This week I explain how a recent client became exposed via temporary "burner" numbers and email, revisit VoIP solutions with a fresh look, offer a scripted way to directly access your Twilio calls, messages, and account details, and present an OSINT tip to passively collect content URLs within a site. Big show. Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free. Listen to PAST episodes at https://inteltechniques.com/podcast.html SHOW NOTES: INTRO: Alfred Hitchcock Hour NEWS & UPDATES: https://inteltechniques.com/tools/Domain.html BURNER BACKFIRES: https://inteltechniques.com/blog/2022/09/01/when-burners-backfire/ VOIP UPDATES: https://inteltechniques.com/voip.twilio.cli.html https://inteltechniques.com/voip.suite.html Free Guides: https://inteltechniques.com/links.html Affiliate Links: Extreme Privacy (4th): https://amzn.to/3D6aiXp Proton Mail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519 Proton VPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277