Cool…

This one goes out to all the small government, privacy loving, Republicans out there, supposedly hating invasive big brother tactics and representing the values of the American heartland.

Would be much appreciated if you could have a word with your people about this.

  • @MegaUltraChicken@lemmy.world
    link
    fedilink
    English
    59 days ago

    The reason it being turned off matters is because LE has a significantly more difficult time extracting data from that state. And again, a proper faraday bag prevents signal leak.

    You guys are welcome to do what you want, I’m just explaining the best way to stay safe if you don’t want to leave your phone at home. There are plenty of legitimate reasons someone may want one as a lifeline just in case.

    • Echo Dot
      link
      fedilink
      English
      39 days ago

      My concern would be that the police would confiscate my phone. Not that they would necessarily be anything on it, but I don’t want them to have my nice expensive phone. They can have this crappy cheap one instead.

          • @interdimensionalmeme@lemmy.ml
            link
            fedilink
            English
            28 days ago

            Any software defined radio that can transmit on these bands and RF amplifiers.

            The ham radio community also has all the information on how to build them out of of basic components, power RF transistors being the most expensive components, but that is still dollars not tens of dollars.

            Sometimes ready made gps jammers can be obtained off the shelf from overseas markets outside of the hegemon’s reach. But active protest does require being smart about it. No point in just causing irritation with the population while leaving the enemy able to operate unencumbered. That means performing observation, OSINT, signals intelligence to understand their system and find their weaknesses.

            They will have covered most vulnerabilities from their own guerilla warfare manuals so study those and find their blind spots. Find where they have become overconfident in their hardware’s ability. Where they have started taking from granted technologies that remain only reliable in peacetime.

            Use their systems against them