The Flak Sack™: The Original Theft Resistant Drawstring Backpack for $119
April 19, 2017 / by Marco / Categories : Business, deals, design, entrepreneur, website





KEY FEATURES
Myth: your stuff is safer in a full scale backpack than a drawstring bag. Fact: The Flak Sack™ is made with a double layer of heavy-duty, slash-resistant fabric that acts as a portable safe for your valuables. Designed to accommodate an on-the-go lifestyle, this bag offers premium convenience without sacrificing security. Simply lock the bag closed or to any secure object, and you can rest assured nobody is going to go rummaging through it when you store it at the gym.
- Secure locking system is as simple as pulling & locking
- Slash-resistant fabric was originally developed for use in high-performance body armor, assuring your valuables are safe
- RFID blocking technology shields credit cards, passports, smart cards, & key cards from unauthorized scanning
- Water resistance coating fights back against spills
- Sternum strap keeps ropes centered across your chest for extra security
- Fits a Macbook Pro 15″ or an iPad Mini in the interior pocket
PRODUCT SPECS
Details & Requirements
- Material: proprietary blend of ultra high molecular weight polyethylene
- Dimensions: 18″ x 14″
- Capacity: 13 l
- Weight: 1.4 lb without lock
- Interior pocket: 10″ x 7.15″
- Designed in Columbus, Ohio
Includes
- The Flak Sack™ w/ Sternum Clip
- Solid Brass Lock
- Canvas/Muslin protective pouch
OTHER ARTICLES YOU MAY LIKE

DRILL BRUSH KIT REVIEW: OZITO 16-PIECE UNBOXED + REAL CLEANING RESULTS
Ready to put a drill-powered brush kit to the test? In this unboxing and quick clean-up, we crack open a 16-piece drill brush set, check out what each piece is for, and then try it on a stained pot to see how it performs. If you’ve ever wondered how these brush kits stack up for […]
read more
OPENSSL TUTORIAL: CREATE A PRIVATE KEY AND SSL CERTIFICATE FROM THE TERMINAL
In this guide, we’ll walk through requesting a certificate in AWS Certificate Manager (ACM), exporting it with a passphrase, decrypting the private key on a Linux server, and installing the certificate into HestiaCP. I’ll also point out exactly where each step happens with the screenshots referenced in the transcript. 1) Request a public certificate in […]
read more