The whole thing reads like this is weak encryption that doesn't actually work and that is what they wanted people to have for that false sense of security. That's wild
Fun fact: They made encryption on Ham/GMRS radios illegal because they didn't want the average citizenry to have access to secure off-grid comms without government spyware on networks that they control.
Reject Smarphones, Return to Amateur Radios. Just modify some radios, add a raspberry pi to do enccyption on the voice before it gets transmitted.
THEY CANT ARREST US ALL! (seriously tho, I haven't heard of the FCC actually doing anything, unless you were jamming the airport radios or something crazy)
The primary reason is the FCC can't tell if the encrypted transmissions are commercial or otherwise illegal. The amateur bands would be full of high frequency trading brokerages, drug traffickers, and spies.
I think FCC still takes it pretty seriously.
just use Meshtastic/LoRa. you can use encryption and you don't need a Ham license. your output power is limited but I've heard of people getting 50+ miles of range for reception.
specifically, for ham you're not allowed to obscure the meaning of your transmissions. this means no:
- symmetric cryptography
- numbers stations (one-time pad ciphers)
- communicating in codewords ("the Falcon has left the nest, over!"
but you can use:
- compression
- commercial telegraph codes (e.g. 22415 = "Partly cloudy with a chance of showers"), as long as you're using a public codebook
- message authentication codes (to prevent forging messages)
- (arguably) asymmetric cryptography for signatures, identity challenge/response
- encrypted control messages for hobbyist satellites (special exemption)
so authentication is possible, just not privacy.
It's illegal on licensed HAM channels, but legal on unlicensed channels like the 2.4 and 5Ghz ranges
Don't ask me why the distinction still remains
international treaties, for one. second because lack of encryption discourages commercial/non-hobbyist use. third because the spirit of Ham is for Hams to all listen and transmit to each other.
...they definitely can arrest a bunch of people. A better way would be to challenge it in court.
Or you could use other protocols like LoRaWAN
Encryption using IP over HAM is still illegal - you can't access Lemmy because it's an HTTPS site, because we live in the 21st century.
Nothing stops anyone from running a webserver without ssl, there might be an instance that does it
I know, the point is that you're broadcasting over the radio that you're encrypting the data over the one medium were it's illegal to encrypt the data because the FCC thinks it's still 1989 or whatever when it comes to amateur radio. So it's not just that you're doing something illegal, you're using a registered call sign and a really loud, easily triangulatable signal to do it. It's like putting a movie poster-sized sign on your fence that says "Rattlesnake venom for sale, inquire within." It's not a sustainable practice.
Ultimately, the amateur radio crowd needs to get this law 47 CFR 97.113 changed to allow an exception for encrypted internet over radio and allow for modern communications standards. Personally, I expect that it would only take one House Rep willing to score any sort of win with rural voters for this to work right now.
I wouldn’t want to browse the web without ssl in 2025
Your only choice isn't HAM
You're referring to the Crypto Wars
https://en.wikipedia.org/wiki/Crypto_Wars
Darknet diaries has a great episode on it. Highly recommend.
Thank you. I've watched a bunch of Darkness diaries (Usually ones that people on external sites say "this one is really good, you should watch it"), but I've found it hard to get into (the perils of a podcast's large backlog being compared to a highlight reel). I haven't watched this episode though, so I look forward to checking it out
It was my first one. Highly recommend ^-^
Yes, that was indeed a very interesting story:
Zimmermann challenged these regulations in an imaginative way. In 1995, he published the entire source code of PGP in a hardback book, via MIT Press, which was distributed and sold widely. Anyone wishing to build their own copy of PGP could cut off the covers, separate the pages, and scan them using an OCR program (or conceivably enter it as a type-in program if OCR software was not available), creating a set of source code text files. One could then build the application using the freely available GNU Compiler Collection. PGP would thus be available anywhere in the world. The claimed principle was simple: export of munitions—guns, bombs, planes, and software—was (and remains) restricted; but the export of books is protected by the First Amendment. The question was never tested in court with respect to PGP. In cases addressing other encryption software, however, two federal appeals courts have established the rule that cryptographic software source code is speech protected by the First Amendment (the Ninth Circuit Court of Appeals in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case)...
