Description
How many websites and services have you given your phone number to as part of the registration process? If you’re like most: a lot. Now consider this: if someone has access to your phone number, they can in many instances reset your passwords and take over your account. This is called “SIM swapping” and it destroys lives. As our phone numbers have perversely become used as digital identifiers, we are ill equipped to protect our banking accounts, crypto exchange accounts, medical accounts, and many other CRUCIAL accounts whose compromise can lead to immense pain. In 2022 the FBI found that SIM swapping cost Americans (the ones who reported it) $72 million. Not to mention the stress of dealing with losing a crucial part of your identity. How long until you’re next?
Much of the standard advice online cuts around the edges of the problem. The root problem is our bad habit of using our phone number for both communication and protection. Escape the Technocracy has a comprehensive solution that we haven’t seen others talk about. “How to Evade SIM Swap Scams” is a 10-page guide (DRM-free PDF) walking you step-by-step through the process of understanding SIM swapping and then setting up your phone, your phone service, and your mindset to avoid getting your number stolen and your accounts pwned. More than that, it serves as a manifesto for how you can take greater control of your phone, your phone service, and be empowered as a sovereign mobile user.
We don’t have time for fence-sitters. The time to act is now. For a reasonable price you can take actions that will save you greatly through proactive means and give you key knowledge to HACKproof the centerpiece of your digital life. Live by action, or live with regret.
We discuss this product at length here.
Our team includes Gabriel Custodiet, author of a best-selling privacy guide and host of Watchman Privacy. He has been living a pure privacy lifestyle for several years and regularly consults on these topics. Other team members include veterans of digital privacy and crypto privacy whose skills have been forged in the most serious of high-threat-model environments.
Our courses have been vetted and endorsed by some of the most hardcore privacy and freedom enthusiasts on the planet.