@BanterousSor#45695 what might one do if he happened to use their own number, like a genius…?
I called back a scammer messing with them and wasting their time. Well apparently they called me back and got my name and whatever they could Google off me. Any steps I can take?
Their still up and at it now. I called them months ago and now they are calling back saying they have my address and other info, months later. Weird?
Anyway, this is the number 18885364564 which I'll post to the other tread for people to use ;)
How about using Tor Browser to connect with FireRTC and then call those scammers as they won’t be able to track the host’s original IP address in FireRTC call logs.
@mangomonster#54845 approximate location, not exact. no, they can’t hack your computer from just having your IP address, there needs to be vulnerabilities on your system for them to even have a chance at getting access.
@ScamFighter26#54894 Sometimes the number is gone or maybe firertc blocked you. You may also need to change your number on firertc that is easy to do also.
@JoeT#55224 Yeah, and whenever I receive scam phone calls on my real phone, I would just use my scambaiting phone number and just say that I received a call but accidentally hung up. I don’t think that scammers actually check the record of what numbers they called (unless it is for the purpose of blocking phone numbers).
@Rajeshi_Gardner I am using FireRTC but I wanted to call My Phone Support and that is not in the areas that you can call from FireRTC I was wondering if you knew any free non-google voips that could.
@Rajeshi_Gardner Thanks it still is not working, it says that “THe call you have attempted is unable connect either due to an error or an invalid caller area”
I’ve been using a burner phone and don’t use it for anything else. The IRS scammer I just talked to knew my age and said I’m married. Lucky guess or did Total Wireless sell my info?
It’s just a privacy thing. There’s no legal ramifications for screwing with these people. You could completely destroy their entire network with no risk of repercussions from law enforcement. No court system will prosecute for crippling an illegitimate business.
thanks, good to know. Although, I would like them to try and arrest me so that we could go through the deposition and discovery process. but you are right, if they can delete the computer data, they can source the phone data as well.