Section 31's primary threat, and although the weapon has a fascinating origin story, it also has canonical issues.
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...