Here are a few scans I have done last year using my Xiaomi phone. These MACs are obviously the jabbed, and sadly these are children at sports practice, they are not even allowed their phones, they would be in the locker room well out of bluetooth range.
Thanks Nathan – I had a look at those 140 odd unknown MAC addresses from London. The interesting thing is that they all begin with (Hex) 4 or 5 or 6 or 7.
Nothing else.
That means the first four binary characters are one of the following:
0100 = 4
0101 = 5
0110 = 6
0111 = 7
This means the first two binary digits (01) are locked in all 140+ MAC addresses.
I put a dozen of your MAC addresses through Copilot using David’s script but was unable to find any more locked bits. I did find some more when using only 5 MAC addresses but that is to be expected with a smaller sample.
This is the script I used:
Take the following twelve MAC addresses:
42:25:EB:50:BF:B1
44:50:90:80:F5:B6
44:AC:8A:28:73:97
46:B0:B7:D5:D1:30
47:5C:07:46:5D:A1
4A:45:4B:04:21:0E
4E:69:9D:85:3F:4D
4F:6F:05:C6:D6:27
50:D4:F3:4D:6F:70
54:DD:4E:6D:92:6A
6B:46:73:00:CC:14
73:2D:42:63:DD:BC
Convert each to a 48-bit binary string.
Compare the twelve bit-by-bit.
For each position (Byte1–Byte6, Bit0–Bit7), mark a 1 if the bit is the same in all twelve MACs, or 0 if it differs.
Output the result as a 6-row × 8-column grid, where each row is a byte (Byte1 to Byte6), and each column is Bit0 to Bit7.
The result should look like a constancy map — with 1s showing locked bits across all twelve MACs.
+++++++++++++++++++++++++++++
Byte1 Values
The given Byte1 values from the twelve MACs are:
42 → 01000010
44 → 01000100
44 → 01000100
46 → 01000110
47 → 01000111
4A → 01001010
4E → 01001110
4F → 01001111
50 → 01010000
54 → 01010100
6B → 01101011
73 → 01110011
Compare the bits in each column (Bit0 to Bit7):
Bit0: All values have 0. (→ Locked → output 1)
Bit1: All values have 1. (→ Locked → output 1)
Bit2–Bit7: At least one MAC has a different value. (→ Vary → output 0)
Thus, the constancy for Byte1 is: 11000000
When the same exercise is repeated for the other bytes, we find that none of the bit positions in Byte2 through Byte6 remain identical across all 12 addresses. (In many cases, the diversity of the addresses causes variation in every bit position beyond the first two bits of Byte1.)
3. Final Constancy Map Grid
The grid is a 6‑row (one for each byte) × 8‑column (one for each bit in the byte) matrix, with a 1 where the bit is “locked” (constant) across all MACs and 0 where it isn’t. Based on the analysis:
Row 1 (Byte1): 1 1 0 0 0 0 0 0
Row 2 (Byte2): 0 0 0 0 0 0 0 0
Row 3 (Byte3): 0 0 0 0 0 0 0 0
Row 4 (Byte4): 0 0 0 0 0 0 0 0
Row 5 (Byte5): 0 0 0 0 0 0 0 0
Row 6 (Byte6): 0 0 0 0 0 0 0 0
In a compact form, the constancy map grid is:
11000000
00000000
00000000
00000000
00000000
00000000
This is using 12 unknown Mac addresses – and I know that all 140 have "01" as the first two binary digits - it at least proves that the MAC addresses emanating from people are not random – if they were we would have a constancy map grid showing all zeroes.
Some people may also need to go into Developer Options and turn On 'Detect Unknown Bluetooth Sources' in order to detect them, even using a third party BT app.
There was a time at the beginning of the vaxx rollout in 2021 when you did not need to use a third party bluetooth app to detect these MACs, the default app would find them.
Then either the carriers or manufacturers pushed out updates that broke that ability, and Now you Always have to use a third party app.
