Free Domestic Shipping on Orders Over $200

Cart (0)

Your Cart is Empty

Locking Faraday Bag

Color
Black
Size Guide
DESCRIPTION

An innovative solution designed to securely lock and disconnect any device from external signals and networks, the Locking Faraday Bag provides the utmost protection for key fobs, cryptocurrency hardware wallets, and mobile devices. With patented signal blocking technology, it shields your device from all incoming and outgoing signals including EMP.

Instantly Block: Cellular, WiFi, Bluetooth, GPS, RFID, NFC, Satellite, Navigation, EMP, Solar Flare, Key Fob and EMF Radiation

Size Guide

KEY FEATURES
  • Patented Silent Pocket® Faraday cage with magnetic closure
  • Specifically engineered to meet OSHA compliance standards for shielding devices and car key fobs during remote start vehicle servicing.
  • Lockable metal d-ring closure
  • Clear plastic pocket for storage (Non- signal blocking)
  • Available in: Small, Medium

Great for: Long term storage, company issued devices and traveling

SPECIFICATIONS

Materials & Trims 

Exterior: 400D Weatherproof Nylon
Lining: Multishield® Faraday Shielding Material

Dimensions

SMALL:

External: 7.1 x 4.13 x .4 in (18 x 10.5 x 1 cm)
Internal Use: 5.35 x 3.5 in (13.59 x 9 cm)
Weight: 0.2 lbs (0.09 kgs)

MEDIUM: 

External: 8.48 x 5.54 x .4 in (21.5 x 14 x 1 cm)
Internal Use: 6.73 x 4.52 in (17.09 x 11.5 cm)
Weight: 0.23 lbs (0.1 kgs)

FARADAY TECHNOLOGY

The main compartment of this bag is a Silent Pocket® Faraday Cage and is rated to the following specifications:

Silent Pocket® Faraday Technology Instantly Blocks: 

  • Silent Pocket® with Multishield® (Faraday Shielding Material) is MIL‐STD‐188‐125‐2 compliant, and exceeds IEEE 299-2006 (1 - 40GHz) standards. (100,000:1 reduction, see testing page here)
  • Blocks Cellular, WiFi, and Bluetooth signals.
  • Blocks GPS tracking, Satellite, and Navigation signals
  • Blocks NFC and RFID such as chips in passports and credit cards
  • Protects your head and body from EMF radiation
  • Blocks electronic car key fobs from relay attacks and electronic theft : 315MHz (U.S. and Japan) and 433.92MHz (Europe)
  • Shields against EMP, HEMP, CME, Solar Flare, and static shock

FAQ

Smartphones are never really "off" because you cannot remove the power source. In many cases, phones may still be active even though they appear to be turned off. We view this more as "dormant" state, it may still be able to harvest your data or report your location.Slipping your phone into a Faraday bag creates an electromagnetic barrier between the phone and the Cellular, WiFi, GPS, Bluetooth, RFID networks. You're completely off the grid anywhere anytime!

NO. Once your phone is inside of the Faraday bag it's completely unreachable. No headphones or other devices can connect to it. Unfortunately corded headphones won't work either because it would physically disrupt the seal required for complete signal blocking.

NO. When your phone is inside a Faraday product your phone will not ring. You will not receive any notifications to your phone while it’s inside the Phone Sleeve. Once the phone is removed from the Faraday bag and receives signal again any missed notifications will populate, similar to once you turn a phone off of Airplane Mode, but missed calls will not register, just missed voicemails.

Once you take your phone out of the bag it is instantly looking for signal again. Your devices will not be usable while the device is inside of a Faraday product but we can provide additional security measures to follow when your devices are not inside of a Faraday product to help make sure you’re still protecting your devices.

Here's some tips to keep yourself safe while not using a Faraday bag.

  1. Avoid using unsecured public Wi-Fi networks, as they can be vulnerable to eavesdropping. If you must use public Wi-Fi, use a VPN and ensure your device's firewall is enabled.
  2. Regularly review the permissions you've granted to apps on your device. Only grant the necessary permissions and be cautious about apps that request excessive access to your data.
  3. Enable Two-Factor Authentication (2FA ) wherever possible. This adds an extra layer of security by requiring you to provide a secondary verification method, such as a one-time code sent to your phone, in addition to your password.
  4. Disable features like Bluetooth, Wi-Fi, and location services when you're not using them to minimize your device's exposure to potential vulnerabilities.