The threat model that I want to discuss is if there is any known way that law enforcement (LE) can successfully backtrack location of someone who was using certain apps and websites during a certain time of 20-30 days prior or more.
Physical devices used: 1) a portable router with anonymous roaming sim card, 2) a Mac/windows laptop, and 3) a pixel with graphene.
The anonymous sim card being used in the portable router would be a roaming sim card and VPN killswitch on the laptop and the pixel.
Laptop and pixel must be used to access certain apps and websites. (tails and others are not an option)
Is this currently the best way to avoid location tracking and historical location data from LE?
As the sim card communicates with the cell towers and the network carrier knows when and where this sim card was used for data. Would LE be able to discover the sim card used and ask network carriers for data on this sim card and thus being able to triangulate where this sim card was located 20-30 days ago?
Or is historical location data much harder to obtain than live location tracking? And how detailed and precise is historical location data as sim cards use and share IPs with different sim cards of the same carrier nearby.
Is using this setup on a laptop compared to a pixel less secure?
Hope there are some members here that are well versed and know about location tracking and historical location data from carriers and to discuss this threat model together and if there are any better solutions than the solution above?