- Joined
- 01.05.24
- Messages
- 254
- Reaction score
- 5,245
- Points
- 93
Cellular telephones are digital trackers in our pockets monitoring and recording every move we make. They are beacons announcing our locations, conversations, contacts, and activities to companies outside of our control. Do we use cell
phones? Absolutely. Can we reclaim our privacy without ditching the convenience of a computer in our pocket? Yes, and I will explain my methods in this chapter.

I believe that having an anonymous cellular telephone is very high on the list of vital steps to take in order to obtain true privacy. Even if you implement every tactic explained in this chapter about phone security, your device is always tracking you. If the device is on and connected to either a cellular tower or Wi-Fi
connection, it is collecting and sharing your location information. The moment you place a call or send a text, you have updated a permanent database of these
details attached to your account. Some will argue that these details are not publicly visible and only obtainable with a court order. While in a perfect world this is true, we do not live in a perfect world. There are many scenarios that could
leak your entire communications history to the world. Not to mention law enforcement has been known to break the law to go after people.
The most common scenario would be a data breach. I hear every day that a new database of customer information has been stolen and released to the wild. What
is to prevent that from happening to a cellular provider? We also know from widely publicized reports that some government agencies overstep the scope of
data collection from both Americans and non-Americans, often including telephone records. We have seen several civil legal battles incorporate cellular records into the case after submitting a subpoena to a provider. I have even heard of rare instances where a Freedom of Information Act (FOIA) request was submitted for cellular records of government employees.
Regardless of the situation, I believe that you have a great deal of data to lose by using a standard cellular telephone setup. In this chapter I will explain many ways
of maintaining privacy while remaining connected to the world.
The most common way to possess a cellular telephone is through a contract with a major provider. This typically happens when you visit a provider’s kiosk or store and are given a free phone. While this sounds like a great excuse to upgrade, you are committing to multiple years of service through this carrier. Privacy through
this method is practically impossible since the provider will mandate a financial check on you using your Social Security number. Your phone, bill, and call details
will be stored forever and connected to your name. This can all be avoided, but at
a cost.
Searching your local Craigslist community will identify hundreds of used devices for sale. You will need to be very careful. Many of these are stolen, some are broken, and others are counterfeit. I recommend filtering these results until you are only left with the following
o Devices that include the original box, cables, and manuals: This is an
indication of a one owner phone that is not likely stolen property. A person that keeps those items probably takes good care of their property.
o Sellers that have recently upgraded: Many people must have the latest and greatest devices and upgrade the moment a new version is available. While you can never believe everything that you read on Craigslist, this is an indicator of a decent phone.
o High prices and old posts: Many people believe the value of their used equipment is higher than what others are willing to pay. Seeking phones that were posted over three weeks’ prior at a high price will usually reveal people desperate to sell. Make a reasonable offer and you will be surprised how many people accept.
You may already have an unused device collecting dust. Usually, when you upgrade a phone, you are allowed to keep the old unit. You could use a device that
was previously attached to your name and account, but I urge caution in this. Financially, it makes sense to use a device that you already have. Unfortunately,
providers never truly forget what you have used. If you decide to use a phone that was previously attached to an account in your name, please know that the history
will continue to be available.
Your device possesses an IMEI (International Mobile Station Equipment Identity) number that is transmitted to the carrier. When you activate an old phone, even
as a pre-paid, that number could still jeopardize your privacy. This may seem extreme, and it may not be important to most readers. If you want to completely start over and not contaminate your new communications device, you should
obtain a unit that has no association to you.
If you are not concerned with the trail left to the cellular provider, then you can re-activate an old device. Only you can decide which is appropriate. I ask that you
consider the following question. Will anyone ever ask your cellular carrier for a list of every phone that you have owned or used? By “everyone” we include hackers,
enemy government agencies, the media, and general public after the next big data leak. In the most basic terms, your cellular telephone that was used in your real
name is permanently attached to you. There is no way to break this connection. This device tracks your location at all time and reports to your provider. That data is stored forever. Therefore, I believe that now is the time to activate a new device with a new account.
I encourage you all to start fresh with different new or previously-owned devices from strangers. You could organize a swap with someone else that you have no
official connection with. New non-subsidized phones are becoming more affordable while offering a level of privacy unavailable through a traditional contract. This might be a good time to try a different operating system. Android
versus iPhone is a matter of personal preference.
If you are looking for an extremely affordable solution, you might consider the various “Mini Card Cell Phones” available at online retailers such as Amazon. These miniature telephones usually cost $50 or less and are the size of a credit card. They do not contain touch screens, cannot use data plans, and do not work with apps. They can only make and receive calls and texts. I have these many times as “burner” phones. The lack of data usage and internet access creates a fairly secure phone for minimal communication. These are almost always based on GSM networks and nano SIM cards, and the carrier plans for these phones are minute
compared to those of modern smartphones.
slightly by device.
not. Every major U.S. provider offer these types of plans. The following list companies, have the most affordable advertised services (T-Mobile, Sprint, AT&T, Verizon)
T-Mobile “Hidden” Plan
Privacy advocates have known about a hidden pre-paid plan at T-Mobile for a while. This plan, sometimes called the “Wal-Mart Plan”, is not available at T-
Mobile stores or kiosks. You will not find it advertised on billboards. In fact, it takes effort to locate the plan online. The plan gives you unlimited text and data, and
100 minutes of talk time, per month, for only $30 or less. The talk time may seem low, but that will not matter once you have your device properly configured for free unlimited calls. The following instructions will guide you through the process of obtaining a great anonymous phone plan at an unbelievably low cost.
o Ensure that you have a cellular telephone that is T-Mobile friendly. This device needs to support the GSM network. Most iPhone and Samsung Galaxy models will work as will phones that have previously been registered with AT&T. You should check the T-Mobile website before you commit to this plan.
o Obtain a T-Mobile SIM card. Stores and kiosks will not offer you a card without committing to a plan. The T-Mobile website will send you a free card but will require you to buy a more expensive plan. A third party online order is your best option. At the time of this writing, several vendors on Amazon were offering a T-Mobile SIM card start pack, including a $30 credit, for
$24.99-$30.95. This is the best deal that I have found. Use the method explained in the previous chapter to create an anonymous Amazon account before ordering.
o Insert the SIM card in your device and turn on power. Have the SIM card serial number and the phone’s IMEI ready. On a computer, navigate to the T-Mobile prepaid activation site and enter these details. On the next page enter your anonymous information. You can provide any name and address
that you choose. This will not be verified. I recommend a common name and address that does not exist. Finally, it’s time to choose the plan. Choose the plan with unlimited text, data, and 100 minutes of talk time. Follow the
activation prompts and you should possess an active phone.
o If you can make calls, but cannot use data, manually enter the T-Mobile APN settings. Navigate to https://www.t-mobile.com/support/devices/not-sold-by-t-mobile/byod-t-mobile-data-and-apn-settings for specific instructions for your device.
You should now have a fully functioning, and fairly anonymous, cellular telephone. You should have fast 4G data, and the ability to install or uninstall any apps.
However, this device is not ready for completely anonymous use. As mentioned previously, your phone is always tracking you, your calls and texts are being logged, and the data that you send is being monitored. You will need to make
some modifications to the way that you use a cell phone. The following is an actual plan, from start to finish, that I executed for myself.
AN ACTUAL SAMPLE STRATEGY
Next, I secured the data traffic by installing a Virtual Private Network (VPN). These will be explained in much greater detail in further chapters. Basically, it encrypts the network traffic, whether through cellular or Wi-Fi, for all data transmitted to or from the device. For this specific installation, I chose MullvadVPN as the provider. This will prevent the cellular provider from having the ability to intercept the data or implant data packets with tracking codes.
The hidden T-Mobile plan includes only 100 minutes of talk time. For many, that is plenty. Most use the unlimited text and data for communication.
However, it is important to have options for placing outgoing calls and accepting incoming calls that do not count toward this limit. In order to subsidize voice calling features, and add another layer of anonymity, I added two additional free telephone lines to the phone.
GOOGLE VOICE
First, I installed the Google Voice app. Yes, I know that Google analyzes all of our data and uses it to generate targeted ads. I also suspect that Google stores every
bit of data possible from its users. However, they offer a free product that will work well for our needs.
