Which still leaves me with the same question: how is that protected from malicious software trying to provision the embedded SIM when it shouldn’t be allowed to do so?From the PDF:
With Remote SIM Provisioning, there are no traditional SIM cards1 . Instead there is an embedded SIM (called an eUICC), which may be soldered inside the mobile device, that can accommodate multiple SIM Profiles – each Profile comprising of the operator and subscriber data that would have otherwise been stored on a traditional SIM card (the red and blue dots in the previous section). In (1), the end user sets up a contract with their chosen mobile network operator, and in the case of a Consumer solution, instead of receiving a SIM card they will receive instructions on how to connect their device to the operator’s Remote SIM Provisioning system. In this example a QR (Quick Response) code is used. The QR code contains the address of the Remote SIM Provisioning system (SM-DP+ server within the GSMA specifications), which allows the device to connect to that system (2) and securely download a SIM Profile. Once the Profile is installed and activated, the device is able to connect to that operator’s network (3).
TL DR Remote SIM provisioning means you get connected to a remote server who serves your device with the profile required to connect. The profile is then stored on the embedded SIM. Multiple profiles can be stored on the embedded SIM.