two types of access. the interception of the radio magnetic waves,
or data access through established data base
theres nothing new here. two ways to block
transmit in such a wide bandwidth and shorter time intervals that reception is not possible with snoopers equipment
use encryption techniques that require long computation time in determining the "primes" used in the binary code.
or unbreakable codes based on different code alphabets. these can also be entropy codes were the information is in the noise.
either way red flags go off and monitoring is started
which may be what the sender wants, especially if the tag it, by using known coding techniques of the other guys.
sort of I know, that you know, that they know,