When you use a free 2nd line on your phone - how can they trace it back to
your "real" phone number?
This is not a "can they do it" question; it's an "how can they do it"
question (because I'm sure they _can_ do it). I'm curious how they do it.
Case in point...
Recently a college freshman needed to send money to her friends over her
iPhone or PC, where I was texted by her as to how she could transfer money
freely, quickly, and as privately as humanly possible on short notice.
My initial thought was "bitcoin", but the learning curve perhaps would have
been too steep for an inconsequential $25 transaction which needed to be
done that moment (as I've never mined bitcoins myself, nor bought any).
I googled and found _lots_ of choices for anonymous money transfers over the
iPhone or PC from kid to kid separated by states as new college Freshmen,
and, to hone my skills, I asked of this newsgroup for even better ideas.
*College kids needs to send 25 bucks over the phone or the PC*
Since the goal was anonymity (at least from my side of the equation), I
created a Venmo account using completely bogus information, which was:
a. A fake "legal name"
b. A throwaway email address
c. A throwaway 2nd-line phone number
Vemmo texted a security code (twice) to the throwaway 2nd line phone number
1. First, when I created the account on the PC
2. Second, when the kid used that account on her PC or iPhone (I didn't ask)
My question is simply how can they trace that transaction back to me?
A. Certainly they can easily trace the debit card transfer to her
B. But how do they trace 2nd-line phone texts back to the original phone?
Can they? (they probably can)
How? (that's what I'd like to know)
Does anyone have real experience in how they trace a "second line" throwaway
account (where I otherwise used my "real" cellphone) back to the original
Again, this isn't a question of can they (since I'm sure they can).
The question is "how" would they trace it back to me if they wanted to.
Note: If I wanted to be super cautious, I'd use a burner phone but this is
not really a threat question so much as "what can they easily