[cryptography] The Compromised Internet

Eugen Leitl eugen at leitl.org
Fri Sep 27 15:36:48 EDT 2013

On Fri, Sep 27, 2013 at 01:12:19PM -0400, grarpamp wrote:
> On 9/27/13, Eugen Leitl <eugen at leitl.org> wrote:
> > I don't see how a ham running a repeater backbone can
> > prevent end to end encryption other than sniffing for
> > traffic and actively disrupting it. I'm not sure tampering
> > with transport is within ham ethics, though they definitely
> > don't understand the actual uses for encryption, at
> > least the old hands (are there even new hands?).
> The mentioned tech has nothing to do with traditional 'ham'.

HamNet/AMPRNet is ham-only. http://de.wikipedia.org/wiki/Hamnet

> And without the crypto key they can't see it and can't disrupt

Of course they can see it, it's a TCP/IP network routed
through their hardware, which is stock (Mikrotik/Ubiquiti etc.).

> it, it's background/spectrum noise/power to them.
> Traditionally, presumably hams might discover non-in-the-clear
> on a specific channel, perhaps triangulate, and report it to some
> regulatory body (or DoS it). That's not applicable, by design.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20130927/1706e499/attachment.asc>

More information about the cryptography mailing list