13 Comments
User's avatar
A doc reads's avatar

Yikes. So, we should all get a burner phone for any thing we do online? Such as ordering from a retailer such as Lands End for example? For making comments on substack??

I am such a nincompoop. A worried nincompoop!

Secrets of Privacy's avatar

you can probably get away with a VOIP number in most cases, but some services require non-VOIP numbers.

And as always, it’s ultimately up a personal choice on whether this is necessary or not.

ToxSec's avatar

great read. it’s pretty crazy the more you look into all this how prolific these problems are.

glad to have a researcher like yourself keeping us all informed!

Secrets of Privacy's avatar

Phone numbers morphed into a universal ID number slowly and quietly and most people didn’t notice. Now we’re playing catchup.

Outdoorluvr's avatar

Why I have never used my cell phone for online anything. I realize, though, that many folks can't afford (or don't want) other means of internet access. You always post good info for consumers to consider, Secrets! But the best thing, is that you actually read comments and answer questions! Thank you 🙂

Secrets of Privacy's avatar

Comments are the best part - can’t miss out on those!

A reading experience's avatar

Does a vpn mask any of this when you visit a site?

FanDweller's avatar

Will a Hushed lifetime phone number work or is it the same type of VoIP as a Google voice number?

When you say they’re increasingly flagged, I assume you mean they can’t be used for 2factor authentication?

Secrets of Privacy's avatar

for some services that ask for phone number when signing up, they will reject VOIP numbers. That would apply to Hushed as well I believe.

Best solution I've found is to buy a pre-paid, $5-$10/month sim card for an old phone.

Note none of this is to hide from the NSA, FBI, etc. that's not our lane. Our fight is against data brokers, scammers, etc.

Decode the World's avatar

All phone numbers tie into the same centralized system (JASPER). There is zero privacy with the phone network. Many state actors and criminal gangs now have access to this back end. Phone is not safe for 2FA either, it can be compromised with a SIM swap, which happened to me three times. Once the crooks have your SIM, they have your number. The bank sends the code to your phone number now controlled by them and they have your 2FA code and access to your money. Best practice is a dedicated tablet with 2FA software on it, stored powered off in a Faraday bag.

Secrets of Privacy's avatar

Using your 2FA on a tablet is a good idea.

Secrets of Privacy's avatar

makes it hard to use 2FA when you're traveling or on the road though. you always have to have your tablet handy.

Decode the World's avatar

You do have to carry another device, but you can use an old pixel 6 phone with graphene and a 2FA program which is smaller and light weight. Keep in your backpack or purse either in a hotel safe or on your person. Remove the SIM and put the device into airplane mode. You'll only need to keep it charged and the time synced correctly and you can do that manually matching it to your phone time. I only use this for account with money inside such as Amazon, banks and crypto exchanges. I haven't been robbed yet doing this, even though I've been the victim of SIM swaps three times!