← Back to Library

Why i don't use a sim card and neither should you

In an era where digital footprints are treated as inevitable, The Hated One makes a radical claim: the average smartphone user is voluntarily broadcasting their location to every major corporation and law enforcement agency, and the only way to stop is to stop using a SIM card entirely. This isn't just a tip for the paranoid; it is a structural critique of how 5G networks and cellular triangulation have turned location data into a permanent, un-erasable record of human movement. For the busy professional who assumes their privacy settings are sufficient, this piece offers a startling reality check on the invisibility of modern surveillance.

The Mechanics of the Cell Tower

The Hated One begins by dismantling the illusion of anonymity in a connected world. They explain that even without GPS active, a phone constantly pings nearby cell towers, creating a web of data points that can pinpoint a user's location with terrifying accuracy. "This location tracking is impossible to opt out of; it happens automatically in the background," they write, noting that this occurs regardless of whether location services are toggled off in the settings menu. The author argues that the industry is moving toward 5G, which will refine this tracking from a neighborhood level down to a specific room within a building. "5G is now going to make cellular tracking precise down to a centimeter both indoors and outdoors," The Hated One warns, suggesting that future networks will know not just where you are, but exactly which floor and room you occupy.

Why i don't use a sim card and neither should you

The argument here is compelling because it shifts the focus from user error to systemic design. The author posits that the problem isn't that users are careless, but that the infrastructure itself is built to harvest data. "Telecommunication companies spy on your location records and build up a detailed profile of your personal life," they state, listing the intimate details that can be reconstructed: commute patterns, workplace, home, and social interactions. This framing is effective because it removes the burden of guilt from the individual and places it on the business models of telecom providers who, as The Hated One notes, "love nothing more than to cut corners to save cost" when implementing privacy protections.

"You can't trust who gets a hold on this data and how they interpret it, even if that someone is your friendly neighborhood local police department."

The Legal and Social Danger of Location Data

The commentary takes a darker turn when addressing the real-world consequences of this data collection. The Hated One illustrates the danger with a hypothetical scenario where an innocent person becomes a suspect simply because their phone was pinging a tower near a crime scene. "Suppose you're sitting in your living room and then someone commits a murder a mile away from you... your phone is pinging a nearby cell tower and when the police come and collect the phone records you'll be among the prime suspects," they explain. This highlights the practice of geofence warrants, described as "dragnet surveillance where law enforcement collect phone records of all devices that were making connections in a given time and location."

The author's point is that law enforcement often lacks the technical literacy to interpret this data correctly, yet they wield it with the weight of DNA evidence. "Cops are not technical people and they present these phone records as if they were DNA evidence," The Hated One argues, warning that this can lead to ruined reputations and botched investigations. While this is a strong argument about the dangers of warrantless data requests, critics might note that the author's tone is alarmist; in many jurisdictions, obtaining such data still requires judicial oversight, even if the standard for that oversight is debated. However, the core concern remains valid: the data exists, it is sold to third parties, and it is accessible to bounty hunters and data brokers without meaningful consent.

The Radical Solution: A SIM-Free Life

Having established the threat, The Hated One proposes a solution that sounds extreme but is presented as a logical necessity for true privacy. The strategy involves removing the SIM card entirely, enabling airplane mode permanently, and relying on a specific operating system and network tools. "I installed GrapheneOS on it, the most secure operating system in the world, and now it's essentially an anonymous device," they write. The author emphasizes that simply removing the SIM is not enough; the device must be prevented from broadcasting its unique identifiers. "Modern phones will still beam their signals even if they have no SIM," they caution, which is why they keep airplane mode on at all times.

The Hated One then details a broader ecosystem of privacy tools. They advocate for using open-source, offline navigation apps like OsmAnd instead of Google or Apple Maps, and they insist on routing all internet traffic through a trusted Virtual Private Network (VPN) and the Tor network to mask IP addresses. "I use Tor and a VPN... I wouldn't settle for any other VPN service," they assert, highlighting the need to prevent websites from seeing the user's true location. For communication, they rely on end-to-end encrypted messaging apps like Signal and Matrix, reserving a separate, always-off "dumb phone" for the rare instances when a phone number is legally required for banking or government services.

"Where I am, where I've been, and where I will be is my own business, and I don't trust anyone to hold a permanent record of my location."

The author acknowledges the friction this lifestyle creates, noting that friends and family might be "flabbergasted" by the refusal to use standard cellular services. "I was pretty shocked to see how flabbergasted he was by this... I realized that my methods of going about my digital life are very unconventional," The Hated One admits. Yet, they frame this inconvenience as a necessary trade-off for autonomy. The argument is that the convenience of a standard smartphone comes at the cost of perpetual surveillance, a trade-off that few people are willing to scrutinize until it is too late.

Bottom Line

The Hated One's most powerful contribution is the demonstration that location privacy is not a setting to be toggled, but a fundamental architectural choice that requires opting out of the cellular network entirely. While the proposed lifestyle is impractical for most, the underlying analysis of how 5G and geofence warrants erode civil liberties is rigorous and urgent. The biggest vulnerability in the argument is the assumption that the average user can or should live without a standard phone number, but the warning that our current digital infrastructure is designed to track us regardless of our settings is a verdict that cannot be ignored.

Sources

Why i don't use a sim card and neither should you

by The Hated One · The Hated One · Watch video

so I have a friend and we talk maybe about once a month and meet once every few years she goes to another school so it's a serious relationship and this other time we are chatting and I just casually told him I don't actually use a SIM card and t no sim at all like no physical card no eim and I was pretty shocked to see how flabbergasted he was by this he immediately asked me how do you make phone calls and I simply said I don't then he asked how do you get data and I said I don't the shock was palpable and it was Mutual to be honest because in that moment I realized something I realized that my methods of going about my digital life are very unconventional this is not what regular people do but because of my many years of privacy research and investigations to me it was completely normal I understand the Privacy implications of using a Sim but to the uninitiated not using a SIM for data and text is out of this world this is the phone I use I installed graph in OS on it the most secure operating system in the world and now it's essentially an anonymous device I never inserted a SIM card into this phone I always leave the airplane mode on and I route my whole device traffic through a trusted VPN service I'm willing to bet you could barely find one person doing any single one of those things not to mention all of them so in this video I want to share with you a bit of my privacy setup and explain to you why I did not use a SC card and how I navigated my life with almost zero amount of cellular traffic so let's start with the first thing Exposition time hey if you enjoy the sponsor free content support me on patreon and unlock access to all of my podcasts get early access to everything ad free and you can even get my merch my content is very adversarial to social media algorithms and it clearly shows in my YouTube analytics this work cannot survive without your support so please become a paid member on patreon and join me in this fight from within thank you kindly this triangle is a basic cell tower this Tower ...