Gregg Phillips..."Patriot Games"
(media.greatawakening.win)
Comments (35)
sorted by:
Use grapheneOS on your phone, it scrambles your MAC address for every interaction.
Your MAC address isn't transmitted over the Internet
It doesn't have to be "transmitted over the Internet" for it to be a privacy concern.
A mobile phone broadcasts its MAC Address anytime it's in Wi-Fi range if the user doesn't disable it, which means the local businesses you frequent have a record of your MAC Address and its activity unless you disable Wi-Fi.
And, nowadays, those local businesses often outsource Wi-Fi management to an MSP, which can then combine records of your "check-ins" to different places and sell it to government agencies, advertisers, and even private investigators.
No, this isn’t a scene from Minority Report. This trash can is stalking you
Smartphone-monitoring bins in London track places of work, past behavior, and more.
Dan Goodin - 8/9/2013, 2:15 PM
https://arstechnica.com/information-technology/2013/08/no-this-isnt-a-scene-from-minority-report-this-trash-can-is-stalking-you/
Archived link- https://archive.ph/yf1nY
grapheneOS randomizes those scans and adds a very minimal level of security through obscurity.
That's a good point. Wish I had a Pixel phone to try it on.
But it is collected by hotspots, even if you don't connect to them.
Every packet is encapsulated in a frame, which has both a source and destination MAC address. Both the source and the destination MAC addresses are removed once it crosses out of the local broadcast domain (moves across a router), and are replaced with the appropriate addresses in the next broadcast domain
Truth
There is no such thing as a TCP/IP packet. Ethernet is only for the LAN, hence the MAC/Ethernet address (and the Ethernet header that contains it) doesn't get routed. Routers only route IP addresses, and see you can see that the IP packet header doesn't have a MAC address field. When a router receives an IP packet (which will contain other data from higher OSI layers relevant to other aspects of the interaction), it inspects the Destination Address header. It then inspects its routing table. If the address in that header is "known" (because it is on a local segment) then it will unwrap the message from the IP packet and wrap it in an Ethernet frame with the destination MAC address, then forward it onto the LAN via the relevant local port to be received by the target host. If not it will forward it to the appropriate IP address/router according to the data in its routing table. This "appropriate" address might just be the default route.
Why would you advertise your operational plan?
That does seem counterintuitive, doesn't it?
Maybe they're baiting the hook. Now that the deep state knows a package in en route, will they be tempted to intercept it or tamper with it? Perhaps there are safe guards in place to detect or protect against something like that happening. Or maybe even to track who does the tampering.
We've seen President Trump do this on many occasions - lure the deep state into making (sometimes) very public mistakes. Maybe Gregg is taking a page from the same strategy?
He’s basically planning a counterintelligence operation and disclosing his methods in advance of opgo. Makes no sense to me.
For real. I wouldn't go around broadcasting to the baddies that we learned how to use their stuff.
But isn’t this more of a;
“we have the tech, and are using it...you’re just to dumb to figure that out. Now, we’ll prove it in court.”
..kinda deal? I figure it’s a strategic move. Tech has probably been working for over a year. Now he’ll just advertise it. I may be way off here though.
Interesting. It’s like we are showing our hand to cover known operatives. Like look, we know you know, and now you know that we know..you know? So now what strategy are you, the deepstate, gonna come up with. Like force of hand.
..I don’t know.
Lol... this isn't something someone in opsec would advertise. This part seems a bit fishy. Maybe intentional misinfo op?
Monitor and control. All assets evaluated daily. Let’s see what he does.
he could be limited on what he can say in public. ongoing op sec....maybe..or not. diff going keep eyes on him.
The Best Way To Win, Is Not To Play.
Don't get blackmailed, don't take bribes, and come forward if you do.
We The People will allow your families to live onward.
( Watch the world turn to a new day )
https://www.electroschematics.com/mobile-cell-phone-jammer/
https://www.wiringview.co/mobile-phone-jammer-schematic/
And these are useful too, in minecraft.
I'm voting in shithole LA this Tuesday. I hope some of this alters the fabric before Nov 23
My takeaway.
https://truthsocial.com/users/greggphillips/statuses/108423002448850810
He should have waited until Tuesday to let us know.