WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.3K

So, Get this. You are telling me... That INTENTIONAL backdoors can be found.. Exploited, then used. Wait, Have we not been saying/warning about that for like 40 fucking years? Right... Right... Fucking morons.

Archive: https://archive.today/ZXJ9w

From the post:

>Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure -- as well as police, intelligence agencies, and military forces around the world -- that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for sensitive communication to deploy an end-to-end encryption solution on top of the flawed algorithm to bolster the security of their communications. But now the same researchers have found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It's not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.

So, Get this. You are telling me... That INTENTIONAL backdoors can be found.. Exploited, then used. Wait, Have we not been saying/warning about that for like 40 fucking years? Right... Right... Fucking morons. Archive: https://archive.today/ZXJ9w From the post: >>Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure -- as well as police, intelligence agencies, and military forces around the world -- that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for sensitive communication to deploy an end-to-end encryption solution on top of the flawed algorithm to bolster the security of their communications. But now the same researchers have found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It's not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.

(post is archived)

[–] 1 pt

What could go wrong?

[–] 1 pt

Well, I for one might be up for building a system to do this so I can have a working scanner again.. A lot of cop-shops are encrypting everything now.

Pair this with LLM's, automated mapping, my aircraft tracker, etc.. Could be a fun project.

[–] 0 pt

I say, go back to analog scrambling, it's probably more secure.