I know a friend who fixes mobile phones and I asked him that question to remove antenna on phone and he told me that would be the end of the entire phone. The entire motherboard is destroyed and the circuit is now opened and how are you gonna patch it back and with what? Never touch the antennas in the phone. All phone technicians know this rule by heart
My car’s computer has been remotely hacked. I was able to pull the fuse responsible for my vehicle’s audio system which also affected access to its WiFi. People still drive close to my first floor apartment and fraudulently use my IP and identity via CarPlay, a frequency booster type plug in but mostly through something called a LAN WAN Passthrough created by the main hacker when I was driving and had my DashCam plugged in via USB cord.
Whoever made this product probably deserves the Nobel Prize in EE if there is one. Haven’t seen anything like it but it’s not the be all end all solution either.
Ethical hacking has indispensable solutions that must complement this. Majority of TIs are being tracked by cybersecurity and digital experts first before they are by intelligence agencies . The 2 are not mutually inclusive.
The product from Targeted Source does seem to help.
Too vague. What device and how did it help.?
If you remove this then the wifi will stop working. Will it?
Yes, if you remove the wifi chip the wifi on your phone will stop working.
We did not say, remove it from your phone. Remove it from your Laptop and router.
\
I know a friend who fixes mobile phones and I asked him that question to remove antenna on phone and he told me that would be the end of the entire phone. The entire motherboard is destroyed and the circuit is now opened and how are you gonna patch it back and with what? Never touch the antennas in the phone. All phone technicians know this rule by heart
Does this block v2k?
How they see through our walls , it use x ray, or microwave and ai to reconstruct the person into the house? this Devis can stop surveillance?
My car’s computer has been remotely hacked. I was able to pull the fuse responsible for my vehicle’s audio system which also affected access to its WiFi. People still drive close to my first floor apartment and fraudulently use my IP and identity via CarPlay, a frequency booster type plug in but mostly through something called a LAN WAN Passthrough created by the main hacker when I was driving and had my DashCam plugged in via USB cord.
Am fighting the criminals in NY courts but can anyone tell me recent court rulings ANYWHERE favorable to us TIs? Know r some but not too many.
Whoever made this product probably deserves the Nobel Prize in EE if there is one. Haven’t seen anything like it but it’s not the be all end all solution either.
Ethical hacking has indispensable solutions that must complement this. Majority of TIs are being tracked by cybersecurity and digital experts first before they are by intelligence agencies . The 2 are not mutually inclusive.
Who can afford $490 ???!!
It block V2K?