Two-Factor authentication has always been a platform ruse for gathering data on platform users. Twitter was just one company amid a large number of on-line platforms who pushed “two factor authentication” as a security measure. The real motive of TFA was to gain the user cell phone number in order to gain more specific information about the user.
Today multiple media outlets are reporting the FTC and Twitter have agreed to a settlement where Twitter will pay a $150 million settlement for violating user privacy and selling user data. Twitter collected cell phone and email account information for users under the auspices of user security. However, Twitter actually planned to use the cell phone and email data to sell a more comprehensive package of user identification to advertisers.
(Reuters) – […] The company will pay $150 million as part of the settlement announced by the Justice Department and the Federal Trade Commission (FTC). In addition to the monetary settlement, the agreement requires Twitter to improve its compliance practices.
The complaint said that the misrepresentations violated the FTC Act and a 2011 settlement with the agency.
“Specifically, while Twitter represented to users that it collected their telephone numbers and email addresses to secure their accounts, Twitter failed to disclose that it also used user contact information to aid advertisers in reaching their preferred audiences,” the complaint said.
[…] “Twitter obtained data from users on the pretext of harnessing it for security purposes but then ended up also using the data to target users with ads,” said FTC Chair Lina Khan in a statement. “This practice affected more than 140 million Twitter users, while boosting Twitter’s primary source of revenue.”
The complaint also alleges that Twitter falsely said it complied with the European Union-U.S. and Swiss-U.S. Privacy Shield Frameworks, which bar companies from using data in ways that consumers do not authorize.
Twitter’s settlement follows years of fallout over the privacy practices of tech companies.
Revelations in 2018 that Facebook, the world’s biggest social network, was using phone numbers provided for two-factor authentication to serve ads enraged privacy advocates.
Facebook, now called Meta (FB.O), similarly settled with the FTC over the issue as part of a $5 billion agreement reached in 2019. (read more)
Two Factor Authentication (TfA) and the 5G telecommunications network work hand in glove.
By connecting the registered user id to their cell phone number, advertisers can target platform users with far more granular detail. 3G networks tracked user history to build the user portfolio. 5G networks bridge the space between user identity, cell phone, and geolocation services and apps on cell phones.
Cell phones are registered to people. The TfA purpose was to identify the actual people behind the registered accounts and then monitor them for enhanced targeting. The data of the user is monetized and your unique identity is sold to advertisers.
This is one of the reasons CTH does not track anyone, or ask for any data on any user. We do not monetize users at The Conservative Treehouse, and all of our engagement systems, including the comment system, are built around the principle that user privacy is our number one priority.
Any engagement platform that asks you to enter your cell phone as part of the registration process is going to have the ability to sell your data and user identity to a third party. It really is that simple.
Wondering why I feel the need to be kissed right about now. And I have never even been a Twitter user.
Thanks, CTH/Sundance! We appreciate you!
Also, the US government gets the fines. What do we get? Spam calls and no effort by the government to prevent it.
I was getting a large number of spam calls every day until I found a toggle in Settings that silences calls from anyone not on my contact list. I still get the calls but my phone handles them. If it is anything legitimate they will leave a message.
Ha! I deleted the twitter app off my phone because it quit working unless I fed it my phone number. Now I just bookmark people in my browser instead of following them.
Ditto…. Your cell phone is a leash: Who’s controlling you?
Yes – I keep thinking about going back to a flip phone and then maybe getting a tablet for home internet (at the moment my phone is my only device, no computer).
I also noticed after purchase, that the battery doesn’t come out of this phone. I’m not a fan of that, either.
Oh, it WILL come out,…if you use a big enough hammer, I GURANTEE it WILL come out,…phone won’t be any good after,…but it WILL come out.
Just ask Hillary.
😂
Decades ago a friend once said we think we are tagging animals in the wild to observe their behavior but the day will come when all humans will be tagged for similar if not worse purposes.
Brilliant analogy.
.
You already are. Companies keep your purchase data when you use credit card. RFID tags on products in supermarkets let them know whether you bought milk with that cereal. GPS in most automobiles tracks you all over the place. And you’re totally “tagged” if you carry a cell phone everywhere on your person.
.
Why everybody is still whining and worrying about privacy is what I don’t get. Figured out long ago that it doesn’t exist any more. Maybe hermits still enjoy but how many of these are left in the world?
.
