The BLUxTxxTH / MAxC ID vWaxc-xine Phenomenon & Intra-Corporeal Nanox Networks (C0r0n@2Inspect) — Nano Antenna/Router — Global Mind Surveillance — Remote Targeting/Killing of Dissidents
- Summary of the MAC phenomenon and the intracorporeal network of nanocommunications
by MIKANDERSEN, https://corona2inspect.net/
Auto-Translated from Spanish
The phenomenon of MAC emissions in people vaccinated against COVID-19 is an alarming fact that demonstrates a cause and effect relationship. This video-documentary summarizes how the MAC phenomenon was noticed, what it consists of, how it can be experienced in a simple way, what implications it has for the individual and for society, what could be causing the observed MAC phenomenon, what the scientific literature tells us about intracorporeal networks of wireless nanocommunications, the role of MAC protocols in the network, and its approach at a theoretical level. In this documentary, a section has also been dedicated to speculation in which we try to imagine possible uses, based on the possibilities stated in the scientific literature and based on the confirmed and revealed content of the vaccines,
–
After watching this documentary, you may want to do some anonymous MAC address detection tests or experiments and consider using other backup applications in addition to your phone’s default Bluetooth features. Below is a list of applications for phones with IOS and Android operating systems, which could be useful to detect and investigate the MAC addresses of vaccinated people.
–
iOS applications- BLE Scanner 4.0 / Bluepixel Technologies LLP # https://apps.apple.com/es/app/ble-scanner-4-0/id1221763603
- Blue Sniff – Bluetooth Scanner / Kevin Horvath # https://apps.apple.com/es/app/blue-sniff-simple-bluetooth-detector/id1205673451
- nRF Connect for Mobile / Nordic Semiconductor ASA # https://apps.apple.com/es/app/nrf-connect-for-mobile/id1054362403
- plusBLE / linCogN Technology Co. Limited # https://apps.apple.com/es/app/plusble/id859879598
- LightBlue / Punch Through # https://apps.apple.com/en/app/lightblue/id557428110
android applications
- BLE Scanner 4.0 / Bluepixel Technologies LLP # https://play.google.com/store/apps/details?id=com.macdom.ble.blescanner
- BLE Sniffer / aconno Gmbh # https://play.google.com/store/apps/details?id=com.aconno.blesniffer
- nRF Connect for Mobile / Nordic Semiconductor ASA # https://play.google.com/store/apps/details?id=no.nordicsemi.android.mcp
- nRF Logger / Nordic Semiconductor ASA # https://play.google.com/store/apps/details?id=no.nordicsemi.android.log
- BLE Analyzer / keuwlsoft # https://play.google.com/store/apps/details?id=com.keuwl.ble
- LightBlue / Punch Through # https://play.google.com/store/apps/details?id=com.punchthrough.lightblueexplorer
- BLE Scan Data Viewer / DH Lee # https://play.google.com/store/apps/details?id=com.spitter.ble_scan_data_viewer
- BLE360 / EmerTech Limited # https://play.google.com/store/apps/details?id=hk.emertech.ble360
It is likely that, once you have registered a list of MAC addresses that potentially correspond to vaccinated people, you will want to check if they belong to any manufacturer of electronic devices. Below are different resources where you can check the manufacturer of each MAC device.
MAC OUI Finders
- DNS Checker: MAC Address Lookup # https://dnschecker.org/mac-lookup.php
- MA:CV:en:c:rs # https://macvendors.com
- MAC Address Lookup # https://www.macvendorlookup.com
- ipchecktool: MAC Search # https://www.ipchecktool.com/tool/macfinder
- WireShark: OUI Lookup Tool # https://www.wireshark.org/tools/oui-lookup.html
- OUI Lookup # https://ouilookup.com
- mac2vendor: OUI Database Lookup # https://mac2vendor.com
–
read more.
end