ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

[SIM CARDS] Don’t get catch


  • Please log in to reply
[SIM CARDS] Don’t get catch

#1

Artjkee510188
Artjkee510188
    Offline
    -3
    Rep
    7
    Likes

    Member

  • PipPipPip
Posts: 63
Threads: 17
Joined: Nov 27, 2019
Credits: 0

Deal with caution
User has an open scam report.
Four years registered
#1

How to calculate those who work with the left SIM card.

You will not believe: on the "leading" phone - your real one. After carefully reading the next paragraph, you will understand how easy, simple and fast everything is.
In the description, the term "switching on" is used - this is the moment when the "anonymous" device went online.
So let's go, let's look at different situations.
You are using an "anonymous" mobile phone, and the real one is nearby and switched on. Investigators request the logs of the entire cell in which the "anonymous" apparatus operates (worked). That's all they need to figure out you (and not only "hot on the trail", but also in a week, a month, slowly, in the armchair of their office with a cup of coffee). Do recursive selections on inclusion intervals and watch? who else was in the cell besides the "anonymous" apparatus.
Most often, it is possible to find exactly a couple of phones that do not leave the cell from the logs of three or four inclusions. Less often, more inclusions are required: in this case, you can try to break through the history by the numbers of the sets of matches, as well as their owners. If this is a 90-year-old granny, of which she has had a number for 10 years and she has not left the apartment for 5 years, then, obviously, the option disappears.

For example, in one cell there were 1000 more phones on. The next time you turn on 500 of those that were the first time. At the next - 20 of those who were for the first and second time.
Thus, the investigators quickly enough go to the real phone number, one call history, which will reveal all the cards. Often, the special services are lucky with 2 switches: quickly examine and discard hundreds of numbers - it's only a matter of the number of employees. It even happens that the real number is reached from the first and only inclusion of "anonymous"! Don't believe me? But in vain.

The dynamics in the cell, the behavior of other devices, weekdays / holidays can significantly simplify the work of security officials. They can, while the "anonymous" mobile phone is working, all the rest leave the cell, except for yours (well, the rest of the people took it and moved somewhere) or make outgoing messages, send SMS. Now is the time when every minute is without a mobile phone. And it scares you: you can't simultaneously make outgoing calls from two phones. So while you are "working" with "anonymous" everyone who calls in your cell is getting out of suspicion and narrowing the ring around you.
In addition, Mr. Chance is not on your side: the special services have logs in which all the data is from and to, and you have a normal life with all the unpredictability

Example: You surf the Internet "anonymously" and then you get a call on your real phone. You start talking and your internet data traffic drops for a statistically different time from the time between average page loads. It is a matter of seconds to compare all calls in the cell for an exact match with a traffic failure. Your number was found. It may be, of course, that you just went to the toilet, but it is not difficult to check whether the desired number is "found". And if they call you twice? Situation two

The perpetrator turned on the device, sent an SMS demanding a ransom, turned it off. A day later he turned it on, called to discuss the terms of the ransom, turned it off. The third time I turned it on - I told the meeting place and time, turned it off. Guys in caps studied the logs for three "inclusions" - who at that moment was in the cell all three times. From the second "reconciliation" there are four numbers left, from the third - one.

You use an "anonymous" mobile phone, and you prudently turn off the real one in advance. Incredibly, you only made things easier for the investigators. They will just see who disconnected - it was disconnected (the phone sends a disconnection signal to the network), and did not leave the network shortly before the "anonymous" one appeared. We can safely say that there will be only a few of these in the cell, or even you alone. To clarify the data, you can compare who turned on after the "anonist" was turned off. And, in the same way, to break through on grannies and others. As you can see, turning off this device when using the "left" only worsens anonymity.

You leave the real phone at home on, while you go to another cell, and only there you turn on "anonymous". Thinking a tricky plan? But nifiga. Three factors still give out your real device.

First, the same scheme is worked out as in the first situation, only not one cell at a time, but several cells. First, one at a time, then the neighboring ones, and so on until it comes to comparing the cell of the "anonymous" with the hundredth of the present.
Secondly and most importantly: your device is at home without an owner and cannot answer calls. Therefore, sooner or later there will be missed ones, which are also visible in the logs. It is only necessary to compare on which device the anonymous "inclusion" was missed at all times. What do you think, many of the subscribers do not answer the phone all the time just at the time when you leave anonymous? Nobody but your real phone! In addition, this method helps well in general search: investigators can very quickly call the numbers, which remains after comparing the cell logs. And if the phone is not taken - here are the suspects.
Thirdly, you cannot leave this device anywhere, every time in different places. Most likely, he is at your home. That is, in one place for each inclusion. This can be used to construct an additional sample for the filter: how many of the same devices were in the same cell. In general, all this will lead to a quick, albeit slightly less rapid than in previous cases, access to the real number.

You turn off your real phone at home, and you yourself go to another cell, and only there you turn on "anonymous". See situation # 3 + situation # 2.
It turns out that the whole scheme works on the fact that several inclusions are made from one number. That is, if you leave the number only once and then throw out your SIM card and phone, it will be impossible to find?
This will only help if the "case" is yours at one time and there have been no other similar cases and will never be. That is, in reality, all real "deeds" will not help. Changing numbers will not make it difficult to find a real phone.

Anonymity is not a lack of identification data. This simply cannot be in the modern world. Anonymity is a good imitation of an ordinary, but not real, person.

I considered how easy and simple it is to "break through" the real number of the suspect by his "anonymous" for the security forces. But what will information about a real phone do? Yes all. In addition to information on whom the number is issued, investigators will see who you called. Surely there are many among them who know you personally. They will see who contributed to the account and how. Most likely there are payments from a real card through an ATM or from a real WebMoney wallet, etc. That is, in fact, you sailed.


A task force with a manual direction finder moves to the place, to the area of ??operation of the cell in which the suspect's phone is located. This is not a screen with a dot, as shown in the films, but a simple radio receiver with an arrow that shows the signal strength and an antenna in the shape of the letter H, the letter Zh, a sly tube or a hyperbolic / parabolic dish (often several antennas are included in the kit for different operating conditions ).
The base station has information on exactly what frequency the sought device is currently operating. Oper tunes the receiver to this frequency, turns the antenna around him and looks at the arrow. From where the signal is strongest, it goes there. He enters the staircase, climbs the stairs and measures the signal. In this way he finds the required floor, then an apartment and that's it, the "anonymity" is over. In the observed case, the time from the entrance of the "gazelle" of operas to the exit under the white handles is 25 minutes. Considering how many of them were spent on recommendations "open because we will open in any case", fees and withdrawal of the suspect - you can estimate how many, among dozens of houses, hundreds of entrances and thousands of apartments, you found the right one.

Above, I considered in detail that having a real personal mobile phone, we will never be anonymous, even from a newly purchased new phone and a SIM card just purchased in the backyard without registration. As I said before, accessible anonymity is a good imitation of an ordinary, but not real, person. And the absence of personality in general in our modern informational realities is simply impossible. After all, here you are, the person, sitting right here and reading this article.
Real hackers, whose freedom, and perhaps life, depends on anonymity do not use mobile phones in their daily life. They don't use it at all. Only one-time calls, skype, etc. And they have no "everyday" life. Eternal darkness, nothingness. There are no friends, no relatives, no habits and "favorite" places. That's what anonymity is. But, in fact, there is a full-fledged other life, other friends and other "places" on the Web. And, often, not only not worse, but also better than in real life. So it's not all that sad. Just not like most. However, this is no longer "anonymity". You have a name, albeit a nickname, but you are known by it, you have Internet friends and places where you can be found on the net. You can even be "punished" without going to Siberia. Thus, it is easy to understand that not only anonymity is conditional, but also freedom, and “crime” and “laws” are not the same, but are relative to society. And "societies" are different.
By learning a little about the way investigators work, you can take steps to improve security on a case-by-case basis.

So well, think, my young friend with criminal inclinations, is the game worth the candle at all, or maybe after one or two successful deals it would be better to buy an apartment, a car, some kind of white business and tie up with the "dark side" forever?

