Waterproof Faraday Phone Bag

Color
Black

You May Also Like

DESCRIPTION

This Faraday bag offers the ultimate protection for your smartphone or small tech devices. With signal-blocking Faraday technology, it provides a dual-layer defense by effectively shielding your device from water damage and instantly blocking wireless communication and threats. 

Instantly Block: Cellular, Wifi, Bluetooth, GPS, EMP, NFC, RFID, Navigation, Solar Flare, and EMF Radiation. 

KEY FEATURES
  • Main compartment is an embedded patented Silent Pocket® Faraday cage

  • Roll down and clip closure (seal, roll three times and secure)

  • Detachable wrist strap for carrying

  • Waterproof RF welded construction

  • Submersible for up to 30 minutes up to 10 feet

Great for: Outdoor adventures, long term storage, everyday use

SPECIFICATIONS

Materials & Trims 

Exterior: 420D Waterproof Nylon 
Lining: Multishield® Faraday Shielding Material
Hardware: Duraflex® UTX buckles

Dimensions

External: 7.48 x 3.94 x .78 in (19 x 10 x 2 cm)
Internal Use: 6 x 3.93 x .59 in (15 x 10 x 1.5 cm)
Handle Length: 19.6 in (50 cm)
Weight: .15 lbs (.07 kgs)

FARADAY TECHNOLOGY

The main compartment of this bag is a Faraday cage and is rated to the following specifications:

Silent Pocket® Faraday Technology Instantly Blocks: 

  • Silent Pocket® with Multishield® (Faraday Shielding Material) is MIL‐STD‐188‐125‐2 compliant, and exceeds IEEE 299-2006 (1 - 40GHz) standards. (100,000:1 reduction, see testing page here)
  • Blocks 100 dB+ Cellular, WiFi, Bluetooth, GPS, RFID, NFC, EMP, and EMF Radiation
  • Blocks CDMA, GSM, DCS, PHS, 3G, 4G, 5G, LTE
  • Blocks WiFi (2.4 - 5 GHz), Bluetooth (2.4 GHz), and GPS (1-2 GHz)
  • Blocks RFID and NFC @ 13.56 MHz
  • Shields against EMP, HEMP, CME, Solar Flare, and static shock
  • Blocks Carrier, hardware, and OS agnostics

FAQ

Smartphones are never really "off" because you cannot remove the power source. In many cases, phones may still be active even though they appear to be turned off. We view this more as "dormant" state, it may still be able to harvest your data or report your location.Slipping your phone into a Faraday bag creates an electromagnetic barrier between the phone and the Cellular, WiFi, GPS, Bluetooth, RFID networks. You're completely off the grid anywhere anytime!

NO. Once your phone is inside of the Faraday bag it's completely unreachable. No headphones or other devices can connect to it. Unfortunately corded headphones won't work either because it would physically disrupt the seal required for complete signal blocking.

NO. When your phone is inside a Faraday product your phone will not ring. You will not receive any notifications to your phone while it’s inside the Phone Sleeve. Once the phone is removed from the Faraday bag and receives signal again any missed notifications will populate, similar to once you turn a phone off of Airplane Mode, but missed calls will not register, just missed voicemails.

Once you take your phone out of the bag it is instantly looking for signal again. Your devices will not be usable while the device is inside of a Faraday product but we can provide additional security measures to follow when your devices are not inside of a Faraday product to help make sure you’re still protecting your devices.

Here's some tips to keep yourself safe while not using a Faraday bag.

  1. Avoid using unsecured public Wi-Fi networks, as they can be vulnerable to eavesdropping. If you must use public Wi-Fi, use a VPN and ensure your device's firewall is enabled.
  2. Regularly review the permissions you've granted to apps on your device. Only grant the necessary permissions and be cautious about apps that request excessive access to your data.
  3. Enable Two-Factor Authentication (2FA ) wherever possible. This adds an extra layer of security by requiring you to provide a secondary verification method, such as a one-time code sent to your phone, in addition to your password.
  4. Disable features like Bluetooth, Wi-Fi, and location services when you're not using them to minimize your device's exposure to potential vulnerabilities.