If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
<p>Today, billions of subscribers use SIM cards in their phones. Yet, outside a relatively small circle, information about SIM card technology is not widely known. If at all, people know that once upon a time, they were storing phone books on SIM cards.</p>
<p>Every so often there are some IT security news about SIM card
vulnerabilities, and SIM card based attacks on subscribers.</p>
<p>Let's have a look at SIM card technology during the past almost 30 years and cover topics like
<li>Quick intro to ISO7816 smart cards</li>
<li>SIM card hardware, operating system, applications</li>
<li>SIM card related specification bodies, industry, processes</li>
<li>from SIM to UICC, USIM, ISIM and more</li>
<li>SIM toolkit, proactive SIM</li>