I created a new account while connected to a public Wi-Fi at a library, used the name of an alias, and selected a number from a different area code. Will Google
still collect data on this account? Yes. Will they know it is you? No. Not if you are careful. If you use a VPN at all times on the device, Google will only know the IP
address of the VPN provider and not your cellular provider’s IP address. You can use the Google Voice app to send and receive unlimited text messages. Please
note that while you can delete messages within the app, it does not delete them from the “Trash”. You will need to access this account from a web browser in
order to properly delete messages from the account.
HANGOUTS VOICE OR DIALER
Next, I downloaded the Google Hangouts voice Dialer app. This will allow you to make free calls from your device, using your data connection, without sacrificing any talk minutes. The calls will appear to come from your Google Voice number. The VPN will prevent Google from knowing where you are or which internet connection you are using. This solves the problem of free outgoing telephone calls, but not the issue of incoming calls. If someone calls your Google Voice number, they will either be forwarded to your real number (not recommended), or voicemail
(recommended). This will vary based on your user settings. Instead, we will use another service to fill this void.
BURNER
Burner allows you to create semi-anonymous, disposable phone numbers. These numbers can send and receive calls without requiring you to give out your real phone number. If you need to make a call or give out a number, you set up a new burner. You can choose your area code and “size” of the burner you need. The size is determined by how many days it lasts before self-destructing, how many texts
and voice minutes are allowed, and whether or not it can send and receive photos. The burner will be created and you can then send and receive calls at this number.
It is important to note that the makers of Burner, Ad Hoc Labs, explicitly acknowledge in their privacy policy and terms of service that they will comply with law enforcement requests for information about the use of their product. They also acknowledge that they maintain only limited information. What it does offer
is a thin layer of privacy for everyday situations when you don’t want to give out your real number or one of the other, more durable options you have set up on
your device.
PRIVACY.COM
privacy.com was mentioned earlier in the previous guides I posted and when explaining masking credit card numbers.
WI-FI ONLY
You may have noticed that the majority of the services that I recommended do not necessarily require a cellular service provider. They only require internet access
through cellular data or Wi-Fi data. If desired, you could eliminate the activation of cellular service and rely on wireless internet alone. The pitfall in this plan is that your device will be useless for communication when you cannot find open access.
I always keep two devices operational at all times. My primary device possesses cellular connectivity and the secondary device only contains a Wi-Fi connection. While the setup for the secondary device is very similar to the primary unit, there are a few differences.
o My secondary phones never attach to a wireless internet connection that I use with my primary device or laptop. This prevents me from creating an
association between the two devices. If I logged into two Google Voice accounts, on two unique devices, from the same network, Google would now know that I am the same person on both accounts.
o The secondary device possesses a Google account that was not created on a network connection that my primary devices access. Again, this creates a trail to the primary unit. I use public Wi-Fi to create, activate, and connect these accounts directly from my secondary device. While this seems careless in regards to security, it is optimal for secondary devices that you do not want it associated with your real identity.
o The secondary phone remains turned completely off until needed. It is always in airplane mode with the Wi-Fi enabled. All location services are disabled. These actions prevent your movements from being collected and stored.
o Finally, for the truly paranoid, I always turn my primary devices off before turning my secondary device on. I also confess that I do this while in motion so that the secondary device is not turned on at the same location the primary was powered down. Again, this prevents Google and other interested parties from knowing that I may be the same person using these devices.
Is this all overkill? Some may think so. However, my experience supports my paranoia. I have witnessed investigations involving Google and other similar companies. They know more than you think. They know that you have multiple Gmail accounts under various names. They record this activity and will disclose all
of your related accounts if given an appropriate court order. More concerning is when their data is compromised during a breach and all collected information is exposed.
CONCLUSION :
Hope this guide helps you secure your telephone numbers.
STAY SAFE !
phones? Absolutely. Can we reclaim our privacy without ditching the convenience of a computer in our pocket? Yes, and I will explain my methods in this chapter.

I believe that having an anonymous cellular telephone is very high on the list of vital steps to take in order to obtain true privacy. Even if you implement every tactic explained in this chapter about phone security, your device is always tracking you. If the device is on and connected to either a cellular tower or Wi-Fi
connection, it is collecting and sharing your location information. The moment you place a call or send a text, you have updated a permanent database of these
details attached to your account. Some will argue that these details are not publicly visible and only obtainable with a court order. While in a perfect world this is true, we do not live in a perfect world. There are many scenarios that could
leak your entire communications history to the world. Not to mention law enforcement has been known to break the law to go after people.
