Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:It's dead either way, why not try this? (Score 0) 371

But that's a bizarre argument. Many uses other than encryption might also do this (lets say, hypothetically, that it was indeed a Public Radio Entropy Source)

So, we're going to take an empty channel, filled with random noise, and replace it with a transmission filled with random noise! Which will be less random than what we started with.

I'm not impressed yet :-)

Go on believing that steganography can't be detected. I'd rather be able to watch you, if necessary, than not.

Comment Re:It's dead either way, why not try this? (Score 1) 371

To say that you're not using real sources would be an understatement. The middle one is someone's entertaining list of things that they think will go extinct, offered more as comedy than anything else. The first is a 7-year-old interview with someone in Quatar, which just got Ham Radio around then, who offers no sources to substantiate his statement. And you seem to be assuming that the retirees cited by ARRL will all die and not be replaced, and the emergency groups will find something else to do, which makes no sense. But you are also relying on ARRL which has not presented any substantive survey on this issue.

QRZ, unlike ARRL, operates an online callbook, and thus can actually count the number of hams in many nations. Their survey is here. You need something with at least that much data to be taken seriously.

Comment Re:It's dead either way, why not try this? (Score 1) 371

So, you're proposing that since we might not be able to detect steganography, that we allow all possible use of encryption. However, the first example would have to be well enough hidden that it would not make significant use of a scarce resource, and thus that resource would not be denied to others. The second example would potentially lock lots of people out of many frequencies that would be in exclusive use for private communications.

Also, don't assume that we can not detect steganography and intruders in general. There is a very active community that does just that.

Comment Re:FCC is not considering anything. (Score 1) 371

he petitioner is not asking for encryption to be allowed for all traffic on all ham bands, as you have suggested at your site

With good governance, it would go that way. With bad governance, any abuser will be able to claim that they were performing a test or drill of emergency communications, and we will have no way to prove otherwise.

Since the petitioner was completely unaware of HSMM-MESH until yesterday, he didn't consider all of the possible abuses, and did not propose any governance means to deal with them.

Comment Re:It's dead either way, why not try this? (Score 1) 371

Your first example would not have violated any rules, although the other operator might have died of boredom and, if deliberate, that would be murder :-) . Your second example would have if it were an encrypted message rather than just rubbing your fingers over the top row of the keyboard.

Unfortunately I think you would have to learn a bit more about the issue before you are able to mount a cogent objection.



Comment Re:It's dead either way, why not try this? (Score 1) 371

The sad part about it is this - the Technician class license material is not at all difficult to learn.

I passed the Technician, General, and Advanced in one session, with an evening's study. There was more arbitrary material (frequencies and the old names for satellite modes) in Extra so I had to come back for that. And it took 90 days to get to where I could do 13 WPM reliably and pass the 20 WPM test by only writing down material after "is", but nobody has to do that any more.

Comment Re:packet radio? (Score 1) 371

We had a 5.29 repeater in the SF Bay area that took years to pull, but got pulled. It turned out the control operator had moved away! He said he'd left the repeater in someone else's care, but if that person existed they did not police the repeater.

If you care about this, start writing letters to FCC. They really do enforcement if pushed, the letter file is here.

Submission + - Want NSA Attention? Use Encrypted Communications (informationweek.com) 1

CowboyRobot writes: Bad news for fans of anonymizing Tor networks, PGP and other encryption services: If you're attempting to avoid the National Security Agency's digital dragnet, you may be making yourself a target, as well as legally allowing the agency to retain your communications indefinitely — and even use them to test the latest code-breaking tools. Those revelations come via leaked documents that detail the operating guidelines for secret NSA surveillance programs authorized by Congress in 2008. Those documents include a one-page memorandum from a U.S. Foreign Intelligence Surveillance Court (FISA) judge, saying that the guidelines don't violate Fourth Amendment protections against unreasonable searches.

Slashdot Top Deals

At these prices, I lose money -- but I make it up in volume. -- Peter G. Alaquon