• MangoCats@feddit.it
    link
    fedilink
    English
    arrow-up
    1
    ·
    22 hours ago

    difference is intent.

    And intent is functionally impossible to prove, but endlessly arguable and a judge can make a finding based on their judgement - something very different from proof.

    send a PGP signed message over ham radio; if I understand correctly that’s basically a checksum that can guarantee the sender’s possession of a private key.

    Correct.

    • Captain Aggravated@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      22 hours ago

      Oh the legal system is pretty good at deciding intent, I mean what’s the difference between manslaughter and murder?

      Thing is, it’s not like there’s radio police that are going to pull you over for encrypting. Other hams might turn you in if you’re being annoying. If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.

      There’s only ~3.7MHz worth of bandwith on the HF bands, another 4MHz on 6m. There’s a lot of attention on the bands that propagate. If you want to secretly communicate with people, use Reddit, or the Fediverse.

      You know r/kitty? One of a trillion cat subreddits that had a gimmick that the only written word allowed was “kitty.” All post titles and comments had to consist only of “Kitty.” Arrange with the leaders of the other terrorist cells you’re working for that if u/chudmuffin posts a picture of an orange cat, we attack at dawn, and if he posts a picture of a grey cat, lay low they’re onto us.

      Encryption is legal and standard on the internet, where there’s many orders of magnitude more traffic than on the ham bands. I can’t send an encrypted email over Hamlink with a license, but I can host a Tor site without one.

      • MangoCats@feddit.it
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 hours ago

        Oh the legal system is pretty good at deciding intent

        I wouldn’t say it’s good at determining actual intent, just good at deciding what intent is going to be assigned by the system.

        If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.

        I’ve always wondered how much steganography is in practice - if it’s being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn’t know your scheme could ever find it. To the local hams, it’s three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that’s three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that’s 250kBytes of bandwidth per image.

        If you want to secretly communicate with people, use Reddit, or the Fediverse.

        Absolutely, though the “listeners” there are more readily identified, even via Tor.

        • Captain Aggravated@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          Well on some popular image board like one of the hundreds of cat subs on Reddit, how do you identify a “listener” who is looking for a particular user to upload a picture of an orange cat? Thousands of people will view that post perfectly innocently.