The most common scenario would be a data breach. I hear every day that a new database of customer information has been stolen and released to the wild. What
is to prevent that from happening to a cellular provider? We also know from widely publicized reports that some government agencies overstep the scope of
data collection from both Americans and non-Americans, often including telephone records. We have seen several civil legal battles incorporate cellular records into the case after submitting a subpoena to a provider. I have even heard of rare instances where a Freedom of Information Act (FOIA) request was submitted for cellular records of government employees.
Regardless of the situation, I believe that you have a great deal of data to lose by using a standard cellular telephone setup. In this chapter I will explain many ways
of maintaining privacy while remaining connected to the world.
The most common way to possess a cellular telephone is through a contract with a major provider. This typically happens when you visit a provider’s kiosk or store and are given a free phone. While this sounds like a great excuse to upgrade, you are committing to multiple years of service through this carrier. Privacy through
this method is practically impossible since the provider will mandate a financial check on you using your Social Security number. Your phone, bill, and call details
will be stored forever and connected to your name. This can all be avoided, but at
a cost.
THE DEVICE
First of all, you will need a proper telephone. I never recommend any devices that are marketed toward pre-paid buyers. These are always unpopular models that no one else wants. They are slow, have poor battery performance, and will only meet the minimum hardware requirements to function. Additionally, they are overpriced. At the time of this writing, a local grocery store was selling an Android smartphone for $200 that was available on eBay for less than $150. Either way, it was not a powerful device. Instead, consider a used phone.Searching your local Craigslist community will identify hundreds of used devices for sale. You will need to be very careful. Many of these are stolen, some are broken, and others are counterfeit. I recommend filtering these results until you are only left with the following
o Devices that include the original box, cables, and manuals: This is an
indication of a one owner phone that is not likely stolen property. A person that keeps those items probably takes good care of their property.
o Sellers that have recently upgraded: Many people must have the latest and greatest devices and upgrade the moment a new version is available. While you can never believe everything that you read on Craigslist, this is an indicator of a decent phone.
o High prices and old posts: Many people believe the value of their used equipment is higher than what others are willing to pay. Seeking phones that were posted over three weeks’ prior at a high price will usually reveal people desperate to sell. Make a reasonable offer and you will be surprised how many people accept.
You may already have an unused device collecting dust. Usually, when you upgrade a phone, you are allowed to keep the old unit. You could use a device that
was previously attached to your name and account, but I urge caution in this. Financially, it makes sense to use a device that you already have. Unfortunately,
providers never truly forget what you have used. If you decide to use a phone that was previously attached to an account in your name, please know that the history
will continue to be available.
Your device possesses an IMEI (International Mobile Station Equipment Identity) number that is transmitted to the carrier. When you activate an old phone, even
as a pre-paid, that number could still jeopardize your privacy. This may seem extreme, and it may not be important to most readers. If you want to completely start over and not contaminate your new communications device, you should
obtain a unit that has no association to you.
If you are not concerned with the trail left to the cellular provider, then you can re-activate an old device. Only you can decide which is appropriate. I ask that you
consider the following question. Will anyone ever ask your cellular carrier for a list of every phone that you have owned or used? By “everyone” we include hackers,
enemy government agencies, the media, and general public after the next big data leak. In the most basic terms, your cellular telephone that was used in your real
name is permanently attached to you. There is no way to break this connection. This device tracks your location at all time and reports to your provider. That data is stored forever. Therefore, I believe that now is the time to activate a new device with a new account.
I encourage you all to start fresh with different new or previously-owned devices from strangers. You could organize a swap with someone else that you have no
official connection with. New non-subsidized phones are becoming more affordable while offering a level of privacy unavailable through a traditional contract. This might be a good time to try a different operating system. Android
versus iPhone is a matter of personal preference.
