I just want the ALPconnect too completely hide the recent alarms when in parking mode. Just so people can't scroll through your recent alarms when you get pulled over. Probably might be a good idea to hide the radar icon too.
I just want the ALPconnect too completely hide the recent alarms when in parking mode. Just so people can't scroll through your recent alarms when you get pulled over. Probably might be a good idea to hide the radar icon too.
If you get pulled over, just grab your phone, close the app and put it in your pocket.
Perhaps the app could be used as part of a "Privacy Mode Lite". When enabled, the ALP would switch to parking mode if the ALPConnect app is shut down, or if a special "panic button" is pressed in the app, the ALP would switch to parking mode and the app would close. The only way to re-enable defense mode is through the app again. If the phone is in your pocket they can't legally search it for evidence of a jammer (depending on the country anyway, but if they do, it's just a phone, and the ALP is just a parking sensor, right?).
Last edited by radargeek; 04-20-2014 at 11:40 AM.
If I passed you on the right, YOU are in the wrong lane!
2016 Encounters/Saves (to date): 33.8: 1/1 (last 4/13) | 34.7: 1/1 (last 3/11) | 35.5: 19/11 (last 8/28) | K: 1/1 (last 6/26)
2015 Encounters/Saves: 33.8: 1/0 | 34.7: 13/4 | 35.5: 19/10 | K: 4/1 | LIDAR (sighted/hit with/save): 4/1/1
ACTIVE CMs: Redline X, K, Ka 2,4,5,8 (highway/long trip RD) | New! V1C 3.8945 K, Ka CS, TMF2 w/YaV1 (in-town RD) | ALP Quad | BlackVue DR650GW-2CH
I'm sure they will ask for a demonstration if they see the heads on the front. It would be nice to hand them the phone to play around with.. IF..... God forbid it ever happened
The enforcement in Australia had the right to test things in your car without you permission & search your entire car too, even pull your car apart if the suspect. They even go through your phone.
Last thing I would like them to see is an alarm history with Ultralye in it lol
Last edited by shanetrainST; 04-20-2014 at 11:47 AM.
MirageTools.net - Laser CM Reviews and Tools
RALETC.com - Radar and Laser Expert Testing Cooperative
AL PRIORITY (Quint) w/BT, RG, & STiR | V1 3.892 + YAV1 | BlackVue DR650GW-2CH
No, on the bluetooth app there is a clear in the lower right hand corner. When you see the lights just hit the "X" to clear the history and then hit the power button. Tell the officer it's your ipod and it's connected to your stereo for music. If he wants a demonstration I'm sure you can provide that.
MirageTools.net - Laser CM Reviews and Tools
RALETC.com - Radar and Laser Expert Testing Cooperative
AL PRIORITY (Quint) w/BT, RG, & STiR | V1 3.892 + YAV1 | BlackVue DR650GW-2CH
dinkydi (04-20-2014), Laser Guided (04-20-2014)
On a related note, I would like the ability to clear the lifetime statistics in the ALP. Or, perhaps you could have a lifetime statistics section (like an odometer, cannot be reset) and a statistics counter that can be reset (like a tripmeter).
Currently, my ALP's history is "polluted" from all of the times I've fired my LIDAR simulator at it, making sure that it properly alerts to simulated front and rear threats.
LEO's have made a semi-regular habit of going through people's phones during questioning in the USA as well. Every court case that I am aware of has upheld their right to do so. This issue has not been before the US Supreme Court yet, and I a m certain that it eventually will, ( and I'm not optimistic about what they would decide with the current court's track record) Meantime, don't have anything *incriminating* on your phone.
shanetrainST (04-20-2014)
Or encrypt your cell phone: http://www.techrepublic.com/article/...evel-security/ Then if pulled over, switch the phone OFF (or pull the battery), thus getting rid of the contents of the RAM, and protecting yourself against cold boot attacks: http://www.extremetech.com/computing...in-the-freezer
So long as the LEOs do not ever SEE evidence of something illegal on there, they likely can't compel you to decrypt the contents. There appears to be a huge leap between when the government KNOWS about incriminating content on a device, and just can't access it (for example, if they take a phone, and see evidence of jammer usage on said phone) and when it merely SUSPECTS that there's something incriminating on there. In the former case, courts have held that you can be compelled to decrypt the contents of the device, but in the latter, the Fifth Amendment protections apply. The key is to prevent the LEOs from seeing anything incriminating in the first place.
https://www.eff.org/press/releases/a...ced-decryption
http://arstechnica.com/tech-policy/2...d-hard-drives/
curmudgeon (04-20-2014)
Connect With Us