How does anyone know who ends up with which device? Why would anyone buy those devices once it is known they are compromised?
I’m with you, RL. I’m of a different school of thought on those “phones”. I think it was either cboldt or TXnMA (one of the smart ones, anyway) who said the pallets contained “parts” for devices (phones included).
I think maybe they weren’t intended for certain deep state people, but were maybe tracking things intended for the mass market so that the deep state could track the general population. I think maybe Q is telling the deepies that they are everywhere and they know what they are up to.
anyway, that’s my incomplete theory on the matter.
Bagster
Lesser Oracle
~ ~ ~ ~ ~
I somehow missed that approach on the cell phones, bagster. I do appreciate your summarizing it. That makes a lot of sense.
It would be trivial to determine who has which comped phone.
As soon as it is turned on, geolocation, as soon as the user speaks to it , voice recognition, bounce that against the database, voila.