If you are looking for an extremely affordable solution, you might consider the various “Mini Card Cell Phones” available at online retailers such as Amazon. These miniature telephones usually cost $50 or less and are the size of a credit card. They do not contain touch screens, cannot use data plans, and do not work with apps. They can only make and receive calls and texts. I have these many times as “burner” phones. The lack of data usage and internet access creates a fairly secure phone for minimal communication. These are almost always based on GSM networks and nano SIM cards, and the carrier plans for these phones are minute
compared to those of modern smartphones.
FACTORY RESTORE
Regardless of the operating system, previous owner, or current state of the device, you should conduct a factory restore. This eliminates all personal data from any previous user and replaces the phone’s operating system in the identical state as the day it was first purchased. This will ensure that there are no unique configurations that could jeopardize your privacy. The process for this will varyslightly by device.
CELLULAR SERVICE
After you have performed a factory reset, you are ready to activate it on a cellular network. For complete privacy, I only recommend prepaid plans. Subsidized contract plans require a real name or credit check but prepaid plans generally donot. Every major U.S. provider offer these types of plans. The following list companies, have the most affordable advertised services (T-Mobile, Sprint, AT&T, Verizon)
T-Mobile “Hidden” Plan
Privacy advocates have known about a hidden pre-paid plan at T-Mobile for a while. This plan, sometimes called the “Wal-Mart Plan”, is not available at T-
Mobile stores or kiosks. You will not find it advertised on billboards. In fact, it takes effort to locate the plan online. The plan gives you unlimited text and data, and
100 minutes of talk time, per month, for only $30 or less. The talk time may seem low, but that will not matter once you have your device properly configured for free unlimited calls. The following instructions will guide you through the process of obtaining a great anonymous phone plan at an unbelievably low cost.
o Ensure that you have a cellular telephone that is T-Mobile friendly. This device needs to support the GSM network. Most iPhone and Samsung Galaxy models will work as will phones that have previously been registered with AT&T. You should check the T-Mobile website before you commit to this plan.
o Obtain a T-Mobile SIM card. Stores and kiosks will not offer you a card without committing to a plan. The T-Mobile website will send you a free card but will require you to buy a more expensive plan. A third party online order is your best option. At the time of this writing, several vendors on Amazon were offering a T-Mobile SIM card start pack, including a $30 credit, for
$24.99-$30.95. This is the best deal that I have found. Use the method explained in the previous chapter to create an anonymous Amazon account before ordering.
o Insert the SIM card in your device and turn on power. Have the SIM card serial number and the phone’s IMEI ready. On a computer, navigate to the T-Mobile prepaid activation site and enter these details. On the next page enter your anonymous information. You can provide any name and address
that you choose. This will not be verified. I recommend a common name and address that does not exist. Finally, it’s time to choose the plan. Choose the plan with unlimited text, data, and 100 minutes of talk time. Follow the
activation prompts and you should possess an active phone.
o If you can make calls, but cannot use data, manually enter the T-Mobile APN settings. Navigate to https://www.t-mobile.com/support/devices/not-sold-by-t-mobile/byod-t-mobile-data-and-apn-settings for specific instructions for your device.
You should now have a fully functioning, and fairly anonymous, cellular telephone. You should have fast 4G data, and the ability to install or uninstall any apps.
However, this device is not ready for completely anonymous use. As mentioned previously, your phone is always tracking you, your calls and texts are being logged, and the data that you send is being monitored. You will need to make
some modifications to the way that you use a cell phone. The following is an actual plan, from start to finish, that I executed for myself.
AN ACTUAL SAMPLE STRATEGY
First, for example, I purchased a used Samsung Galaxy S4 on Craigslist. It was listed at $125, and the ad had been posted over 30 days prior. I offered $75 and obtained the device at that price. I conducted a factory reset and rooted the phone. I removed all Samsung and Verizon bloatware. I purchased a T-Mobile SIM card and activated
the hidden plan as discussed. Next, I secured the data traffic by installing a Virtual Private Network (VPN). These will be explained in much greater detail in further chapters. Basically, it encrypts the network traffic, whether through cellular or Wi-Fi, for all data transmitted to or from the device. For this specific installation, I chose MullvadVPN as the provider. This will prevent the cellular provider from having the ability to intercept the data or implant data packets with tracking codes.
The hidden T-Mobile plan includes only 100 minutes of talk time. For many, that is plenty. Most use the unlimited text and data for communication.
However, it is important to have options for placing outgoing calls and accepting incoming calls that do not count toward this limit. In order to subsidize voice calling features, and add another layer of anonymity, I added two additional free telephone lines to the phone.
GOOGLE VOICE
First, I installed the Google Voice app. Yes, I know that Google analyzes all of our data and uses it to generate targeted ads. I also suspect that Google stores every
bit of data possible from its users. However, they offer a free product that will work well for our needs.
I created a new account while connected to a public Wi-Fi at a library, used the name of an alias, and selected a number from a different area code. Will Google
still collect data on this account? Yes. Will they know it is you? No. Not if you are careful. If you use a VPN at all times on the device, Google will only know the IP
address of the VPN provider and not your cellular provider’s IP address. You can use the Google Voice app to send and receive unlimited text messages. Please
note that while you can delete messages within the app, it does not delete them from the “Trash”. You will need to access this account from a web browser in
order to properly delete messages from the account.
HANGOUTS VOICE OR DIALER
Next, I downloaded the Google Hangouts voice Dialer app. This will allow you to make free calls from your device, using your data connection, without sacrificing any talk minutes. The calls will appear to come from your Google Voice number. The VPN will prevent Google from knowing where you are or which internet connection you are using. This solves the problem of free outgoing telephone calls, but not the issue of incoming calls. If someone calls your Google Voice number, they will either be forwarded to your real number (not recommended), or voicemail
(recommended). This will vary based on your user settings. Instead, we will use another service to fill this void.
BURNER
Burner allows you to create semi-anonymous, disposable phone numbers. These numbers can send and receive calls without requiring you to give out your real phone number. If you need to make a call or give out a number, you set up a new burner. You can choose your area code and “size” of the burner you need. The size is determined by how many days it lasts before self-destructing, how many texts
and voice minutes are allowed, and whether or not it can send and receive photos. The burner will be created and you can then send and receive calls at this number.
It is important to note that the makers of Burner, Ad Hoc Labs, explicitly acknowledge in their privacy policy and terms of service that they will comply with law enforcement requests for information about the use of their product. They also acknowledge that they maintain only limited information. What it does offer
is a thin layer of privacy for everyday situations when you don’t want to give out your real number or one of the other, more durable options you have set up on
your device.
PRIVACY.COM
privacy.com was mentioned earlier in the previous guides I posted and when explaining masking credit card numbers.
WI-FI ONLY
You may have noticed that the majority of the services that I recommended do not necessarily require a cellular service provider. They only require internet access
through cellular data or Wi-Fi data. If desired, you could eliminate the activation of cellular service and rely on wireless internet alone. The pitfall in this plan is that your device will be useless for communication when you cannot find open access.
I always keep two devices operational at all times. My primary device possesses cellular connectivity and the secondary device only contains a Wi-Fi connection. While the setup for the secondary device is very similar to the primary unit, there are a few differences.
o My secondary phones never attach to a wireless internet connection that I use with my primary device or laptop. This prevents me from creating an
association between the two devices. If I logged into two Google Voice accounts, on two unique devices, from the same network, Google would now know that I am the same person on both accounts.
o The secondary device possesses a Google account that was not created on a network connection that my primary devices access. Again, this creates a trail to the primary unit. I use public Wi-Fi to create, activate, and connect these accounts directly from my secondary device. While this seems careless in regards to security, it is optimal for secondary devices that you do not want it associated with your real identity.
o The secondary phone remains turned completely off until needed. It is always in airplane mode with the Wi-Fi enabled. All location services are disabled. These actions prevent your movements from being collected and stored.
o Finally, for the truly paranoid, I always turn my primary devices off before turning my secondary device on. I also confess that I do this while in motion so that the secondary device is not turned on at the same location the primary was powered down. Again, this prevents Google and other interested parties from knowing that I may be the same person using these devices.
Is this all overkill? Some may think so. However, my experience supports my paranoia. I have witnessed investigations involving Google and other similar companies. They know more than you think. They know that you have multiple Gmail accounts under various names. They record this activity and will disclose all
of your related accounts if given an appropriate court order. More concerning is when their data is compromised during a breach and all collected information is exposed.
CONCLUSION :
Hope this guide helps you secure your telephone numbers.
STAY SAFE !