They even pushed those updates to Old devices that had not received System or Security Updates in Years, like my old Note 3 and S6 Active.
Also bluetooth devices require matching BT Protocols to communicate, there is a big list of them depending on which version of BT it is.
I also went to a cemetery once and tried to manually push all the protocols that my laptop with a SE bluetooth pcmcia card would support to one of the post-2021 graves emitting a MAC but it would not handshake with any of them.
Xiaomi phones still show these unknown MAC codes when doing a standard bluetooth search, and the setting "Show bluetooth devices without a name" is in the bluetooth menu.
On nearly every other manufacturer's phones, this setting has been moved to the developer options menu (In 2021, funny that lol)
This is good, rigorous work and very interesting. Are you aware that the Starlink constellation can theoretically be used as a gigantic phased array antenna spanning the entire visible sky? Such an antenna would be able to easily pick up microwatt radiation emanating from device(s) implanted in the human body.
I have no doubt this is also tied in with what sound engineer Lookoutfacharlie findings on information he has shared on ambient low frequency noise being recorded everywhere (digital voices and such), also being what many experience as Tinnitus.
I work in a large nursing home, obviously heavily vaccinated (and more). I don’t have an android, or chatgpt, nor am I tech savvy. How can I document useful data from work? Our IT admitted they’ve already installed the 7G mesh network and in a few months we’ll be changing our Echarting from matrix care to point click care, if I remember correctly. Our medical director sort of admitted she knows what, and how, precision health works. Telemetry is radiation, right?
I've started a little sub topic on ss about biowarfare and frequencies, but you are ahead of my game. I've give you the link anyway. Someone somewhere in time and space might appreciate that:
Did you hear? I found out from Dr Steven Greer that alien consciousness is encoded into circuit boards etc, and probably into our dna from the nanobots. We can call ourselves alien cyborgs now, I suppose.
The Truth Behind Fiber Optics and Lasers—They’re Not From Earth | Dr. Steven Greer (24th April 2025)
Googly output; DARPA (Defense Advanced Research Projects Agency) is exploring and funding research related to Zero Trust cybersecurity concepts, focusing on developing innovative approaches to network security and threat mitigation. DARPA's work aims to move beyond traditional perimeter-based security and adopt a more data-centric, user-centric, and device-centric approach to cybersecurity.
This gives me chills. What you are uncovering is evidence of "programmable units for search and destroy." The identification piece is critical. Thank you! Keep at it!
Yes, the Microchip Bluetooth Data app, often referred to as Microchip Bluetooth Data (MBD) or MBD app, is designed to support CSV file downloads. The app enables users to log data received from a Microchip Bluetooth device and save it to a CSV file for later analysis or use. The app supports logging data to a file in CSV format as it is being captured, according to Microchip Technology's website.
Here's a more detailed explanation:
Data Logging:
The Microchip Bluetooth Data app can continuously record data transmitted from a Microchip Bluetooth device.
CSV File Download:
This logged data can then be saved to a CSV file, allowing for easy analysis and storage of the collected information.
Hi David
Good work.
I have noticed that all your MAC addresses in all your Constancy Maps share the same six locked bits.
Byte 1 Bit 0 Bit 1
Byte 2 Bit 0 Bit 3
Byte 3 Bit 7
Byte 6 Bit 6
This could be part of a common base level identifier in all the injected MAC generating devices.
Worth checking.
Here are a few scans I have done last year using my Xiaomi phone. These MACs are obviously the jabbed, and sadly these are children at sports practice, they are not even allowed their phones, they would be in the locker room well out of bluetooth range.
https://go.screenpal.com/watch/cZQrlKVS0GW
https://go.screenpal.com/watch/cZQqYiVSFLr
Thanks Nathan – I had a look at those 140 odd unknown MAC addresses from London. The interesting thing is that they all begin with (Hex) 4 or 5 or 6 or 7.
Nothing else.
That means the first four binary characters are one of the following:
0100 = 4
0101 = 5
0110 = 6
0111 = 7
This means the first two binary digits (01) are locked in all 140+ MAC addresses.
I put a dozen of your MAC addresses through Copilot using David’s script but was unable to find any more locked bits. I did find some more when using only 5 MAC addresses but that is to be expected with a smaller sample.
This is the script I used:
Take the following twelve MAC addresses:
42:25:EB:50:BF:B1
44:50:90:80:F5:B6
44:AC:8A:28:73:97
46:B0:B7:D5:D1:30
47:5C:07:46:5D:A1
4A:45:4B:04:21:0E
4E:69:9D:85:3F:4D
4F:6F:05:C6:D6:27
50:D4:F3:4D:6F:70
54:DD:4E:6D:92:6A
6B:46:73:00:CC:14
73:2D:42:63:DD:BC
Convert each to a 48-bit binary string.
Compare the twelve bit-by-bit.
For each position (Byte1–Byte6, Bit0–Bit7), mark a 1 if the bit is the same in all twelve MACs, or 0 if it differs.
Output the result as a 6-row × 8-column grid, where each row is a byte (Byte1 to Byte6), and each column is Bit0 to Bit7.
The result should look like a constancy map — with 1s showing locked bits across all twelve MACs.
+++++++++++++++++++++++++++++
Byte1 Values
The given Byte1 values from the twelve MACs are:
42 → 01000010
44 → 01000100
44 → 01000100
46 → 01000110
47 → 01000111
4A → 01001010
4E → 01001110
4F → 01001111
50 → 01010000
54 → 01010100
6B → 01101011
73 → 01110011
Compare the bits in each column (Bit0 to Bit7):
Bit0: All values have 0. (→ Locked → output 1)
Bit1: All values have 1. (→ Locked → output 1)
Bit2–Bit7: At least one MAC has a different value. (→ Vary → output 0)
Thus, the constancy for Byte1 is: 11000000
When the same exercise is repeated for the other bytes, we find that none of the bit positions in Byte2 through Byte6 remain identical across all 12 addresses. (In many cases, the diversity of the addresses causes variation in every bit position beyond the first two bits of Byte1.)
3. Final Constancy Map Grid
The grid is a 6‑row (one for each byte) × 8‑column (one for each bit in the byte) matrix, with a 1 where the bit is “locked” (constant) across all MACs and 0 where it isn’t. Based on the analysis:
Row 1 (Byte1): 1 1 0 0 0 0 0 0
Row 2 (Byte2): 0 0 0 0 0 0 0 0
Row 3 (Byte3): 0 0 0 0 0 0 0 0
Row 4 (Byte4): 0 0 0 0 0 0 0 0
Row 5 (Byte5): 0 0 0 0 0 0 0 0
Row 6 (Byte6): 0 0 0 0 0 0 0 0
In a compact form, the constancy map grid is:
11000000
00000000
00000000
00000000
00000000
00000000
This is using 12 unknown Mac addresses – and I know that all 140 have "01" as the first two binary digits - it at least proves that the MAC addresses emanating from people are not random – if they were we would have a constancy map grid showing all zeroes.
Wow, irrefutable proof the poor jabbed people including children have a functioning nanonetwork installed in their body.
This is the biggest single event and crime against humanity in all of human history, and by far!!
Some bluetooth MAC addresses have 64 bits.
Some people may also need to go into Developer Options and turn On 'Detect Unknown Bluetooth Sources' in order to detect them, even using a third party BT app.
There was a time at the beginning of the vaxx rollout in 2021 when you did not need to use a third party bluetooth app to detect these MACs, the default app would find them.
Then either the carriers or manufacturers pushed out updates that broke that ability, and Now you Always have to use a third party app.
They even pushed those updates to Old devices that had not received System or Security Updates in Years, like my old Note 3 and S6 Active.
Also bluetooth devices require matching BT Protocols to communicate, there is a big list of them depending on which version of BT it is.
I also went to a cemetery once and tried to manually push all the protocols that my laptop with a SE bluetooth pcmcia card would support to one of the post-2021 graves emitting a MAC but it would not handshake with any of them.
No dice, fwiw... great work though David.
Xiaomi phones still show these unknown MAC codes when doing a standard bluetooth search, and the setting "Show bluetooth devices without a name" is in the bluetooth menu.
On nearly every other manufacturer's phones, this setting has been moved to the developer options menu (In 2021, funny that lol)
This is good, rigorous work and very interesting. Are you aware that the Starlink constellation can theoretically be used as a gigantic phased array antenna spanning the entire visible sky? Such an antenna would be able to easily pick up microwatt radiation emanating from device(s) implanted in the human body.
'Is this architecture global?'
I have no doubt this is also tied in with what sound engineer Lookoutfacharlie findings on information he has shared on ambient low frequency noise being recorded everywhere (digital voices and such), also being what many experience as Tinnitus.
He share's some interesting insights.
All part of a larger system.
Sounds like they are bagging and tagging everyone and everything just like what a business owner would do for inventory management and control.
Global elites at the highest levels are the business owners and the world’s resources and the people are the inventory.
I may be way off base, but that’s my take on it all.
I work in a large nursing home, obviously heavily vaccinated (and more). I don’t have an android, or chatgpt, nor am I tech savvy. How can I document useful data from work? Our IT admitted they’ve already installed the 7G mesh network and in a few months we’ll be changing our Echarting from matrix care to point click care, if I remember correctly. Our medical director sort of admitted she knows what, and how, precision health works. Telemetry is radiation, right?
Anyway, im trying to collect data while I can.
Wow, just stumbled in here. This is amazing work!
Right. Entropy=increased disorder. What was the next bit ?
Fuckn David Nixon is flying ! Don't worry about me mate. I'm just here to crack the jokes.
Onya buddy !!
always interesting ifrom you, t hanks!
You are a bit brilliant there, David. What does it mean? Is this EMF or some newfangled quantum frequency?
I think it is evidence of a signal ....
I've started a little sub topic on ss about biowarfare and frequencies, but you are ahead of my game. I've give you the link anyway. Someone somewhere in time and space might appreciate that:
https://shonaduncan.substack.com/i/161717055/frequency-and-biological-warfare
Did you hear? I found out from Dr Steven Greer that alien consciousness is encoded into circuit boards etc, and probably into our dna from the nanobots. We can call ourselves alien cyborgs now, I suppose.
The Truth Behind Fiber Optics and Lasers—They’re Not From Earth | Dr. Steven Greer (24th April 2025)
https://www.youtube.com/watch?v=CmKOAD6brmY
Googly output; DARPA (Defense Advanced Research Projects Agency) is exploring and funding research related to Zero Trust cybersecurity concepts, focusing on developing innovative approaches to network security and threat mitigation. DARPA's work aims to move beyond traditional perimeter-based security and adopt a more data-centric, user-centric, and device-centric approach to cybersecurity.
This gives me chills. What you are uncovering is evidence of "programmable units for search and destroy." The identification piece is critical. Thank you! Keep at it!
Did you mean the Microchip Bluetooth Data app ?
yes that's the one I have been using - if you can find one that will allow csv downloads that would be good!
This is what AI says:
Yes, the Microchip Bluetooth Data app, often referred to as Microchip Bluetooth Data (MBD) or MBD app, is designed to support CSV file downloads. The app enables users to log data received from a Microchip Bluetooth device and save it to a CSV file for later analysis or use. The app supports logging data to a file in CSV format as it is being captured, according to Microchip Technology's website.
Here's a more detailed explanation:
Data Logging:
The Microchip Bluetooth Data app can continuously record data transmitted from a Microchip Bluetooth device.
CSV File Download:
This logged data can then be saved to a CSV file, allowing for easy analysis and storage of the collected information.