Been using UNIX since the late 80s; Linux since the mid-90s; virtualization since the early 2000s and spent the past few years working in the cloud space.
Location
Alexandria, VA, USA
Education
B.S. Psychology from Pennsylvania State University
Take that contact book and distribute it in a hierarchical fashion: if it's not in your contact-book, your contact-manager app contacts an upstream contact-book to see if it either knows the number or knows "somebody" how knows - or can find out - the person's phone number for you.
...Though that starts bleeding dangerously into "explain LDAP like I'm 5" territory.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Perhaps even more critically...
Take that contact book and distribute it in a hierarchical fashion: if it's not in your contact-book, your contact-manager app contacts an upstream contact-book to see if it either knows the number or knows "somebody" how knows - or can find out - the person's phone number for you.
...Though that starts bleeding dangerously into "explain LDAP like I'm 5" territory.