For example, in situation # 3, you can set an answering machine on a real phone or ask a friend to answer if they call. Register a real phone to a real grandmother to pass the "grandmother filter". Try to randomly combine situations, leave your phone in different places, etc. This will somewhat complicate the work of investigators, but it will also complicate your "dark activities". Will it help in "X-hour"? Far from being a fact.

  • 1

#2

Fofana05
Fofana05
    Offline
    0
    Rep
    2
    Likes

    Member

  • PipPipPip
Posts: 59
Threads: 0
Joined: Jul 13, 2020
Credits: 0

Three years registered
#2

TH

 

 

How to calculate those who work with the left SIM card.

You will not believe: on the "leading" phone - your real one. After carefully reading the next paragraph, you will understand how easy, simple and fast everything is.
In the description, the term "switching on" is used - this is the moment when the "anonymous" device went online.
So let's go, let's look at different situations.
You are using an "anonymous" mobile phone, and the real one is nearby and switched on. Investigators request the logs of the entire cell in which the "anonymous" apparatus operates (worked). That's all they need to figure out you (and not only "hot on the trail", but also in a week, a month, slowly, in the armchair of their office with a cup of coffee). Do recursive selections on inclusion intervals and watch? who else was in the cell besides the "anonymous" apparatus.
Most often, it is possible to find exactly a couple of phones that do not leave the cell from the logs of three or four inclusions. Less often, more inclusions are required: in this case, you can try to break through the history by the numbers of the sets of matches, as well as their owners. If this is a 90-year-old granny, of which she has had a number for 10 years and she has not left the apartment for 5 years, then, obviously, the option disappears. The dynamics in the cell, the behavior of other devices, weekdays / holidays can significantly simplify the work of security officials. They can, while the "anonymous" mobile phone is working, all the rest leave the cell, except for yours (well, the rest of the people took it and moved somewhere) or make outgoing messages, send SMS. Now is the time when every minute is without a mobile phone. And it scares you: you can't simultaneously make outgoing calls from two phones. So while you are "working" with "anonymous" everyone who calls in your cell is getting out of suspicion and narrowing the ring around you.
In addition, Mr. Chance is not on your side: the special services have logs in which all the data is from and to, and you have a normal life with all the unpredictability You use an "anonymous" mobile phone, and you prudently turn off the real one in advance. Incredibly, you only made things easier for the investigators. They will just see who disconnected - it was disconnected (the phone sends a disconnection signal to the network), and did not leave the network shortly before the "anonymous" one appeared. We can safely say that there will be only a few of these in the cell, or even you alone. To clarify the data, you can compare who turned on after the "anonist" was turned off. And, in the same way, to break through on grannies and others. As you can see, turning off this device when using the "left" only worsens anonymity.

You leave the real phone at home on, while you go to another cell, and only there you turn on "anonymous". Thinking a tricky plan? But nifiga. Three factors still give out your real device.

First, the same scheme is worked out as in the first situation, only not one cell at a time, but several cells. First, one at a time, then the neighboring ones, and so on until it comes to comparing the cell of the "anonymous" with the hundredth of the present.
Secondly and most importantly: your device is at home without an owner and cannot answer calls. Therefore, sooner or later there will be missed ones, which are also visible in the logs. It is only necessary to compare on which device the anonymous "inclusion" was missed at all times. What do you think, many of the subscribers do not answer the phone all the time just at the time when you leave anonymous? Nobody but your real phone! In addition, this method helps well in general search: investigators can very quickly call the numbers, which remains after comparing the cell logs. And if the phone is not taken - here are the suspects.
Thirdly, you cannot leave this device anywhere, every time in different places. Most likely, he is at your home. That is, in one place for each inclusion. This can be used to construct an additional sample for the filter: how many of the same devices were in the same cell. In general, all this will lead to a quick, albeit slightly less rapid than in previous cases, access to the real number.

You turn off your real phone at home, and you yourself go to another cell, and only there you turn on "anonymous". See situation # 3 + situation # 2.
It turns out that the whole scheme works on the fact that several inclusions are made from one number. That is, if you leave the number only once and then throw out your SIM card and phone, it will be impossible to find?
This will only help if the "case" is yours at one time and there have been no other similar cases and will never be. That is, in reality, all real "deeds" will not help. Changing numbers will not make it difficult to find a real phone.

