Burner Phones! Part 1 – What’s A Burner Phone

Simply put, a burner phone is typically a cheap, prepaid mobile phone that is used infrequently and with great care, and can then be thrown away when it’s no longer needed or has been compromised.

Burner phones, when used correctly, protect the privacy and identity of the owner. They are a safety tool ideal for any situation.

[code_snippet id=17]

Two Types of Burner Phones

General Use

General use burner phones is what most people who are not overly concerned about anonymity as much as they are privacy from marketers, businesses, employers, banks, social media sites, or other services they don’t want to give their private information to.

An example is signing up for a social media account and being forced to validate a phone number. Or using online dating sites, or online selling sites like Craiglist or Facebook Marketplace.

Full Anonymity

Fully anonymous phones are used by whistleblowers, journalists, tipsters, protestors, activists, political activists, business people or academics carrying trade secrets or intellectual properties across borders … well, anyone who might be in danger if their identity or privacy is revealed.


Burner Phone Apps

Do not use burner phone apps. They only mask your phone number. They do not hide your IMEI or IMSI numbers from cell towers, law enforcement, or government agencies. They collect private data from you and sell it to third parties, defeating the whole point.

Next: Part Two IMEI and IMSI Numbers

Subscribe to the PrivacyWe YouTube Channel right now to take back control of your privacy and become a burner phone pro!

Sharing is Caring!

If you like this article, please help us by sharing it with friends on your favorite network


If You Like This Story, Check One Of These Stories Next ...

privacy policy - employee privacy policy - privacywe

Shocking Secrets Behind Your Company’s Privacy Policy

Protect your private information & understand the purpose of a Privacy Policy. Learn who has access to your data, what data is collected/stored, & how you’re notified when changes are made. Get an overview of key points & final thoughts on privacy policies with this article!

Read More »