How does DaD's Request Line work?

DaD’s Request Line (RL) turns your contact list into a secure SMS relay. Bypass "one-account-per-number" limits by anonymously routing verification codes through trusted contacts. It’s a private, decentralized alternative to burned "receive SMS" sites—no apps or accounts required.

Building on the core DaD experience—where a human messenger makes a phone call for you—we’ve introduced the Request Line (RL). While the standard DaD service starts with you typing a message on our platform, the Request Line is a specialized feature designed to securely and anonymously route sensitive SMS data (like one-time codes) through a trusted network of your own contacts.

Why use the Request Line? Most online services today require a unique phone number for verification, which creates a significant bottleneck if you need to manage multiple accounts or separate your personal and professional digital footprints. Typical "receive SMS" websites provide public virtual numbers that are often already flagged or exhausted by these services. RL solves this by tapping into a trusted, distributed network of real mobile numbers. It’s not about offloading risk, but about expanding your access—allowing you to leverage "fresh" numbers from your own circle to bypass the "one-account-per-number" limitation, all while keeping your primary digits off of marketing databases and out of third-party systems.

Here’s how the Request Line works:

  • Initiate the Session: You visit dad.june07.com/rl and provide your phone number to start a session.
  • Recruit Your Network: You share your unique session link with contacts from your phone via a pre-populated SMS. This invites them to act as a "relay" for you.
  • Anonymous Joining: Your contacts can join the session. While you (the requester) know who they are, the participants remain anonymous to one another, maintaining privacy within the group. The option to also remain anonymous as the requester on any future requests is also available.
  • Select a Participant: Once participants have joined, you choose one to help with your request. The app then opens a private, secure channel between just the two of you.
  • The SMS Relay: The app informs you that the participant’s number is ready. You then trigger an SMS (such as a 2FA code or verification link from an external service) to be sent to their phone instead of yours.
  • The Hand-off: The participant receives the code and relays it back to you through the secure DaD session. Once you confirm receipt, the session is closed.

Important Notes:

  • Streamlined Access: To keep the experience frictionless, the Request Line eschews traditional OAuth/password logins. Instead, it uses cryptographically "hard to guess" strings for user IDs and URLs to ensure security without the hurdle of an account.
  • The Intelligent Phone Book: The backend intelligently tracks which contacts have helped you in the past. Over time, it builds a personal "phone book" for you. For future requests, the system will attempt to reach out via Web Push notifications first, falling back to SMS only when necessary.
  • Privacy & Utility: This feature allows you to receive sensitive verification data without exposing your own primary number to third-party services, leveraging the power of your existing social circle with a layer of technical anonymity and coordination.

The Request Line turns your contact list into a private, secure infrastructure for handling the digital "gatekeepers" of the modern web.