire fleet without any user interaction, using a centralized Subscription Manager platform. This remote management capability is critical for devices deployed in locations where physical access is impractical or impossible.
Enterprise deployments also benefit from eSIM’s tamper resistance. A physical SIM in a field-deployed sensor can be removed and misused. An eSIM soldered to the board of the same device provides the same connectivity with significantly higher resistance to physical tampering.

Practical Implications for American Travelers
For the majority of users, the most immediate benefit of eSIM technology is frictionless international connectivity. US carrier roaming plans for international travel typically cost $10 to $25 per day, with performance that depends on roaming partnership agreements rather than native network access. A travel eSIM purchased from a provider like Holafly’s eSIM for travelers connects directly to local networks in over 200 destinations, activated before departure and functional from the moment the plane lands, without daily fees or caps.
The setup requires a compatible device, which covers all iPhones from the XS onward, most current Android flagships, and a device that is carrier-unlocked. Phones purchased directly from manufacturers or after a contract period ends are typically unlocked. Devices on active carrier contracts may require an unlock request.
eSIM Technology FAQs
Is eSIM more secure than a physical SIM? In most threat scenarios, yes. The binding of profiles to hardware through device certificates prevents extraction and reuse. SIM swapping attacks are significantly harder to execute against an eSIM because there is no physical card to transfer.
Can an eSIM profile be transferred to a new device? It depends on the provider. Some providers support device transfers through their app or support team. Others treat each profile as single-use. Check provider terms before purchasing if portability matters.
Does eSIM work on all carriers? Most major US carriers including AT&T, Verizon, and T-Mobile support eSIM. International support varies. Check the carrier’s eSIM compatibility page before attempting to activate.
Will eSIM eventually replace physical SIM cards entirely? Industry trajectory points in that direction. Apple began the transition with the US iPhone 14, and the broader industry is expected to follow progressively as device support reaches critical mass.
What happens to my eSIM if I factory reset my device? Factory resetting a device typically deletes all installed eSIM profiles. Most providers allow re-download after authentication, but confirm with your provider before performing a reset if you want to preserve an active plan.