J6. For example. Every single person arrested was tracked through their cell phones and credit card purchases. And how many people have got into trouble from being video’d by someone’s cell phone, or just because of something stupid they just had to post on facebook.
You may not care if Walgreens knows that you buy two sixpacks and jock itch powder, or if “Alexa” listens in while you’re having sex, but you still need to be aware for the times that it might matter.
.
swissik: This way to the gas chambers, ladies and gentlemen.
That’s why.
Yeah, me too, it’s been gone a very long time.
Unless you put the phone in a Faraday bag. Not expensive at all. Or easily & cheaply make your own.
.
I totally recommend faraday bags for all equipment and credit cards. They’re cheap and come in all sizes — wallers, cell phone carriers, purse and luggage sizes. For going somewhere, though, as soon as you take the phone out to do anything on it, bingo, you’re nabbed.
.
I had never heard of them till I saw your comment. Then I did an internet search. I will definitely be getting one. Thanks!
What is the functional difference between:
Long press off?
And
Kept in Faraday bag?
Your phone can still be tracked if the phone is off but the battery is not removed.
The Faraday bag stops the tracking.
Watch 2000 mules to see how phone location data can be used. Same with the Jan 6. And lots more.
Retired Magistrate here: Thank you CTH for protecting the privacy for those of us who comment here.
Sincere Ditto!
So Radio Shack was never really in the business of selling batteries..
It was all a ruse to collect phone #s, and sell them to the manufacturers of vibrators!
I have some firsthand experience with that particular company….
Back in the 70s and 80s, the collection of personal address data at Point of Sale was for the company to build a mailing list for Radio Shack’s monthly direct mail multipage advertisement brochures. I was never aware that Tandy Corp. sold that data anywhere else. To the contrary, they jealously guarded that info. I cannot speak to what ever was done after the early ’90s.
The data of the user is monetized and your unique identity is sold to advertisers….
And WHO ELSE received this data????????
Here’s a suggestion as to how what you’re implying works:
“The tracking of hundreds of Michigan Capitol protesters’ cellphones from two rallies this spring has raised questions about protecting privacy rights, while testing limits of what location data can predict about the spread of the novel coronavirus from packed public events…
“They ended up pretty much scattered across the state,” said Dr. Rob Davidson, executive director of Committee to Protect Medicare, a west Michigan emergency room physician and a Democratic former congressional candidate…
“The protesters agreed to be tracked because the information was collected from “opt-in” cellphones, in which the user at some point agreed to terms allowing for such data to be collected by firms such as VoteMap, said VoteMap CEO Jennifer McEwan.”
Don’t get caught up in the details, because there are some differences between this example and Twitter’s.
The big picture point is social media platforms have other clients interested in buying your data, including activists groups such as VoteMap, who then resell it to government agencies and political campaign organizations.
Also consider the likelihood that whoever is supplying the coffee to Jack’s Magic Coffee Shop probably has the right of first purchase to bulk data bundles.
Does anyone but me (cellphone-less) ever contemplate a day in the near future when the populace finally wakes up and throws their cellphone in the dustbin? It’s the key to unplugging all things NWO.
Have started leaving mine home when doing things locally to begin weaning myself off of it. If they ever issue QR Codes, I’ll cancel my cell carrier account; smash my cell phones into bits and throw it away.
I do the same, Chooseamerica. I leave the cell phone at home as much as possible, and when I do take it with me, I often leave it in my vehicle overnight. Likewise, many times during the week, I have no idea where I last left it in my house. I’m not a forgetful person–I always know where my keys and glasses are–but the cell phone? Meh….
Since pay phones are practically extinct you might need your phone. Keep it in a Faraday bag when out and about. You can’t be tracked but handy if you need it.
I leave my phone at home on the bedroom charger. I miss a lot of calls, because I do not constantly have it at my side unless I’m expecting a call. I check it every couple of hours in case I receive an important call.
We were just at a parking lot where the ONLY way to pay was to scan a QR code and pay from that ( or text a number to start the process). If you don’t have a cellphone, there would be no way to pay to park. It was an insecure way to pay, too, as we were standing on the lot inputting our car license, inputting credit card information (when we would have preferred not to pay with a credit card), all while juggling the contents of purses and wallets.
They think they have us captive because of this technology.
If enough of us quit playing into their little scheme, they’ll have to make changes.
Liberty, I was told those QR situations are so they can track you if you move your car. The authorities told me if I just drove around in that area I could find a pay to park meter that issues the sticker to put on my dash.
