Posts

Showing posts from February, 2020

Stealthed, silent assassins switchblades and folding knives

Silent, locking switchblades and folding knives. So there's no click when the knife locks in to place and should stay in place, unless closing it again according to the delocking mechanism. Stealth, locking folding knives. (idea)

See through glasses

See through glasses. So the wearer can see through the glasses, but other people can't see through the glasses. And the wearer should have the best view through the glasses, almost natural. A person can look somewhere, but they won't see where his eyes are looking. -This can be very useful

Night vission camera's by amplification of light for recording proof

The night vission camera's without infrared. Night vission camera's by ampflication of light, with recording offcourse, for recording proof and information stealthed.

Using cell phone and wi-fi jammers in tactics

Using cell phone and wi-fi jammers in tactics. Because some people will call for back up, reinforcements, bad friends or will give back intel in the last seconds or minutes.

Imformation for most two handed blunt improvised weapons

Imformation for most two handed blunt improvised weapons Close grip for more damage. Wide grip for faster attacks. And better for tight places, less space. Thrusts -Also for very tight spaces. And underside hits for very close range.

For possibly being followed

For possibly being followed Hearing footsteps -also how fast. Sudden change(s).  How many peoples footsteps. Watch shadows -If you're lucky the followers shadow will go in front of yourself  and then also beyond yourself, so you can see him coming -And it's also possible to just look to the side and then with the eyes more backwards  to see how far a shadow is  and in what angle if possible. When going around a corner it's possible to look sideways and backwards by looking to backwards with the eyes. - Using reflections -Windows for example

Anonymous accounts

Anonymous accounts 1 Having or installing an anonymous browser -And having the right settings on the anonymous browser. 2 Making or having an anonymous email made on the anonymous browser. -Made with an anonymous browser and always only going to that anonymous mail with the anonymous browser 3 And then making an account on a site with the anonymous browser and with an anonymous email. And only going to that account with the anonymous browser. If needed: Using an anonymous and cheap mobile phone for the registration                 and or validation. Imortant: Not using a username which is used on the normal browsers accounts.           Using a name which will conceal ones real identity (if legal), an alias. Extra safety: Other kind of passwords (passwords can be linked together) Important: Double checking if using the anonymous browser. Not making mistakes. Warning: There's always some risk. Opinion: I...