Leaving Twilio for VoIP.ms

For many years, I promoted Twilio as a Voice over Internet Protocol (VoIP) provider. They allowed me and my clients to generate unlimited telephone numbers in order to keep our true cellular number private.We had a good run, but I no longer recommend Twilio for any purpose. The problems started many months ago when they stopped providing actual customer support in favor of canned messages, followed by automatically closed tickets. Then things got worse. Earlier this year, our Twilio account was suspended because I executed a Lookup API request within a Linux virtual machine instead of through a traditional macOS host. Twilio refused to answer any of my questions, and I never received any details about the incident. We were simply kicked off of their service, even though we had a substantial balance on the books. This can be devastating when you rely on them for telephone service, and a risk I cannot take with my clients.

Last year, I began recommending VoIP.ms as an alternative to Twilio and Telnyx for those having trouble with their services. Today, I prefer VoIP.ms over the other options for many reasons explained momentarily. The entire VoIP.ms sections of all digital guides were overhauled for March in order to present many new desired features and full tutorials for mobile and desktop environments.If you purchased my Mobile Devices, macOS Devices, or Linux Devices PDF guides, please watch for a new version on March 1, 2024 with many updates for VoIP.ms. The following is a summary of risks and benefits for these providers, and the reasons I now rely exclusively on VoIP.ms.

Twilio: I have heard from many readers that Twilio is now refusing new service to individuals and small companies. Many people are simply unable to obtain new service or maintain their existing account. Twilio's configuration can be very difficult at times, but stable once established. If you want incoming SMS access, you must configure your own web server. Twilio prohibits outgoing SMS messages entirely unless you enroll (and pay) for 10DLC registration (which I do not recommend). I believe Twilio is now the worst VoIP option today, but those who have an established account should keep it if it works for them. As a final nail in the coffin, this week I began receiving spam email messages to the email address I use for my Twilio account. This email address has never been used anywhere else, so something is going on over at Twilio.

Telnyx: : I have also heard from many readers that Telnyx is now scrutinizing service to individuals and small companies, with many people unable to establish new service. In late 2023, my Telnyx account was suspended for unknown reasons and I had to fight for several days to regain access. Telnyx's configuration can also be difficult at times, but very stable once established. They also require a web host for SMS access and Telnyx prevents outgoing SMS messages unless you enroll (and pay) for 10DLC registration (which I do not recommend). Much like Twilio, their portal functions are targeted toward business API users, and not individuals. I still maintain a few Telnyx numbers for personal use.

VoIP.ms: A few years ago, I could not establish new service at VoIP.ms without uploading ID and confirming my identity. Today, their new account creation algorithm is less scrutinous, and many people are reporting the ability to open an account easily. VoIP.ms does not refuse service to individuals like Twilio and Telnyx does. They allow full configuration of new numbers, calling services, text messaging, forwarding, voicemail, caller ID, and other features within their web portal without the need to access their API or a web host. VoIP.ms does NOT restrict outgoing SMS from individuals and does not require 10DLC registration for personal use. Mobile users can rely on Acrobits Groundwire (paid) for full access to incoming and outgoing calls and SMS while Graphene OS users can rely on Sipnetic and the VoIP.ms SMS app (both free) for all functions. Even Linphone (desktop or mobile) can facilitate all calls and text messages from VoIP.ms, which Telnyx and Twilio cannot match. My devices are set up with incoming caller ID and I see the full name of almost anyone who calls, even from most cellular and VoIP numbers. This is enabled with a simple toggle in the web portal, while Twilio makes it difficult.

Last week, I helped someone configure VoIP.ms on their mobile device. We were able to fully configure over twelve numbers within the web portal (they have extensive needs), and they now have a single-app solution on their device with full push services for all of these numbers, allowing incoming and outgoing calls and SMS text messages. I find that impressive for a DIY solution. We also configured desktop access for all calls and copied all text messages to a secure email account for times when mobile was not accessible. I know of no other service which allows all of this, plus it is more affordable than Twilio.

We are told that using our new VoIP.ms affiliate link (https://voip.ms/en/code/IntelTechniques) may result in less scrutiny on new accounts as long as you use your real name for KYC requirements (we do not see any of your information). Since we associate our VoIP numbers with our true name to prevent contamination of our cell number, I never see a reason to use an alias for VoIP access. That just creates problems if you ever need to prove ownership, much like a domain registration or personal email account. The more transparent you are during account registration, the more likely you can bypass identity verification. I discuss this further in the guides. However, I NEVER recommend sending a copy of your ID to any company, and encourage you to fight this if requested. I was never asked to provide any ID since they were able to verify me through my domain in my email.

Disclosure: I have been an affiliate of Twilio, Telnyx, and VoIP.ms. We receive free credits to our test account when people enroll from our links, which allows us to continue testing new features for these guides. I was not paid for this post and no editorial control or approval was granted (or requested). VoIP.ms has not sponsored any of my content. I simply found a better service, and my clients seem thrilled.

Lessons Learned from Skiff’s Shutdown

Several months ago, I tested a new end-to-end encrypted (E2EE) email provider called Skiff. They had a great interface and promising product. I never promoted them, aside from a brief mention in the eBooks, because the service was too new. I had learned my own lesson from adopting CTemplar before it had matured, and I did not want to invest my digital life into Skiff until I could see how things developed. Recently, Skiff announced they had been sold to a documents workspace provider called Notion, and that all Skiff email addresses would be terminated in six months.

Fortunately, I had never used my test Skiff accounts for any communication or account creation. However, many people in this community adopted Skiff heavily and are now concerned about the inability to access these accounts in the near future. I want to present some ideas about email adoption, much of which I have already published in previous books, to serve as a reminder for personal email policy.

Password Manager: This is not just to generate and store passwords. You should also store any email address used within a service. When I place a username and password within my password manager, I always record any current or previous email addresses which I provided during signup, or changed after creation. This way, I can always search an email address or email domain to identify any accounts which could be at risk. When CTemplar shut down, I was able to quickly see the five accounts which possessed a CTemplar email address; sign into them and change the address; then not worry once CTemplar shut their doors.

Domains: I have always preached using your own domains for all vital email. Sure, we all have burners with various providers for all of the junk, but I would never use a Proton Mail, Tuta, or Fastmail domain for anything which is important to me, such as a financial institution or work communications. ANY service could shut down or kick you out tomorrow. When you use your own domain, you can easily forward it to another service within an hour.

Redundancy: If Andy gets tired of my weekly emails asking for a new feature at Proton Mail and suspends my account, I can forward my domains to Tuta within a few minutes to keep receiving email. If Hanna over at Tuta decides I am shady and suspends my account for review, I can switch those domains over to Proton Mail (Don't get any ideas you two). I maintain a paid package through Proton Mail, Tuta, and Fastmail at all times. I can store all of my domains at any of them whenever needed. While I doubt any of them are going away any time soon, I have redundancy. Both Proton Mail and Tuta offer secure E2EE, and both have proven their intent at longevity in this space. While I originally focused on Proton Mail due to high adoption within my circles, I now see many more Tuta addresses in my inbox, which encourages me to communicate directly with those people through one of my domains on Tuta.

Business: I see a lot of Skiff bashing online. People say they are sellouts, traitors, liars, etc. They are a business. Businesses pivot, become acquired, and sometimes go broke. We should never rely on a free service to provide us with a lifetime of communications. This is why we should focus on reputable and established paid services, own our own domains through a third-party provider which can be transferred when needed, and possess redundant services which are ready for our communications within an hour of bad news.

Skiff is shutting down. We should get over it. We should move on. We should find a better provider. If their closing forces us to adopt a better email protocol, then we should be thanking them.

Offline Life: IEM Fit

I previously wrote an article about the usage of Digital Audio Players (DAPs) as part of my offline life  at https://inteltechniques.com/blog/2023/11/24/offline-life-daps/ and on page 56 of Issue 006 of UNREDACTED Magazine. I really did not expect much interest in the topic from this community, but I was wrong. We still receive a lot of feedback and questions about DAPs and In-Ear Monitors (IEMs). Two specific topics have come up, and I want to address each.

IEM Fit: I mentioned in the previous post that a tight fit of an IEM is vital. You want comfort, but you also do not want audio to escape. If you have the slightest gap, much of the bass will disappear. Two people in my circles complained about getting a proper fit into their ears. One said that the IEMs would pop out while jogging and another said that one ear constantly needed nudged back into place, even while sitting. I have experienced both of these issues, and the solution which worked best for me was new silicone tips from SpinFit. I had seen these mentioned within the audiophile communities I monitor, but only tried them recently. They are game-changers.

I tried the SpinFit W1 and CP100+ models, both in a large size. I preferred the SpinFit W1, which was actually cheaper at $9.00. Since I typically use the large stock tips provided with my IEMs, the large SpinFit tips worked for me. Their sizes seem to follow IEM stock tips. I encourage you to go to https://spinfit-eartip.com and find your IEM and size recommendation.

These solved two problems for me:

First, they have way more grip than a stock IEM tip. Once I started using SpinFit tips, my IEMs stopped slipping. I could run without needing to constantly reposition them in my ears. They are a bit more difficult to remove, but that is better than sliding out when undesired.

Second, they offer flexibility within the ear canal. Everyone's ears are unique. The angle of insertion could be a challenge for some when the ear-tip does not move. The SpinFit tips are flexible within the ear canal for a better fit. This is hard to explain in words, but the following Gifs should help. The stock tip to the left does not pivot while the SpinFit to the right has more flexibility. Thank you to my neighbor for helping me capture these examples.

Some people insist that SpinFit tips improve the sound from an IEM, but I don't hear any difference. I suspect that the tighter fit without slipping is the reason for better audio. Listeners are instead experiencing the sound as it was meant to be heard. I can say that the tips did not change the audio for me, which is a good thing.

Headphone Jack Fit: Another friend complained that his wired IEMs would become unplugged due to a loose fit within the headphone jack. His assumption was that the jack itself had become worn, but my experience has been that some headphone plugs are made slightly smaller than others, causing a loose connection into the jack. Several people have posted solutions to this using small pieces of paper between the plug and the jack, but I do not like this option. The paper wears away too quickly and if it is too wide, it will interfere with the connection. Instead, I prefer a small piece of string, as seen in the image below.

I tape the string to the back of the unit and insert only a small portion into the jack. I then use the plug to help navigate the string into place. The string lasts longer than paper and is thinner. I can easily force the string to the back side of the unit in order to avoid interference with the interior connections, which are typically on the sides (not the front and back) of the unit.

Hopefully one of these solutions saves you the headaches I have went through maintaining a proper fit to my IEMs.

Digital Guide Updates 2024.02.01

Today we have updated all five digital supplement guides. If you purchased any, please check your email for the download link(s). If you would like more information on these guides, please visit https://inteltechniques.com/books.html. The following provides details of each update:

OSINT Techniques-Leaks, Breaches, & Logs:
Page 81: Updated two commands to correct a file name and use sort instead of gsort.
Page 152: Updated paths within script for options 22-24 for functioning full-disk queries.
Page 157: Added a section about internal drive data storage.
Page 164: Added an option to export a SQLite database to CSV file.
Pages 170-171: Updated eBook price increase for new orders.
Updated DataTool and DataTool.sh scripts on the website to reflect changes.

Extreme Privacy-Mobile Devices:
Page 74: Eliminated line about Telnyx not having voicemail capabilities.
Page 77: Added new section about Telnyx voicemail configuration.
Page 78 & 147: Added new Voip.ms signup code with less scrutiny on new accounts.
Page 80: Added new section about VoIP.ms voicemail configuration.
Page 81: Added URLs for VoIP.ms sanitization.
Page 82: Added new warning about MySudo purchases.
Pages 158-159: Updated eBook price increase for new orders.

Extreme Privacy-macOS Devices:
Page 60: Added clarification about encrypted DNS within macOS.
Pages 79-83: Replaced the Twilio sanitization options and script for better stability.
Page 84: Eliminated line about Telnyx not having voicemail capabilities.
Page 86: Added new section about Telnyx voicemail configuration.
Page 87: Added new Voip.ms signup code with less scrutiny on new accounts.
Page 88: Added new section about VoIP.ms voicemail configuration.
Page 90: Added new section about VoIP.ms API access.
Page 101: Added a new section about UTM Network Connectivity.
Page 109: Corrected Documents path in script.
Pages 116-117: Updated eBook price increase for new orders.

Extreme Privacy-Linux Devices:
Page 18: Added command to remove dark theme background.
Pages 69-74: Added a Twilio access and sanitization script.
Page 75: Eliminated line about Telnyx not having voicemail capabilities.
Page 77: Added new section about Telnyx voicemail configuration.
Page 78: Added new Voip.ms signup code with less scrutiny on new accounts.
Page 80: Added new section about VoIP.ms voicemail configuration.
Page 81: Added new section about VoIP.ms API access.
Pages 112-113: Updated eBook price increase for new orders

Extreme Privacy-VPNs and Firewalls:
Page 20: Added further clarification about PIA's dedicated IP usage.
Page 24: Added brief warning about self-hosted VPN service.
Pages 94-95: Updated eBook price increase for new orders.

UNREDACTED Magazine Issue 006

UNREDACTED Magazine Issue 006 is now available!

https://inteltechniques.com/magazine.html
https://inteltechniques.com/issues/006.pdf

Many thanks to our sponsors:

SLNT: https://slnt.com/
PredictaLab: https://www.predictasearch.com/
Tuta: https://tuta.com/unredacted
Cyber Ways Podcast: https://business.latech.edu/cyberways
Fortify24x7: https://www.fortify24x7.com/
Unchartered: https://www.unchartered.info/
Calabash Investigative Consultants: https://www.calabashicllc.com/
Astropost: https://astropost.io/