Quoted:I am not suggesting the utilization of these for nefarious purposes.... But with all the insanity as of late, and the prospect of what may be following.....I'm just saying.
While I know amazon is on most everyone's shit list......the link provided is just a suggestion of the type of bag that folks might want to consider.
https://www.amazon.com/dp/B01A7MACL2/ref=cm_sw_em_r_mt_dp_nw4aGbPG92BD6As those of us begin to get more active as it pertains to getting together, a bag like this will prevent devices from tracking location and linking them like what happened as described in the thread below:
https://www.ar15.com/forums/general/How-was-this-done-Massive-antifa-data-dump-/124-2390529/
View Quote
Devildog, the honey pot was successful because the antifa actors had their phones set to connect to any open wifi service it detects. So the honey pot crew drove around with an open wifi and logged everything. If that one setting was off they would have been fine.
The feds are doing the same thing with the stingray devices which take it to the next level by impersonating a cellular tower and intercepting cellular data.
Turn you phone off before putting it in the bag or it will run the battery down searching for a signal.
Secure reliable comms are on everyone's mind right now. There's no magic bullet. Secure comms are complex to set up. Using a provider may simplify the setup but then you never know what the provider is doing on the back end, if there's a back door, or if you've been infiltrated.