142
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 24 Jul 2023
142 points (98.0% liked)
Technology
59298 readers
1825 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
Good thing P25 is safe.
P25 only uses 56 bit encryption, there are better systems if you want to ensure that only the intended recipient will be able to receive your transmission. P25 is great for when you want to make sure that all your intended recipients can receive and intended senders can send, while minimizing undesired senders being received.
I probably could have done better with the wording on the link to a video contradicting what I'd said. It's not meant to be taken seriously but that only really becomes obvious when you click through to find a video on how to make use of its flaws to disrupt traffic and listen in. Not everybody is going to do that though.
For now. Thanks love defcon videos!
A lot of the material in those videos is way over my head but it's interesting to see what people are out there working on. Good for when I'm frustrated with my own projects and want to think about something else for a while. They show some interesting ways to mess with common P25 radios and while I don't recall whether they went after a flaw in the protocol or the manufacturer's implementation, part of it is also taking advantage of flaws built into the human operator which is always cool.
Yeah defcon has some interesting exploits. I remember seeing one about recording keystrokes with audio and working out the sound of each key press to extract a Password.