ftg, to random
@ftg@mastodon.radio avatar

At least, the rack is accessible and more in order.

To be done:

  • Power
  • Antennas
  • Internet for linking the 70cm analog repeater.

The Sepura in the box is an SRG3900 radio programmed to our 70cm TMO base station, which is connected to the network.
The idea is to offer better indoor coverage with the TMO-DMO gateway.

The Nokia RD58 based analog 70cm repeater is planed to return to service as an experimental internet linked club repeater on R.Net2.

0xor0ne, to infosec
jbzfn, to opensource
@jbzfn@mastodon.social avatar

📡 European Telecom Body to Open-Source Radio Encryption System
➥ inforisktoday.com

「 The proprietary algorithm has been kept a secret since 1990 and distributed under a nondisclosure agreement in defiance of a widely accepted cryptographic principle holding that obscurity is detrimental to security 」

https://www.inforisktoday.com/european-telecom-body-to-open-source-radio-encryption-system-a-23599

philpem, to random
@philpem@digipres.club avatar

Great to hear that ETSI are opening up the encryption algorithms in response to . Can we have the DMR ones next, please? :D

marcel, (edited ) to random
@marcel@waldvogel.family avatar

So, our communications equipment for critical infrastructure and emergency operations is so insecure, a laptop can often crack the key in about a minute. But that weak algorithm is still kept secret. However, that might soon change, such that its users are aware of that intentional weakness. Hopefully, they can demand an upgrade from their vendors…
previous behavior is so 1990s 😵‍💫.
h/t @nohillside
Edit: secure->secret 🤦
https://www.zetter-zeroday.com/p/standards-body-considers-uncloaking

certbund, to random German
@certbund@social.bund.de avatar


In dem Standard für abhörsichere Funkübertragung wurden Schwachstellen gefunden. Sie ermöglichen es die Kommunikation zu entschlüsseln und Nutzer zu deanonymisieren. Der Einsatz einer Ende-zu-Ende Verschlüsselung bietet Schutz.
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2023/2023-257705-1032

afterdawn, to random Finnish
@afterdawn@mementomori.social avatar

Poliisin ja Puolustusvoimien käyttämästä Virve-verkosta on paljastunut viisi haavoittuvuutta, joista osa on mahdollistanut kaiken viestiliikenteen salakuuntelun - yli 20 vuoden ajan.

Virve pohjautuu TETRA-verkkoon ja samaa verkkoa käyttävät viranomaiset yli 100 eri maassa ympäri maailmaa. TETRA on yksityinen yritys, jonka salausalgoritmit ovat olleet salaisia - eli yhtiö ei ole luovuttanut niitä edes tutkijoiden käyttöön testausta varten. Kyseistä metodia kutsutaan "security through obscurity" -metodiksi ja .. noh.. se ei toimi.

https://dawn.fi/uutiset/2023/07/28/tetra-virve-haavoittuvuus

informapirata, to informatica
@informapirata@mastodon.uno avatar

Il TETRApacco: la falla segreta e voluta delle radio di polizia e militari

@informatica

La vicenda della crittografia fallata di ben spiegata da @ildisinformatico

"Conviene ricordarsi tutto questo la prossima volta che qualcuno ci propone un prodotto di sicurezza, anche al di fuori del campo informatico, e ci racconta che non può discutere i dettagli di come funziona perché quei dettagli sono e devono restare segreti, altrimenti addio sicurezza"

https://attivissimo.blogspot.com/2023/07/podcast-rsi-story-la-falla-segreta-e.html

hackaday, to random
@hackaday@hackaday.social avatar

The only thing more concerning about this TETRA (TErrestrial Trunked RAdio) vulnerability is the possibility that it's an intentional back door to allow eavesdropping on encrypted communications.

https://hackaday.com/2023/07/27/did-tetra-have-a-backdoor-hidden-in-encrypted-police-and-military-radios/

MikrotikTrainer,

@hackaday @revk AFAIK all UK usage by emergency services has used TEA2 for a very long time so shouldn’t be a problem for Home Office / Ofcom to be worried about.

itnewsbot, to random
@itnewsbot@schleuss.online avatar

Did TETRA Have a Backdoor Hidden In Encrypted Police And Military Radios? - Encrypted communications are considered vital for many organizations, from militar... - https://hackaday.com/2023/07/27/did-tetra-have-a-backdoor-hidden-in-encrypted-police-and-military-radios/

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Serious Vulnerability in European Trunked Radio System - Trunked radio systems can be difficult to wrap one’s mind around, and that’s parti... - https://hackaday.com/2023/07/26/serious-vulnerability-in-european-trunked-radio-system/

riotnrrd, to random
@riotnrrd@mastodon.social avatar

I am sure I am not the first to point out that a vendor-controlled backdoor is exactly what governments around the world are asking for (whether they realise it or not) in consumer E2E-encrypted messaging services. But when it’s in and the users are the police, it’s a problem? https://www.wired.com/story/tetra-radio-encryption-backdoor/

topsecret_chat, to security

MidnightBlue firm has found two critical of the system, including the existence of a . The can be broken in minutes just using a consumer laptop!

