My Photo

Your email address:

Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« Out-bound Record-level Accountability in Information Sharing Systems | Main | Data Decommissioning – Destruction of Accountability »

January 02, 2008


Feed You can follow this conversation by subscribing to the comment feed for this post.

Jim Harper

You must have listened to my podcast yesterday. Nice work, Grasshopper.

Carl Kessler

Is it feasible to have a pool of "throwaway" cellphone numbers (or at least a couple) that map to a single cellphone, but which you can control (e.g., time out or cycle through)?

The analogy is my home alarm system. There's a master code, but my cleaning person has a throwaway code. It let's them in, but allows me to track their entry separately and turn off whenever I like.

The same for cellphones would be great - I could cycle through 2 or 3 throwaway numbers and know that my primary cell number isn't out there...


bit like throwaway email addresses but some last longer than others for some reasons. Some sites have better spam traps :-)

The comments to this entry are closed.