The hidden supply chain behind consumer eSIMs.
25M+ users across 140+ brands. The wholesale infrastructure carrying that traffic is invisible to almost everyone using it, including the businesses paying the bills.
The team behind eSIM Copilot built My Truphone, the first consumer eSIM app. We've had a front-row seat to this category since it started, and we've watched it grow from a niche product most people hadn't heard of into a mass-market industry with its own unicorn.
What's happened since is, on balance, good news for travellers. Airalo launched in 2019 and normalised consumer eSIMs for the mainstream. It passed 10 million users in 2024 and doubled that by mid-2025, with $331 million in net revenue last year and a $1 billion valuation off a Series C led by CVC. Holafly has sold more than 15 million eSIMs and crossed $500 million in cumulative revenue. Behind those two sits a long tail: Saily, Nomad, Ubigi, GigSky, Maya Mobile, Jetpac, BNESIM, Yesim, Roamless, MobiMatter, Flexiroam, aloSIM, and around 140 other brands listed in public eSIM databases.
Most of them have a clean App Store listing, a tidy payment flow, and a plan that costs less than a pint. If your employee lands in Rome for a sales trip and needs data, buying one of them is the obvious thing to do.
But there's a question that hasn't kept pace with the growth of the category, and it's the one this post is about. When your employee buys one of those plans, installs it, and logs into Salesforce, Teams or company email, do you know what network their data is actually travelling over?
What the research says
In August 2024, a team from NYU Abu Dhabi, Nokia Bell Labs and Telefonica Research published a reverse-engineering study of Airalo's supply chain.
Jang, Varvello, Lutu, Zaki
The team tested 24 country-specific Airalo eSIMs and mapped the real infrastructure behind each. The answer wasn't “Airalo”. It was six mobile operators across five jurisdictions: Singtel in Singapore, Play and Polkomtel in Poland, Telna Mobile in the US, Telecom Italia, and Orange in France.
Depending on where you're travelling, your Airalo profile authenticates through one of those home networks, and your internet traffic eventually breaks out through one of their gateways, almost always in a country different from the one your phone is physically in.
In 2025, a separate team at Northeastern University published their findings at USENIX Security.
Motallebighomi, Veara, Bitsikas, Ranganathan
They tested 25 providers including Airalo, Holafly, Saily, Nomad, Ubigi, GigSky, Maya Mobile, BNESIM, Yesim, DENT, eSIM Access, Google Fi and T-Mobile. The summary line: “After purchasing and installing a targeted set of eSIMs, we observed that in almost all cases the device's public IP address did not correspond to its physical location.”
Among the other findings:
- A Holafly profile assigned the device an IP belonging to China Mobile International in Hong Kong (
223.118.51.96). From the internet's point of view, the device was in China, regardless of where it actually was. - An eSIM Access profile opened a background connection to a server in Singapore the moment it was installed, before the user touched anything.
- A Holafly profile auto-fetched an SMS from a Hong Kong number without the user authorising it.
- Becoming a reseller on at least two eSIM platforms took nothing more than a valid email and a payment method. That got you access to subscriber IMSIs, device identifiers, location data accurate to around 800 metres, and the ability to send SMS to customers.
None of this is about any one brand being bad. It's about how opaque the consumer eSIM supply chain is from the buyer's side, and how little of that opacity is visible when you're tapping a purchase button in an airport lounge.
What actually sits on your phone
The research above is about where data goes. There's a second layer worth understanding. What actually gets loaded onto your device when you install an eSIM profile, and what someone upstream in the supply chain can do with it.
Identifier exposure
The USENIX paper again. Resellers on at least two platforms got access to subscriber IMSIs, device identifiers including IMEI, approximate location data, and the ability to send SMS to customers. An email address and a payment method was all that stood between an attacker and those capabilities.
An IMSI in the wrong hands isn't abstract. With paid access to the SS7 interconnect (there are grey-market services that sell it), an attacker can query your approximate location, redirect incoming SMS to intercept 2FA codes, or force the device off the network entirely. A 2017 case at O2-Telefónica in Germany used this exact technique to drain bank accounts. An IMEI sticks with the phone across SIM changes, and its first 8 digits (the TAC) identify make and model, which is enough to prepare exploits for that specific handset.
The more plausible day-to-day threat, though, isn't an exotic signalling attack. It's smishing that lands on the travel eSIM carrying the sender-ID of the user's home carrier. “Security alert from [your carrier]: unusual sign-in attempt, verify at…” The employee is already receiving legitimate roaming texts. A spoofed one slips in easily.
Applets loaded with the profile
eSIM profiles aren't just authentication credentials. They're containers that can carry Java Card applets running on the secure element inside the phone, and whoever issues the profile decides what gets included.
Applets can use the SIM Toolkit to send and receive SMS silently, read the IMEI and cell location, launch URLs in the browser, trigger USSD codes, or display system-level prompts that look like they came from the OS or the carrier. All of it sits below the application layer, without the permission prompts a normal app would trigger.
This has been exploited in the wild. Simjacker, disclosed by AdaptiveMobile Security in 2019, used a binary SMS to silently trigger an applet already sitting on the SIM, which then exfiltrated the victim's IMEI and cell location. It was used for targeted surveillance across more than 30 countries. WIBAttack, disclosed the same year, hit a different applet using the same class of attack. Both worked because the applets were there on the SIM without the user consenting to them, or knowing they were there.
The USENIX paper also validated, on a private LTE testbed, “profile deletion failures and profile lock-in”. These are profiles that don't fully remove when the user thinks they've deleted them. Any applet shipped with a profile can persist on the eUICC past that point.
What this adds up to
With a consumer travel eSIM from a brand you've never heard of, backed by a wholesale carrier you can't identify, carrying a profile generated by a party you have no visibility into, you're extending the trust boundary of your phone's secure element to a supply chain you can't see. For a holidaying individual on a ten-day trip, probably fine. For an executive using the same phone to open Salesforce, approve wire transfers, and take 2FA codes on a separate line, that risk model deserves more thought than it usually gets.

You're extending the trust boundary of your phone's secure element to a supply chain you can't see.
Why this matters when the buyer is an employee
If the person installing the app is on holiday, the worst case is usually a latency hit and some advertising targeting based on a wrong geographic fix. Irritating, not serious.
When it's an employee using the same eSIM to log into your CRM, your email, Teams, Google Workspace or a VPN into an internal system, it's a different conversation. The traffic doesn't teleport to Salesforce. It takes a path:
- 1DeviceEmployee phone
- 2eSIM profileOwned by base MNO
- 3Visited networkLocal carrier abroad
- 4IPX signalling hubWholesale carrier
- 5Packet gatewayBase MNO country
- 6Public internetSalesforce, Teams…
At each hop there's metadata. IMSI, IMEI, approximate location, session timing. Some hops sit inside jurisdictions your legal team cares about.
The basic question here isn't a regulatory one. It's a question of who is actually processing your employees' data. Consumer eSIM privacy policies typically list “third-party processors” for IT services, advertising and analytics, without naming the wholesale operators actually carrying the packets. If you can't name them, you can't assess them.
None of this is fear-mongering. Most business travel is mundane and the actual data exposure on a given trip is probably comparable to browsing hotel wifi. But “comparable to hotel wifi” isn't a standard most IT teams would sign off on for CRM access. And the risks specific to consumer eSIMs (an unclear home network, an opaque jurisdictional path, contractual terms that barely acknowledge business use) aren't things most corporate IT policies currently ask about.
The specific risks, in one place
Identifier exposure
Persistent applets on the secure element
Opaque jurisdictional path
No accountable party for incidents
The questions you can reasonably ask
You don't need to ban consumer eSIMs to take this seriously. You need to be able to answer a few basic questions about the connectivity your business data is flowing through.
Which eSIM apps are my employees using when they're abroad?
What operator is actually behind each of those apps in each country?
Where does the traffic terminate on the public internet?
Who is actually processing our employees' data along the way?
If something went wrong, who would we call?
Most businesses running on expense-reimbursed consumer eSIMs can't answer any of these. It isn't a failure of diligence. The information isn't visible to the person buying the plan, and it certainly isn't visible to the finance team approving the expense.
What a managed approach looks like
eSIM Copilot is a managed eSIM platform. That changes the answers.
The carriers behind every plan are known and documented. You can see which network your employee is on in which country, live.
The wholesale relationships are contractual and enterprise-grade, with the data-processing terms a compliance team would expect from a business telco.
You, not the employee, choose which eSIM gets used for work. Not a consumer app downloaded five minutes before boarding.
Every connection is visible in a single estate view. Which lines, which devices, which countries, which networks. In real time.
Your business has probably signed big enterprise agreements for Microsoft 365, Salesforce, CRM tooling and security software. The mobile layer is the odd one out. The connectivity your employees rely on to reach those platforms is the thing you have the least visibility into, and the thing most likely to be a consumer-grade product bought five minutes before take-off.
Find out what networks your employees are using right now.
eSIM Copilot is the fastest way to audit your current mobile estate. Talk to us and we'll walk through what moving to a managed platform actually changes.
Michael Moorfield
Founder, eSIM Copilot