What Information Can be Found With a Phone Number

When you consider connecting the dots to create a picture, imagine your phone number as the dot that connects everything else they know about you.  Even if they have it all, it is up to you whether or not they have the dot with your phone number to complete the picture.phone hacker

All it takes to find everything is to just find that phone number connected to one of the many things we already know like your facebook account (which requires a phone number) or any shopping card from a corporate retailer you may have given your number to.  Do you still believe those corporations don’t sell or trade your private information?  Well even if you do, it doesn’t matter because they are all systematically hacked a bare minimum of every 3-5 years.

Any email you get for free is being picked off as we speak.  It doesn’t matter if you gave the provider any phone information or not.  All you have to do is reveal your phone number in the text of an email and boom!! Mission accomplished!!  Free emails mine everything that comes across your screen, including drafts.  Why do you think they always want you to “secure” your email account with a phone number?

If you have connected to an old friend or new business acquaintance by email or social media and given them your phone number in a message it is connecting you to that phone number and that media account.

It’s called the world wide WEB for a reason.  Everything you do is sucked into a giant computer and maintained for profit and micromanagement of the public.  A good researcher can take an unknown phone number and use cell towers to “pair” it with other devices already known to be in your name.  For example: a burner phone (see our article on burner phones https://privacyliving.com/2016/05/17/what-is-a-burner-phone-how-can-it-help-me/ ) can have its owner pegged pretty efficiently when it is continually detected near the same owner’s normal cell phone or other smart device.  This can include cars with smart devices embedded in them.  By detecting an unknown phone continually traveling to the same places and staying at the same address all night along with already known devices it is easy to deduce that you are the owner.

As you can see, being truly anonymous requires some serious work but it is possible.  You can always pick up a copy of “Disappear in 24 Hours” by Lonn E Wolfenstein if you want to do a total makeover.  The book is available at Brave New Books in Austin TX or can be ordered by clicking the products link at the top of this page.

Haunted By Hackers: A Digital Ghost Story

A fascinating tale of what happens when you piss off a hacker, who happens to live in another country. The moral of the story is that in the 21st century, no one is safe from cyber terrorism.

Haunted by hackers: A suburban family’s digital ghost story

human electronic

Darknet, Dark Web & The Tor Browser

Have you ever wondered what the darknet or Dark Web are? They are the deepest, darkest places on the web. Places full of illicit activity, as well as good guys trying to stay private.

“Darknet sites are hosted on regular servers, but to access them you need special software, usually something that encrypts all users’ traffic and allows them relative anonymity. Get set up with the right technology and presto: You can see a second, parallel Internet.” -Wired

dark web hacker

There are some surprising things about the Dark Web. It’s been around for some time, at least since 2003. Tor, the encryption software and platform used in the Dark Web was actually developed by the US Government and is open source and free. And by some estimates, the vast majority of users of the Dark Web are law-abiding citizens who value their privacy.

One analogy that has been made regarding the Dark Web is comparing it to an iceberg. The top of the iceberg is the every day internet we use, such as Facebook, Google, YouTube and the like. But what’s under water is a much greater volume of information and activity – this is the Dark Web or Darknet.

deep web iceberg

More information regarding the Dark Web/Darknet: