PoC RADIOS vs Shielded Signals

You’ve probably seen them: inexpensive handhelds claiming “AES-256 End-to-End Encryption” and “Works even when cell service is down.” They sound impressive until you look under the hood.

These are PoC (Push-to-Talk over Cellular) radios. They’re not radios in the traditional sense. They’re smartphones in disguise, running a cloud-based app that needs LTE, 5G, or Wi-Fi to function. And that’s where the illusion of resilience falls apart.

Their use of “AES-256” is not the same as Shielded Signals. For them, it usually means “AES between device and vendor server.” Even LTE is only 128-bit carrier-controlled encryption, and encryption is illegal on their “fallback” of FRS or GMRS channels. Meanwhile, the vendor can see or decrypt all traffic as it moves across their network and through their servers.

If you can’t reach a cell tower, PoC “radios” become nearly useless. They are just more expensive versions of the already insecure FRS radios.

Feature PoC Radios (Push-to-Talk over Cellular) Shielded Signals (PRaaS™)
Frequency Band LTE / 5G / Wi-Fi — uses public cellular data networks Licensed VHF spectrum under FCC authorization
License Required  No FCC radio license, but requires SIM registration and data subscription  Covered under Shielded Signals’ FCC license; no SIMs or carrier plans required
Encryption / Privacy  Typically AES-256 between device and vendor cloud; not true end-to-end. Vendor can see or log traffic. Encryption illegal on their “FRS/GMRS” fallback.  True AES-256 end-to-end encryption at the radio level; unique keys per customer or family
Range Dependent on carrier coverage and internet connectivity. No service if cell or Wi-Fi fails. VHF handhelds typically a couple of miles depending on terrain; extendable through licensed repeaters
Infrastructure Dependence  Fully dependent on cloud servers, cellular towers, and vendor authentication  Independent, off-grid operation under Shielded Signals control
Typical Use Commercial dispatch apps, delivery fleets, or novelty “network radios” Private, secure coordination for families, teams, and organizations
Reliability Fails when cell service, data, or vendor servers go offline; limited fallback options Operates consistently without internet or carriers; repeaters add range, not dependency
Professional Legitimacy Dependent on third-party apps and overseas servers; claims of E2EE rarely verifiable FCC-compliant, legally licensed service under U.S. oversight; transparent, auditable security