Dont know if that’s true in all cities but worth a try. It did work for me.
Uh…what?
Been seeing a lot of these sorts of comments recently.
Yeah, trying to pit us against each other.
I’m fortunate that I live in an area with little cell service so mine sits nex to the couch unless I want to send a pic or text (which may take several hours to send). I’ve never gotten on the internet with it because the screen is too small for me to read anything. I used to use waze to drive to NC before my mother passed 3 yrs ago. So my use is very minimal. And I really have no interest in doing more with it.
I have a landline for any calls I want to make.
I got rid of mine.
The first few times leaving the house with the image of ‘oh my goodness, what if ….?’ questions running through the mind made me realize just how addictive those nifty hand-held devices are. They’re a drug, a visual hypnotic inducing drug.
I think you will need to use cash in stead of credit cards too.
Make twitter send a check for $100 to every user who signed up for TFA instead of sending the dough to the Feds.
So, does the government get all that money? How does that help the poor saps that had their privacy violated?
Exactly!
.
Let’s review:
The article tells us that Facebook was also fined, and entered into a $5 billion agreement with several countries, in 2019.
In 2020, Facebook ‘donated’ over $500 million to various ‘drop box’ communities in these United States, most of whom have not revealed any details on exactly where that large a sum was distributed . . .
Will Twitter be ‘donating’ the amount of this fine to midterm efforts for those they don’t shadowban?
Paypal asks for my cell phone number every time I visit their site.
The answer is still “not now.”
I really wish there were a “Not Ever” option.
There is. I deleted my PayPal account when they went Uber Woke Commie last year. Thats “Not ever” in my book.
How lovely for you. I’m a freelance proofreader/editor, working exclusively online. I need to get paid somehow and as far as I’m aware there’s not a conservative alternative yet.
There may be at least one, possibly several alternatives Treeclimber but I don’t want you to detail your particular process 0r requirements here.
Some people are working hard to provide payment processing systems that aren’t vulnerable to “wokism” and the anti-freedom policies that it is engendering. Check out this site and some of the products they review – maybe one will work for you depending on your requirements.
https://paralleleconomies.com/5-patriotic-payment-alternatives-for-ecommerce/
It’s hard to be followed if you don’t participate in the social media farce to begin with.
/Salute
Does anyone still believe that these people are not evil bastards?
NO!!
There will always be fools in this world.
given we are discussing technology companies:
https://arstechnica.com/tech-policy/2022/05/democrats-say-google-location-data-could-be-used-to-prosecute-women-for-abortions/
quote:
While Google uses location data to target online ads, the company often turns over the data to law enforcement officials who obtain court orders, the Democrats wrote. “This includes dragnet ‘geofence’ orders demanding data about everyone who was near a particular location at a given time,” they wrote, adding that “Google received 11,554 geofence warrants in 2020.”
iPhones also use location services, though the lawmakers seem to be satisfied with Apple’s privacy promises. Among other things, Apple says that if location services are turned on, geo-tagged locations of nearby Wi-Fi hotspots and cell towers are sent “in an anonymous and encrypted form to Apple” to augment a “crowd-sourced database of Wi-Fi hotspot and cell tower locations.”
With the Find My feature that can locate lost devices, Apple says it “retains location information and makes it accessible to you for 24 hours, after which it is deleted” and that “device location services information is stored on each individual device and Apple cannot retrieve this information from any specific device.”
k\noting: NOT advocating iphone tech! simply to reference the current state of play wrt privacy/security!
God Bless America
Use a Faraday bag for your phone.
I went to get a Twitter account at the beginning of Trump’s first term. Wouldn’t let me do so without a phone number. No Twitter account.
Never gave it to FB either, despite their repeated attempts to get me to.
Now someone do PayPal. That crap’s annoying.
Same with Truth Social and Frank Speech. I don’t have a cellphone and never will
$150mm would be about $2 per Twit user in the US.
Twitter by the Numbers: Stats, Demographics & Fun Facts
https://www.omnicoreagency.com/twitter-statistics/
Eliminate the bot and fake accounts, and it might get as high as $10 per user.
I don’t have Twitter, so not sure whether TfA was a requirement across all countries. But if it was (is?) then it should make it easy to find out how many bots are in the system. Total number of active users minus number of users who provided their phone number. I don’t think you can register a phone number for a bot (unless Twitter made up numbers to make it look legit).
