I’ve gotten prepaid sims for things but obviously that’s not really a feasible method for your main life phone.

  • LucidBoi@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    11
    ·
    4 months ago

    where i live, you can buy a sim card that you can then charge by buying codes on kiosks. no identity needed, all cash

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        13
        ·
        4 months ago

        They have your identity the moment you put the sim in the phone. The phone have unique identifiers that are recorded when sold.

        • pirat@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          4 months ago

          Buy the phone used and/or with cash. And never put any SIM card in it that can be linked back to you or someone you know.

          • lemmyvore@feddit.nl
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            4
            ·
            4 months ago

            All the apps on your phone have access to the phone identifier. As well as other information, like your Google account. It’s pretty trivial to tie a phone to you.

            • youmaynotknow@lemmy.ml
              link
              fedilink
              arrow-up
              1
              ·
              4 months ago

              As long as you keep to FOSS apps that you KNOW are private (you can tell which ones call home), you should be OK. For example, Lemmy with a throwaway email address, Simplex for communications, Mull with a shitload of blocks, Orbot with RethinkDNS, and so on, you’re golden. Buy your phone in a different country, on Ebay with a throwaway account and a prepaid credit card.

              There’s a lot you can do to remain truly anonymous.

              Now, my threat model does not require me to go to those extents, but you get the point.

        • tiredofsametab@kbin.run
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          If someone really wanted to find the person, I imagine they’d find where the signal is coming from for that device, and just narrow from there. If it always goes to/from where John works and lives, it might well be John’s phone.

      • sunzu@kbin.run
        link
        fedilink
        arrow-up
        6
        ·
        edit-2
        4 months ago

        That would require law enforcement to obtain the recording and have a reason to do so

        • drkt@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          1
          arrow-down
          5
          ·
          4 months ago

          I mean, yeah? If I’m buying anonymous phone credits, the police probably has a reason to go looking for me.

          • sunzu@kbin.run
            link
            fedilink
            arrow-up
            3
            ·
            4 months ago

            Act itself is not illegal… Police wouldn’t care un less you are already on Santa’s list… But it would not be police either but rather internal spooks who track that list.

            • drkt@lemmy.dbzer0.com
              link
              fedilink
              arrow-up
              2
              arrow-down
              2
              ·
              4 months ago

              It doesn’t need to be illegal for you to end up on a list of people they check up on

              • sunzu@kbin.run
                link
                fedilink
                arrow-up
                5
                arrow-down
                1
                ·
                edit-2
                4 months ago

                Yeah but you already need to be on the list for them to check at all

                And even then I doubt they would. They got limited resources. with that being I have no idea about your threat model.

                If it involves over zealous glowies, this comment section is prolly a bit too rookie to properly comment. Also this things are very geo specific as each jurisdiction will have their own KYC regs and compliance practices.