communications of several forces and services seem at serious risk of been .
https://www.theregister.com/2023/07/24/tetra_radio_security_flaws/

topsecret_chat,

Watch the 1-minute videos demonstrating the of 's calls and messages:
https://www.youtube.com/watch?v=oJjTiO6C9xs
https://www.youtube.com/watch?v=-m9UTJLt4uw

irozhlas, to random Czech
@irozhlas@rozhlas.cz avatar

❗️Algoritmus používaný v komerční verzi radiové sítě TETRA spoléhá na slabý šifrovací klíč, který lze snadno prolomit. V 🇨🇿 přitom komunikují skrze systémy hlavně městské organizace jako dopravní podniky a městské policie.

https://www.irozhlas.cz/zpravy-domov/tetra-vysilacky-policie-bezpecnost-tea1_2307260700_cib

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Researchers find deliberate backdoor in police radio encryption algorithm - Enlarge (credit: Evgen_Prozhyrko via Getty)

For more than 25 y... - https://arstechnica.com/?p=1956349

publicvoit, to random German
@publicvoit@graz.social avatar

hat mal wieder zugeschlagen. Diesmal ist offenbar ganz einfach hackbar.

https://de.wikipedia.org/wiki/Terrestrial_Trunked_Radio

Das ist der in : https://de.wikipedia.org/wiki/Digitalfunk_der_Beh%C3%B6rden_und_Organisationen_mit_Sicherheitsaufgaben als auch in : https://de.wikipedia.org/wiki/Funksystem_der_BOS_in_%C3%96sterreich

Background: https://blog.fefe.de/?ts=9a415c0f

Unsere Politiker werden's wohl nie lernen, ordentliche IT-Entscheidungen zu machen. Sogar die Anschaffungsskandale sind noch nicht mal aufgearbeitet.

jomo, to infosec
@jomo@mstdn.io avatar

"Despite being widely used and relying on secret cryptography, had never been subjected to in-depth public security research in its 20+ year history as a result of this secrecy. […] Midnight Blue managed to reverse-engineer and publicly analyze the TAA1 and TEA algorithms for the first time, and as a result discovered the TETRA:BURST vulnerabilities."

https://tetraburst.com/

md, to random German
@md@chaos.social avatar

„Despite being widely used and relying on secret cryptography, TETRA had never been subjected to in-depth public security research in its 20+ year history as a result of this secrecy.“

@bmi & @bsi

https://tetraburst.com

kkarhan,
@kkarhan@mstdn.social avatar

@md @bmi @bsi 's is so that it's trivial to crack with any modern , because it's makes all the versions as weak as on .

But then again noone pays me to fix it, so it's not my problem.

Spoiler: The proper fix is to abolish all shit and demand a fully 'd communications system, since everything else violates and is thus inherently and unfixably insecure by design!

kkarhan,
@kkarhan@mstdn.social avatar

@md @bmi @bsi

Also like any system, devices constantly transmit data, making it trivial to locate and track any radio through passive .

The same way LEAs track peoples' mobile phones.

Likewise this is systemic per design and thus unfixable!

So basically the , , and thanks to the of LEAs are f**ked and the correct fix is in between "impossible" and "painful to implement over more than a year"...

Radio tech used in vital infrastructure worldwide vulnerable to hackers: Dutch research (nltimes.nl)

Three Dutch researchers have discovered vulnerabilities in TETRA - a radio technology used worldwide to control vital infrastructure like energy networks, gas pipelines, and railway safety systems. Malicious hackers could relatively easily use the vulnerabilities to cause massive damage, researchers Job Wetzels, Carlo Meijer,...

skykiss, to ArtificialIntelligence
@skykiss@sfba.social avatar

For decades police/military/intel agencies/critical infrastructure in 120 nations relied on standard to . But researchers examined used in TETRA and found something startling - an intentional backdoor.

  1. This and other problems the researchers found with TETRA would allow malicious actors to decrypt communications and also, in some cases, send malicious commands to critical infrastructure or send fake messages to police/military radios to disrupt their operations

  2. TETRA uses 80-bit keys in its encryption algorithms, but the researchers found that one of these algorithms has a secret reduction feature that reduces the key to 32 bits - which the researchers were able to crack in less than 1 minute using standard laptop and just 4 ciphertexts

https://www.wired.com/story/tetra-radio-encryption-backdoor/

ErikJonker, to security Dutch
@ErikJonker@mastodon.social avatar

Interesting article for those interested in in critical infrastructure.
https://www.wired.com/story/tetra-radio-encryption-backdoor/

ftg, to random
@ftg@mastodon.radio avatar

Got this chonker on the chipping block.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • slotface
  • ngwrru68w68
  • everett
  • mdbf
  • modclub
  • rosin
  • khanakhh
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • Youngstown
  • GTA5RPClips
  • InstantRegret
  • provamag3
  • kavyap
  • ethstaker
  • osvaldo12
  • normalnudes
  • tacticalgear
  • cisconetworking
  • cubers
  • Durango
  • Leos
  • anitta
  • tester
  • megavids
  • lostlight
  • All magazines