Anonymity is not a lack of identification data. This simply cannot be in the modern world. Anonymity is a good imitation of an ordinary, but not real, person.

I considered how easy and simple it is to "break through" the real number of the suspect by his "anonymous" for the security forces. But what will information about a real phone do? Yes all. In addition to information on whom the number is issued, investigators will see who you called. Surely there are many among them who know you personally. They will see who contributed to the account and how. Most likely there are payments from a real card through an ATM or from a real WebMoney wallet, etc. That is, in fact, you sailed.


A task force with a manual direction finder moves to the place, to the area of ??operation of the cell in which the suspect's phone is located. This is not a screen with a dot, as shown in the films, but a simple radio receiver with an arrow that shows the signal strength and an antenna in the shape of the letter H, the letter Zh, a sly tube or a hyperbolic / parabolic dish (often several antennas are included in the kit for different operating conditions ).
The base station has information on exactly what frequency the sought device is currently operating. Oper tunes the receiver to this frequency, turns the antenna around him and looks at the arrow. From where the signal is strongest, it goes there. He enters the staircase, climbs the stairs and measures the signal. In this way he finds the required floor, then an apartment and that's it, the "anonymity" is over. In the observed case, the time from the entrance of the "gazelle" of operas to the exit under the white handles is 25 minutes. Considering how many of them were spent on recommendations "open because we will open in any case", fees and withdrawal of the suspect - you can estimate how many, among dozens of houses, hundreds of entrances and thousands of apartments, you found the right one.

Above, I considered in detail that having a real personal mobile phone, we will never be anonymous, even from a newly purchased new phone and a SIM card just purchased in the backyard without registration. As I said before, accessible anonymity is a good imitation of an ordinary, but not real, person. And the absence of personality in general in our modern informational realities is simply impossible. After all, here you are, the person, sitting right here and reading this article.
Real hackers, whose freedom, and perhaps life, depends on anonymity do not use mobile phones in their daily life. They don't use it at all. Only one-time calls, skype, etc. And they have no "everyday" life. Eternal darkness, nothingness. There are no friends, no relatives, no habits and "favorite" places. That's what anonymity is. But, in fact, there is a full-fledged other life, other friends and other "places" on the Web. And, often, not only not worse, but also better than in real life. So it's not all that sad. Just not like most. However, this is no longer "anonymity". You have a name, albeit a nickname, but you are known by it, you have Internet friends and places where you can be found on the net. You can even be "punished" without going to Siberia. Thus, it is easy to understand that not only anonymity is conditional, but also freedom, and “crime” and “laws” are not the same, but are relative to society. And "societies" are different.
By learning a little about the way investigators work, you can take steps to improve security on a case-by-case basis.

So well, think, my young friend with criminal inclinations, is the game worth the candle at all, or maybe after one or two successful deals it would be better to buy an apartment, a car, some kind of white business and tie up with the "dark side" forever?

For example, in situation # 3, you can set an answering machine on a real phone or ask a friend to answer if they call. Register a real phone to a real grandmother to pass the "grandmother filter". Try to randomly combine situations, leave your phone in different places, etc. This will somewhat complicate the work of investigators, but it will also complicate your "dark activities". Will it help in "X-hour"? Far from being a factTHA

THANK


  • 0

#3

Hamoudi34
Hamoudi34
    Offline
    12
    Rep
    40
    Likes

    Only God Can Judge Me

Posts: 566
Threads: 25
Joined: Aug 16, 2019
Credits: 0

Four years registered
#3

ty


  • 0

#4

taevion
taevion
    Offline
    0
    Rep
    -4
    Likes

    Taevlon

  • Pip
Posts: 8
Threads: 2
Joined: Sep 09, 2020
Credits: 0
Three years registered
#4

great method!


  • 0

#5

Rchxsrt
Rchxsrt
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 6
Threads: 0
Joined: Oct 17, 2020
Credits: 0
Three years registered
#5

ty


  • 0

#6

ziadodeh
ziadodeh
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

Posts: 94
Threads: 0
Joined: Aug 20, 2020
Credits: 0
Three years registered
#6

thanks but dont lie again


  • 0


 Users browsing this thread: