DIY Phone Signal Blocking Pouch

Instructions from the KILLYOURPHONE.COM workshops to create a simple tech privacy-focused pouch for your signal sending device:

The pouch has a very simple design. Of course you are invited make something more fashionable but this version is very easy to make and it works. Make it any size you want! (Tablet etc) To make it fit most common current smart phones I usually make the pouch 10 x 20 cm. IMPORTANT: What ever you do make sure you fold the material on all sides to make sure the radio waves can’t get through!!

Tutorial for a 10 x 20 cm pouch:

  1. Cut 12 cm stripes from your roll [HF+LF Shielding] blocking fleece.
  2. Make pieces of 50 x 12 cm, each for one pouch. (i.e. from a 1 m roll stripe you’ll get 2 pieces.)
  3. Fold your 50 x 12 cm piece in length to 25 x 12 cm
  4. Fold again the long sides, each 1 cm and pin them with needles.
  5. Sew two straight seams on the left and right side.
  6. Fold the opening at least 2 times! Find a paper clip or clamp to close the pouch.
  7. Done!

The project also has a FAQ for doubters … you can check the project’s website with more valuable information here

*But… but WHY would I want to stick my beloved cellphone into a radiation-proof homemade Faraday sack?

*Because it’s constantly ratting you out to data-miners whether you touch it or not, that’s why:

Nearly 200 million text messages a day are being collected from people around the globe by the National Security Agency as part of a secret program called “Dishfire.” That’s according to a new report from The Guardian and the UK’s Channel 4 News service, aided by former NSA contractor Edward Snowden. As part of the program, so-called “untargeted” texts are collected then analyzed by a separate service called “Prefer,” which is capable of pulling together detailed reports for the agency. News of the program comes from an internal NSA presentation dated June 2011, which refers to SMS text messages as “a goldmine to exploit.”


Some of the information captured by the program includes names, phone numbers, and images, though other seemingly basic alerts offer a closer look at someone’s habits. Three such examples are texts from banks and other services about financial transactions, detailed meeting information from calendar invites, as well as messages from wireless phone carriers that are sent when borders are crossed. The program also kept track of missed calls, passwords, and information about SIM cards….

How to stop your phone from betraying you.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s