SIGNAL
Z.R.A.K.: Signal
Two Prague teenagers independently detect the same crime — fake hotspots, skimmers, suspicious surveillance — and connect their findings through a shared device address, uncovering something larger than either expected.
Seeing invisible infrastructure. Public WiFi vulnerabilities. Bluetooth and WiFi signal leakage. Physical proximity requirements for digital attacks.