Where people get burned using this method is SMS re-verification later. VoIP numbers and SMS pools can work at signup, but acceptance isn’t a promise. If Google later forces re-verification and the number can’t receive SMS, is flagged as VoIP, was reclaimed, or no longer looks reliable, you can lose access to the account permanently, often long after setup, along with paid apps and account history. Google doesn’t look at one thing in isolation. They flag patterns. Disposable or high-churn phone numbers. Repeated account creation behavior. Unusual network context, like Tor, open Wi-Fi, or VPN use during signup. Sudden changes in device type, IP address, or login behavior. Any one of these might pass. Stacked together, they raise the odds of re-verification later. Also, just to be clear, you don’t need an email alias at all. You can simply create a pseudonymous Gmail account that will work great with Google Play on GrapheneOS. Email aliases only come up if someone wants extra compartmentalization. From Google’s perspective, the email is not the fragile dependency. The phone number is. That’s why a safer long-term setup is a phone number you control long-term, not a pool or truly disposable number. This could be a TracFone, many of which are eSIM now, purchased in cash, or bought by someone else and handed to you so it’s not directly tied to you. It could also be services like Silent Link or Hushed, with the understanding that there’s always some risk. Many financial institutions already block those numbers, and Google could do the same in the future. They could also start blocking burner email services like SimpleLogin. The specific provider matters less than the principle. Using Tor, open Wi-Fi, SMS pools, and fake identities at signup can increase the likelihood of re-verification being triggered later. Those techniques make sense for anonymity and OPSEC in other contexts, but they’re not well suited for account creation, where automated systems favor stability and boring behavior. Privacy here isn’t about stacking every anonymity tactic at once. It’s about controlling the dependencies you might need later, especially a phone number you can register without giving your real identity and still keep access to if re-verification ever happens. Also... Small correction: site is sideofburritos.com YouTube: https://youtube.com/@sideofburritos