You totally can. Twitter is lying about how many bots there are but it’s very difficult to distinguish bots from regular users. There are web development tools designed to produce synthetic interactions at scale with a web app so you can see how your app behaves under a real-world load. Such tools are trivial to repurpose into bot farms.
Watch the fine be forwarded to leftist hacks.
How does this effect the Musk deal? Raise stock value, lower stock value,…improve or damage ‘public perception’ of the company?
As for the fine, its chump change; they recieved far more in revenue, from selling the data, thhan they paid in fines, which defeats the whole purpose of the fines.
Even the “Civil Division” of DOJ needs to be gutted, root and branch.
Ditto FTC, SEC and all agencies, rotten to the core.
How many times more than 150 million did twitter make off of the added information?
Did twitter take this fine off of their income tax?
Did the intelligence Community send twitter a thank-you note for our information?
Did the taxpayers pay the intelligence Community who paid twitter for our information, therefore we paid twitter to send our information to the intelligence Community?
yes..and more ( third q)
Now where does the fine money go?
FTC and SEC can’t roll the money back to pay the national debt.
The money is donated to charity after claims are paid.
527’s like Mediamatters, BLM and other Soros back evil empire entities are now well funded for the next antifa event.
Boom. Didnt they trace the BP fine was given to dRAT Community Organizer organizations.
In September 2014, a U.S. District Court judge ruled that BP was primarily responsible for the oil spill because of its gross negligence and reckless conduct. In April 2016, BP agreed to pay $20.8 billion in fines, the largest corporate settlement in United States history.
Done, of course, in the interest of your security, doncha know.
unfortunately, multi factor (authen that depends on what you KNOW and what you HAVE is reality against common thieves… fraudsters, criminals, hoaxters, etc…
I do not recommend SMS msg for 2 factor.
the best and most secure authen is to use, in priority:
yubi key for sign in authem (chrome book, or linux locked down wtih a secure os distro)
auth app for second device (android, fork, not google per se)
solid and secure gateway router with secure (512LK deep entropy password with remote and ap turned off …or a custom WRT router with solid rainbow tables and a writable dns and white list black list field. * ubiquity has had some problems within the last 2 years…not sure how capable they are anymore)
don’t do financial things on your smart phones or your computer/lap tops ipads, or home entertainment unless you have the professionally evaluated infrastructire hardware and software.
most of the off the shelf software has not been substantially improved and updated for the last 18 months..another consequence of the decessionary effects of pandemic and joe malarkey.
As the Maha Rushie used to say, “If it’s free, you’re the product.”
Don’t you just miss him…every single day? Life has never been the same without our beloved Rush.
I was just thinking today how much I miss his thoughts on things.
>Two-Factor authentication has always been a platform ruse for gathering data on platform users.
Oh, for heaven’s sake, no it isn’t. It’s the current generation of authentication because passwords suck and are easily hacked.
Yes, if you choose a cell phone number as your second factor a vendor can use that unscrupulously. Give them your shipping address or your credit card number and they can do the same thing. If you’re concerned about privacy don’t use your cell phone. Use an authenticator app or a Yubikey.
An authenticator app or other ways of doing 2 factor is fine. Problem is, Twitter never allowed those other ways, and required a cell phone #.
I use an authenticator app at work to log in to our server. But it is Google Authenticator, which doesn’t exactly give me chill bumps of confidence.
it’s actually very good.
it’s going to get an update in 3 months and move to a higher encription protocol…both the enryption regime itself plus a new AI powered biometric.
the idea is that authn generators are subject to brute force and with quantum hacking becoming a real thing, the entropy has to be deeper.
another way to solve this for users who do not have the computing power to handle the larger encryption protocols is to simply require additional methods to falsify identity. This is an eloqent and next gen level thinking about security and this is how it worls:
a. something you KNOW (password, unique); plus
b . something you OWN (device plus auth generator, one time pad hybrid, also deep encrypted and time sensitive)
c. Something that you can never change and no one else has (biometric: eye or print)
this is very good security. it does not solve privacy.
free, but not like free beer.
Every time they came up with a “New, improved buglar alarm system,..sonic alarms, ultrasound, lazer, etc. it took very little time for burglars to figure out ways to circumvent it, using things like shaving cream and pea shooters.
Fact is, ANY system a genius can devise, a different motivated genius can figure out a way to get around it.
broadly, it doesn’t matter if you are using the authn app or sms..both ARE connecting to your smart phone…this is the implementation that most users are performing.
so I would be careful assuming that anything connected to your smartphone be it an app OR the sms text is really secure in terms of tracking.
for each api, there is a fingerprint…if you are using a android os, the there is additional meta data that is packed in the header and the footer for each packet.
if you read google AND microsoft auth app EULA it is CLEAR that they retain the right to store and collect data. This is the simple license not even subject to surveillance from the central state.
in https or secure tuunel from a smart phone there is enough meta data that is stored by google to infer with great accuracy where you are, what you are doing, where you are going next, who you are communicating with and all of this in real time.
real time.
no court order.
that’s just the end user license agreement.
free…but not like free beer.
Future Headline: “Elon Musk buys Twitter for $1 … sends it to Mars.”
“Any engagement platform that asks you to enter your cell phone as part of the registration process is going to have the ability to sell your data and user identity to a third party. ”
This wasn’t just the leftists at Twitter wanting people to better secure their accounts. There are other ways of doing that.
At some point, Twitter made this a requirement and demanded a cell phone number to log in.
What else will be discovered at Twitter?
I’m torn between seeing them burned to the ground and Musk turning it into a truly free platform.
And, will this be a case of “As goes Twitter, so goes Social media?”
ALL of them are over-valued, all of them rely on selling ‘targeted advertising’ which is itself over-valued, all of them all of them collect our data, and all of them have effectively dominated the market, buying off any new companies that could pose a threat to them, effectively a monopoly.
And, all of them have benefitted from unique protections not available to other media companies.
They have had a “good run”, but I suspect there easy times and current height are waning.
Speaking of tracking (or in this case, hacking),I had the weirdest thing happen on my phone today. I used Siri to send a text and instead of the voice I have it set to speak, a gruff man’s voice with a Spanish accent responded!! And even though I hit ‘send’, it never was sent. I turned the phone completely off, turned it back on and it was back to normal. 😮🧐
Creepy!
It was! Part of me thought it was funny, but mainly it was creepy!
.
I have never been a twitter user. But I did try, cannot get on Truth Social because it does this — and I do NOT have a cell phone number that I can give out. Cell phone identifies the exact user. No way.
Heckler “bots” should be able to be handled by individual users’ absolute right to block them. Any other concern about “bots” is for verifying advertising products to sell to advertisers. (If it’s “free” or a cheap subscription or sale, then you’re the product being sold, and this rule has held since the inception of print newspaper and magazine advertising.)
.
Yup. At work we get plenty of calls from “free” trade magazines…. IF you answer their questionnaire.
These yahoos in silicon valley just cannot play by rules. Instead they ignore rules protecting the pubic to expedite making money with no moral grounding. I sold my business in 1999 to E*Trade and and spend 11 months constantly saying no to senior management trying to close private placements without meeting the closing requirements of the Offering Circular. 30 days after leaving they closed on a private offering well below the minimum requirement. I am sure the FTC rules and designed to put the public’s interest above ownership of these fools.
I know they would have pinned this on my if I worked there at the time.
Lock em up. Lock them all up. They are irredeemable….
That fine is less than $1 per user. Twitter made money on the deal, no?
I really don’t care who has my info or who they sell to. They’ll find I’m a boring law abiding citizen. I also know algorithms are listening to my in home conversations because days later an advert arrives on the very subject I was talking about. Reason I don’t care is I don’t buy anything that pushed to my phone. Also before I do the work that needs to be done, I’ll be silent for six months.
Refuge in anonymity.
It’s beyond surprising that any government agencies would fine their 4th branch weapon.
Unless it’s a form of paying someone off ?
It’s definitely a shakedown to keep someone quiet, grease the skids like Hillary always did with her $2 billion dollar campaign funds, etc. Follow the money and see where it goes…. Maybe they will use it to fund the new Biden Disinformation Nazi’s.
I had never considered this as the reason many companies refuse to use an anonymous authentication app that generates a one time use code and instead make you give them your phone number or email.
The more you know…
Would be interested to find out if this ruling will affect all other sites that require cell phones and email addresses, under the auspices of two-factor-authentication?
For example, the Bureau of Land Management has a program that anyone who is interested in any topic involving the public lands can access that department of the Interior’s web data base.
It was upgraded beginning this year that will now only allow someone giving their cell phone number – not landline, not email address – in order to access their accounts previously set up. Which means for me to access it I have to drive into the State’s BLM headquarters to access what anyone providing that same department with a cell phone number can easily do. They send a code of digits that the user then responds to in order to get access which previous to this year, as long as you could get on the internet you could use the program like anyone else.
