Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: CodeToad

Re:”The video system at the library has you using that computer. So does the ISP have the logs.”

That was my first thought.

What about those “burner phones” you read about crooks using? I don’t know anything about them, not being a crook myself. Could someone set up a fake email account on one of those and then toss the phone?


33 posted on 07/09/2022 6:30:44 AM PDT by CatHerd (Whoever said "All's fair in love and war" probably never participated in either.)
[ Post Reply | Private Reply | To 31 | View Replies ]


To: CatHerd

No phone, used in any way, shields you from scrutiny and tracking.


40 posted on 07/09/2022 7:04:50 AM PDT by CodeToad (Arm up! They Have!)
[ Post Reply | Private Reply | To 33 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson