home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.internet.wireless      Fun with wireless Internet access      55,960 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 54,991 of 55,960   
   Robin Goodfellow to scorpion   
   Re: When you use a free 2nd line on your   
   16 Oct 21 18:39:36   
   
   XPost: alt.privacy, alt.privacy.anon-server   
   From: Ancient-of-Days@Heaven.Net   
      
   scorpion  asked   
   > That's an error.  Using a primary phone and associating it with   
   > a "2nd-line throwaway".   
      
   I'm not worried if they trace it.   
   I'm just trying to figure out how they trace it.   
      
   For example, sometimes when you use the 2nd line for a web site account   
   authorization, they seem to KNOW it's a 2nd line. But other times they don't   
   care.   
      
   But for the ones who know it's a second line, how do they know?   
      
   > The "2nd-line" must have an association with a primary phone   
   > number to function, hence there are a multitude of "temporary"   
   > records created in numerous places most would never consider.   
      
   Yeah. But where?   
   Are those 2ndLine-to-RealPhone indices accessible to we mere mortals?   
      
   > The only assurances you have are with the party providing the   
   > temporary "2nd-line".  Those assurances don't extend to other   
   > carrier parties once communications leave the point of initial   
   > entry.   
      
   I'm not aware that the 2nd-line cellphone apps assure you of anything.   
      
   > Also, governments monitor cellular calls and look for frequent   
   > patterns involving specific numbers.  One or two random calls   
   > may disappear in the billions of calls made each day, but   
   > regardless of any anonymity claims made by a provider of   
   > throwaway numbers, a call was made and a record established.   
   > EMC ($torage) and Ci$co (Buggy network equipment...) are both   
   > participant$ in this deception.   
   >   
   > Someone would have to be interested enough to look for the   
   > transaction and work backwards from the endpoint.   
   >   
   > Did you create interest?   
      
   I'm sure they'd be bored to death tracking my phone calls.   
   But that isn't the question of whether or not they'll be bored.   
      
   The question is how can we find these tracking sites they may use?   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca