>>
|
No. 15698
ID: 6d6cb1
File
142873862428.gif
- (9.08KB
, 518x314
, hal_with_tnc.gif
)
>>15680
>There might be some hidden chip or something about the design so that the PLA/Chi-chom can hear you even if you have your frequency scrambled/coded messages.
In general, it's not worth the risk for anyone to create such an "obvious" backdoor. It's like having an AES backdoor. The risk to keep that secret is far higher than the usefulness. If anything, the weakness would be "accidental" like shitty RNGs (see Intel, NIST, et cetera). Do not trust any design. Assume closed designs are either inherently flawed or are intentionally bugged.
>Or it could even reveal your position to the PLA/chi-coms.
Talk to any experienced ham. They often do this just to be assholes to people who don't have licenses, broadcast pirate radio stations, or forget to state their call sign. Finding someone who is broadcasting is FUCKING EASY. Go look up triangulation, kiddo.
>>15687
>>15693
Then just do APR with ZTP. The crypto is handled on another machine.
>>15695
>The design of the radio is irrelevant.
Depends.
>If they want to break the code of an encrypted radio, it's pretty fucking easy for a technologically sophisticated nation.
Doubt it. Crypto is strong. That's why technologically sophisticated nations tend to aim for side-channel attacks.
>If they want to block radio transmissions, it's pretty fucking easy for a technologically sophisticated nation.
It's easy enough for any normal person. Spark gap transmitters, brah.
>They don't need to bug each individual radio.
Pretty much.
Also, consider this:
They're shipping stuff to the US with this. The CIA, GCHQ, MI6, and NSA often buy electronics to check for vulnerabilities so that they can exploit it. These groups are the most well funded intelligence groups IN THE FUCKING WORLD. Why would you show your hand by selling this stuff to the common market. The point would be to strategically implement a vulnerability in a product with a more threatening force, say if you were the Chinese, you would use your communist magic to get a manufacturing contract using slave/prison labor to make the diodes for the ICs used in the military crypto RNGs. You know that since they use different specifications than the civilian designs, you can design the diode to have some leakage which would cause the RNG to have a distribution that is not entirely random (something like RC4). I mean what I said was mostly technobabble, but that should get the point across to you.
Also, all of this is sort of FUCKING POINTLESS if you're competent and use proper COMSEC by using code words and never speaking about sensitive stuff casually over the air.
Christ, you people...
>Plus, if it comes down to that, I doubt the people fighting will be using Baofengs of all things. We'd be looting stores for better, hopefully weather proofed radios. Things like Uniden, Icom, Kenwood, Yaesu. I'm sure they'll be used to some capacity, but there's a reason people will be gravitating to the higher quality stuff.
This. Kenwoods and Yaesu everywhere.
>Baofengs are great for what they are.
For ignoring the FCC requirements for not transmitting on cop frequencies, yeah. And yeah, they're cheap.
|