General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
Frostie-Flake
Rob Braxman Tech
comments
Comments by "Frostie-Flake" (@PlanetFrosty) on "Rob Braxman Tech" channel.
Previous
1
Next
...
All
I move a third eye around my face to confuse facial recognition software!
48
Humm, are you dealing? “Dope” Network is curious expression!🤔😂 just kidding excellent work, Rob!
19
You’re depriving Billy Gates of one of his most perverse activities randomly snooping into peoples private lives! He and the Zucker do it frequently
16
In reality there is a new tech-scanners used to track Bluetooth, WiFi and Cellular where the traffic patterns are analyzed and recorded and handheld.
10
Use VPN over LTE to connect to SIP server maintain encryption so calls are not tracked or listened to.
8
Go full steam punk faceware!
5
Apple is introducing clothing with “air tags” built in? That’s the rumor! Scan for Bluetooth.
5
Best thing is I can hack the air tag and make it function as a microphone. It’s a listening device. Beautiful. Great hack
4
I’m finally likely going to get my Ham License, well, maybe if I can get the time!
4
Beam Forming is used in 4GLTE as well and it’s been active for some time(3+ years) in large cities with high density. See some of the test equipment companies discussion and tear down of beam forming antennas and data streams. Keysight University is a good source of info and testing procedure, but very technical and use of equipment used to calibrate and work on these systems.
4
Good job-now the new intercepts carrier services and backhual.
4
Obama open the door to even more surveillance and interaction with 3 letter agencies!
3
You can keep VoIP secure creating secure PBX on hosted service using encrypted to the server. All server translation and signaling are encrypted to the SIP and NAT translation. You can host your own on Linode outside of US and a local server at your premise. We have all our developers and parters on a encrypted PBX trunk. We have an off shore company for our off shore work anyway.
3
Apple has radically changed the advertiser process and access. It needs to be further analyzed.
3
Excellent review!
3
One of the ways you can further protect privacy with Linux Phone is to keep it off. Use a SIP service and let a caller be put on hold while you are paged(with a pager) turn on your phone and connect to your caller!
3
Great conversation on crypto!
3
Jimmy Blimps be aware Pine is a CHINA PHONE AS IS THE PINE RASPBERRY! There are BLOBS in this build, but PURISM IS UNTESTED as Rob points out!
2
Good job Rob!
2
What you forget it is that Apple is also using Android phones. Yes, there is a public tech release on that, or was.
2
I’ll join you on Library.
2
The changed the name to the CORONA PHONE I hear!
2
FTC ruled against Apple on right to repair recently and they cannot deny use of 3rd Party screens. I’m not being sheeple, because they’re many other issues.
2
Tesla is tracking your every move! They’re even watching what you do inside your car!
2
H2O is using IMEI to block fully capable VoLTE phones that are older. They use ATT which doesn’t block the same phones. So H2O are deliberately blocking to sell new phones.
2
Good job Rob, but one other factor is the defectiveness that also creeps into data causing harm to each one of us as well.
2
Apple has an upcoming map or just released Android LE services. Also coming Android Sandbox toolbox which adds much of what Apple does. And the iCloud or iPhone client scanning for corporate phones requiring Corporate HIPAA Compliance is disabled. Using major corporate account controls are set where NOTHING GOES TO iCLOUD. The participation in the other services is not part of the unique corporate iPhones, but it’s difficult to get these accounts.
2
Excellent news!
2
LoRa devices where you can and build your own LoRa private secure messaging mesh network for your area.
2
Good job! Millimeter wave in 5G typical spectrum creates skin surface heating at most in Israeli study at much higher power! 5G location capability is worse than that-“Radio Shadow Map” capably to accommodate propagation predictive MIMO antenna management -so higher level of security is needed to erase data at radio site after use for connectivity and not passed to network!
2
I will have shortly a Dev Kit for the Qualcomm 865 and the Bluetooth, WiFi6(including new bands) and 5G in a separate RF SOC so it possible to hard switch off baseband. GPS is incorporated along with 3D accelerometer.
2
This was a government attack it appears to me orchestrated by Dictator Joe who was elected by an organized 12 year old voter fraud operation run out of Wuhan University China. Sadly, he even accidentally admitted it and the organizations are 502c3 that reported their CCP connections! All with “fuzzy bunny” get out the vote sounding names except votes came from entire buildings where no one lived or remembered voting. Curious
1
Bluetooth LE is not higher power it is lower power, but uses an enhanced mesh for device locating inside a short range. IE in car mesh, etc. Bluetooth Classic is higher power and has longer distance. I have the IEEE info
1
I have a developer with the Librium 5 and it works very substantially, they’re shipping so I’m not sure what your issue is and I just received an email from Todd. You’re inaccurate in what’s working and not on Librium 5. I suggest you take delivery and actually try it.
1
It’s easy to write facial recognition code.
1
Good job!
1
LTE already uses massive MIMO in congested area and point cloud maps are capable NOW! Is it collected, not currently and designs in current equipment have no capacity in millimeter wave or are their planes for years to come. Verizon is operating in millimeter wave in cities as well as T-Mobile and some other carriers. Beam Forming has been used for a long time in cities.
1
@robbraxmantech I design antennas and software for networks Rod you are simply NOT INFORMED. The is a great point cloud map tracking on LTE in London written by MI5 before any 5G was available. Sorry Rob, Massive MIMO has been used in congested areas for 4 years, go ahead and go through the Keysight Systems on MIMO or the 2018 Cell show. Don’t be misinforming your viewers. Beam Forming is used in LTE with carrier aggregation. If you want videos on beam forming on LTE I can send it to you. Community WiFi also is using Massive MIMO too we sell that equipment so get informed.
1
The voice processing can be entirely embedded on device today not sent to Mama, but you’d have to know the code!
1
I grew up in LA and used to sail as well.
1
The baseband blob is reporting back to carrier and google includes location and phone is listening. It’s texting location data periodically to system.
1
Skynet in your boat radios? Do you know those code in the programmable chips in your radios?
1
You’ve not been in the switching, interconnect or VoIP data center when the Men in Black showed up to install their access device for wiretaps. Or had to assist, I have working with Nortel and others...
1
There is one thing you’re missing on iOS, but only available to enterprise or education customers where “normal” AppleID functions are managed by a corporate and education entity.
1
I saw your phone so good job, but the reality is phones made in Taiwan and India not China will be possible. I understand not now in what you’re doing, but new change to blobs at ITU to encrypt Carrier Communication and users messages are being filed.
1
We’ve had beam forming since 2002 and using it on WiFi since then. We aggregated WiFi and cellular in cormmunitity cellular extension. The roughly 2x4 panels were installed at resorts and community WiFi and Cellular.
1
Have air tags been placed on your boat, your car? Are they tracking you? Scan for Bluetooth.
1
No, Facebook 2FA is abusing as much as Twitter!
1
I’m building Sky Net AI Routers controlling all Internet Traffic!
1
Already hacked Apple with videos and pictures encrypted when taken going to personal cloud. Oops and Linux load on iOS, this is too much fun, I’m not saying get an iPhone, just saying Apple created a way to bust carrier AND AI! Once more is done on hacking the hardware we’ll get back to you...btw we’ve hacked the Apple tracker and turned it into microphone sending live voice to IP address. Oops, Apple
1
Previous
1
Next
...
All