(Source)
Yep, we called them crypto wars
Yep I remember the scary text the came with certain software threatening superjail if you sent the exe overseas
As some from outside of the US, I also remember you had to pinky promise you are in the US to download the good version of Mozilla.
Jail Pro.
I had one of those t-shirts in the early 00s. Got it at a Goodwill and hung it on my wall for a while
I got one in the late 1990s. I wore it on a few trips from the US to Europe and was happily never jailed.
An annoyance that came shortly after was that they were not allowed to ship the Java Runtime Environment / Development Kit with a javax.crypto library that allowed for algorithms stronger than DES (such as AES, Twofish, Blowfish, ...), or long passwords, iirc.
There was some way to download something extra (Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files) and fiddle it in, but with regulation in the US, I think.
I was quite sad when I made one of my early programs based on that and it turned out to be useless to US citizens, and hard to use for everyone else. I think I made a bouncycastle-based version later, but it was basically a full rewrite.
Edit: I'm starting to remember more absurdities of the time: Even with the JCE, the best algorithm for symmetric encryption was 3DES, which was not a legal requirement, just laziness of Sun Microsystems. While it was somewhat safe, it was less than ideal and really slow.
Fun fact, Google pay and other "modern" payment processors still had to use 3DES until 2020 at least (might still do, I got out of the industry).
I made a bouncycastle-based version later
I enjoy how nonsensical this must sound to people unfamiliar with Java. 🙃
lol right, must sound like Treknobabble but for the 2000s. Heck, for kids these days, it's probably as gibberish as original Treknobabble.
I bet distant future archaeologist, be they human or alien, will assemble the bits and pieces like this: Child worker programmers would work in these inflatable tiny castles on the soft floor with their laptops. That was the last attempt to revive feudalism. Why it didn't catch on to other office jobs remains lost in the past.
Alr how do I get this shirt?
Today I Learned
What did you learn today? Share it with us!
We learn something new every day. This is a community dedicated to informing each other and helping to spread knowledge.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules (interactive)
Rule 1- All posts must begin with TIL. Linking to a source of info is optional, but highly recommended as it helps to spark discussion.
** Posts must be about an actual fact that you have learned, but it doesn't matter if you learned it today. See Rule 6 for all exceptions.**
Rule 2- Your post subject cannot be illegal or NSFW material.
Your post subject cannot be illegal or NSFW material. You will be warned first, banned second.
Rule 3- Do not seek mental, medical and professional help here.
Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.
Rule 4- No self promotion or upvote-farming of any kind.
That's it.
Rule 5- No baiting or sealioning or promoting an agenda.
Posts and comments which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.
Rule 6- Regarding non-TIL posts.
Provided it is about the community itself, you may post non-TIL posts using the [META] tag on your post title.
Rule 7- You can't harass or disturb other members.
If you vocally harass or discriminate against any individual member, you will be removed.
Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.
For further explanation, clarification and feedback about this rule, you may follow this link.
Rule 8- All comments should try to stay relevant to their parent content.
Rule 9- Reposts from other platforms are not allowed.
Let everyone have their own content.
Rule 10- Majority of bots aren't allowed to participate here.
Unless included in our Whitelist for Bots, your bot will not be allowed to participate in this community. To have your bot whitelisted, please contact the moderators for a short review.
Partnered Communities
You can view our partnered communities list by following this link. To partner with our community and be included, you are free to message the moderators or comment on a pinned post.
Community Moderation
For inquiry on becoming a moderator of this community, you may comment on the pinned post of the time, or simply shoot a message to the current moderators.