SDR Shenanigans
by Barbara_Kwarc - Thursday February 15, 2024 at 06:17 PM
#1
Hi All, 

With Tetra source code being made public last year and the cypher for TAA1, TEA 1, 2 and 3 also being made public. Also the known vulnerabilities in GSM/4G/5G with A5/2. Will you be able to create a communications network that is invisible to 0days for example? I know Mesh networks are available, but they're not secure. If the government have nothing to hide but need to use unbreakable unbackdoorable equipment. Why can't we do the same? Dziekuje I pozdrawiam =)
Reply
#2
(Feb 15, 2024, 06:17 PM)Barbara_Kwarc Wrote: Hi All, 

With Tetra source code being made public last year and the cypher for TAA1, TEA 1, 2 and 3 also being made public. Also the known vulnerabilities in GSM/4G/5G with A5/2. Will you be able to create a communications network that is invisible to 0days for example? I know Mesh networks are available, but they're not secure. If the government have nothing to hide but need to use unbreakable unbackdoorable equipment. Why can't we do the same? Dziekuje I pozdrawiam =)

i doubt a lot of gov will be spending the money to roll out updates to patch the vulnerability, and just trust the obscurity of people who are capable, AND want to crack trunked systems. ive been looking into mesh stuff, i was reading that there are some wayts to implement your own keys for PKI or even using PGP which boils down the next vulnerabilities being DOS attacks on your systems, and any physical vilnerabilities if someone finds your nodes
Reply
#3
(Feb 15, 2024, 09:32 PM)fuzzzy Wrote:
(Feb 15, 2024, 06:17 PM)Barbara_Kwarc Wrote: Hi All, 

With Tetra source code being made public last year and the cypher for TAA1, TEA 1, 2 and 3 also being made public. Also the known vulnerabilities in GSM/4G/5G with A5/2. Will you be able to create a communications network that is invisible to 0days for example? I know Mesh networks are available, but they're not secure. If the government have nothing to hide but need to use unbreakable unbackdoorable equipment. Why can't we do the same? Dziekuje I pozdrawiam =)

i doubt a lot of gov will be spending the money to roll out updates to patch the vulnerability, and just trust the obscurity of people who are capable, AND want to crack trunked systems. ive been looking into mesh stuff, i was reading that there are some wayts to implement your own keys for PKI or even using PGP which boils down the next vulnerabilities being DOS attacks on your systems, and any physical vilnerabilities if someone finds your nodes

I'd love to get my hands on a Motorola MTM5400. But I think to listen to tetra you still need the TEA firmware? Maybe I can find it on the darknet somewhere.

Yeah those Mesh things are cool as shit. They have a range of 30km or so. I think they're trackable too like phones, so a bit funked unless someone can maybe figure out a way to put a hackrf one into the loop and maybe GPS spoof them?
Reply
#4
(Feb 16, 2024, 07:28 AM)Barbara_Kwarc Wrote:
(Feb 15, 2024, 09:32 PM)fuzzzy Wrote:
(Feb 15, 2024, 06:17 PM)Barbara_Kwarc Wrote: Hi All, 

With Tetra source code being made public last year and the cypher for TAA1, TEA 1, 2 and 3 also being made public. Also the known vulnerabilities in GSM/4G/5G with A5/2. Will you be able to create a communications network that is invisible to 0days for example? I know Mesh networks are available, but they're not secure. If the government have nothing to hide but need to use unbreakable unbackdoorable equipment. Why can't we do the same? Dziekuje I pozdrawiam =)

i doubt a lot of gov will be spending the money to roll out updates to patch the vulnerability, and just trust the obscurity of people who are capable, AND want to crack trunked systems. ive been looking into mesh stuff, i was reading that there are some wayts to implement your own keys for PKI or even using PGP which boils down the next vulnerabilities being DOS attacks on your systems, and any physical vilnerabilities if someone finds your nodes

I'd love to get my hands on a Motorola MTM5400. But I think to listen to tetra you still need the TEA firmware? Maybe I can find it on the darknet somewhere.

Yeah those Mesh things are cool as shit. They have a range of 30km or so. I think they're trackable too like phones, so a bit funked unless someone can maybe figure out a way to put a hackrf one into the loop and maybe GPS spoof them?

since theyre low power they should only be trackable when transmitting and it would have to be high volume of transmissions in order to have enough time to DF it. ive heard good and bad things about the signal strength, a lof of it seems to come down to the antennae and terrain. although im sure the feds probably have some special ways to triangulate even low power signals. i think they do make some of them that have gps chips on the esp32. i have mine sitting in bags disassembled and need to find the time to put them together and put my SDR against them to see whats what.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Cats or Dogs? 888 193 21,342 Yesterday, 02:45 PM
Last Post: omgijkl
  research on Brute forcing android grid pattern userc8r8 0 210 May 04, 2026, 08:04 PM
Last Post: userc8r8
  RaT safiy 0 133 May 04, 2026, 04:21 PM
Last Post: safiy
  I Need some members for discord channel 77shafina8 2 224 May 03, 2026, 07:35 PM
Last Post: azwug
  where vuln xxxhanter 0 187 May 03, 2026, 05:17 PM
Last Post: xxxhanter

Forum Jump:


 Users browsing this forum: 1 Guest(s)