When I used to have a cell phone, another company that did that two-factor-identification was Sprint.
I just s-canned my iPhone because of this guy.
did you degoogle your android phone?
Curious questions… What was the amount of total revenue gained from the sale of this data? Why would companies ever stop breaking the law and prior settlement agreements if the penalty is less than the gain? Why are the proceeds not returned to the victims? Why is it not criminal for a company executive to knowingly break the law? For us with no company and non-executives… they call this fraud and it is criminal!!!
Truthsocial requires a cell phone number and would not accept a landline. Thus I have not figured out a way to join.
So many corporations and institutions/employers use Multi-Factor Authentication (MFA) that MFA is almost ubiquitous. They sell it as anti-ID theft…while selling users’ ID, most often without their knowledge or consent.
.
So far I have managed to avoid.
.
I never signed up for Twit, and nor would I!
$150 million? This is an absolute joke, right?
That’s not even a fleck of a flatulently inconvenient incontinence for any of the mid-level evolutionary errors running the msm’s production of The Steal.
They can squat on your parlor rug and proudly march away, and your msm will salute their ranks, and then demand of you that you accede to their authority and kneel to their appointed masters.
Sorry if it sounds disgusting.
But I am disgusted.
Sounds like a pharmaceutical company fine, a small dent in revenue with no perp ever seeing a jail cell let alone a court room.
This is good information. Have two phones. One for personal privacy with a VPN and an empty phone for the 2 step identification for social media use, if you must. Also two email addresses. One private one, usually costs money, and a public gmail for everything else such a shopping. To enhance privacy and ignore ads, use one device for that. For privacy use a different device and maybe a different cell phone company.
Use a faraday bag for the private phone when out and about, you can leave it on. When out of the bag all texts and voicemails will load.
Enhance phone privacy is by giving up all social media and minimal apps. Especially don’t use an app (free ones issued by restaurants, retail, etc) that asks for permission to access all data on your phone, including photos. If you must, load apps on your public device, not on your personal private one, unless the app is secure, like Apple Wallet or something like that.
They are broke. Where are they getting this $150 Million?
It almost seems like they are gonna borrow the money, or shakedown Elon…. (The same thing, in two different methods if he buys the company) which is exactly what I said the Democrats and their insiders in the Govt’ were planning on doing.
The Empire of Lies, government and industry, elections and courts, economy and finance, media and academy. All lies.
When there is prosecution that ends with a fine but no jail time, it just means the action is legal with a fee.
The government just came for its fee.
I’m beginning to believe that Twitter is a govt op. Easier for NSA to drill down on personal info than to peruse the tons of data they get from our isp’s.
There is something fishy with Twitter when you see all these leftist nuts with a million likes on their Extreme left Anti American posts “immediately after posting” stuff that make no sense, you know like Swallowell’s Insane SH!T. The kicker is the MSM shares them and makes it APPEAR like that is the going thing, (the Extremist left viewpoints.) Note how all the same celebs share these posts, then MSM posts their BS reposts, they are generally connected to HRC & Obama via strawmen and women too. It’s truly a massive in your face conspiracy going on.
Getting the mobile number lets the gov now correlate that to your sim to geotrack you. Now they have your anonymous twitter name as a result of your tweet time and location/home. That’s the real plan to out anonymous twitter users.
I hope this means that twitter drops the two factor authentication. I’m one of the rare people who does not have a mobile phone and would have no way of providing this authentication. I remember years ago after getting a time-out on twitter I had to give them my landline number which I didn’t like but at least was able to do.
Considering how easy it is for these companies to get hacked how long before hackers obtain all of the real phone numbers associated with anonymous accounts? A lot of people could be destroyed if their true twitter identity was revealed. In addition to the fine Twitter should be required to destroy all of these records and never ask for personal information again.
Rumble? Or is it the other one Bongino is a part of?
Ha Ha Ha!
This is one reason I don’t use Telegram and a number of other services – as they all require a mobile number – and I refuse to give that out!
Here, in Australia, we can’t even buy “burner” phones!
Phone apps with disposable numbers work.
I have yet to find one that does.
It is possible to buy cheap prepaid SIM cards to use as a “semi-burner”. It still has your name on it (won’t stop the government finding you), but it will be separate to your normal phone number so it will confuse twitter etc if you give them that number to sign up.
Hushed.com
The phone apps either know or want to know your cell phone number right?
Hushed.com