Skip to content

Senate GOP budget bill has little-noticed provision that could hurt your Wi-Fi

Technology
72 43 2
  • This post did not contain any content.

    How would that work for the people already using 6 GHz routers?

  • Meshenger app and mesh networks would still work, back to the BBS times we go

    Who'd have thought WWIV was so prescient as to when it would become re-relevant.

    Time to dust off my SysOp skillset lol

  • For what it's worth, I think Cruz's proposal (all of it) was defeated 99-1.

    Yes, Rafael suffered a 99-1 loss. Guessing he's the 1, so a total loss.

  • You don't need one if there's an emergency, civil unrest would probably qualify as an emergency so non-licensed people can legally transmit.

    The FCC hasn't really punished anyone for not having a license other than those that are really bothersome/disruptive or are doing jamming. But like, if there's civil unrest, the laws probably don't matter anymore so you can just ignore the law.

    But if you don't have a license, you don't have a callsign, and thus others will refuse to talk to you during non-emergency peacetime.

    The FCC hasn’t really punished anyone for not having a license other than those that are really bothersome/disruptive or are doing jamming. But like, if there’s civil unrest, the laws probably don’t matter anymore so you can just ignore the law.

    Thanks for reminding me of this movie. 😄
    https://en.wikipedia.org/wiki/Pump_Up_the_Volume_(film)

  • Yes, Rafael suffered a 99-1 loss. Guessing he's the 1, so a total loss.

    What a way to advertise your impotence.

  • Oh the legal system is pretty good at deciding intent

    I wouldn't say it's good at determining actual intent, just good at deciding what intent is going to be assigned by the system.

    If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.

    I've always wondered how much steganography is in practice - if it's being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn't know your scheme could ever find it. To the local hams, it's three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that's three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that's 250kBytes of bandwidth per image.

    If you want to secretly communicate with people, use Reddit, or the Fediverse.

    Absolutely, though the "listeners" there are more readily identified, even via Tor.

    Well on some popular image board like one of the hundreds of cat subs on Reddit, how do you identify a "listener" who is looking for a particular user to upload a picture of an orange cat? Thousands of people will view that post perfectly innocently.

  • Well on some popular image board like one of the hundreds of cat subs on Reddit, how do you identify a "listener" who is looking for a particular user to upload a picture of an orange cat? Thousands of people will view that post perfectly innocently.

    The point is: IP addresses that download the content are traceable (and spoofable, but that leaves trails too...) Yeah, you might be one of thousands, but every day you log in you increase your odds of being spotted.

    Listening to longwave radio? Yeah, basically anybody anywhere on the planet with a receiver. Even local broadcasts it is nigh impossible to know who is listening where within the broadcast radius and the average person walks around with several radio receivers on them all the time now.

  • The point is: IP addresses that download the content are traceable (and spoofable, but that leaves trails too...) Yeah, you might be one of thousands, but every day you log in you increase your odds of being spotted.

    Listening to longwave radio? Yeah, basically anybody anywhere on the planet with a receiver. Even local broadcasts it is nigh impossible to know who is listening where within the broadcast radius and the average person walks around with several radio receivers on them all the time now.

    So...let's actually set up a pretend scenario here. Pretend. We are pretend red teaming here; any resemblance to actual terrorist plots living or dead is purely coincidental.

    Let's pretend our terrorist cell is going to spit up, travel to 10 places around the United States, and we're going to do a coordinated strike on 10 government buildings. Probably the smartest thing to do is just...do it at a planned time and not communicate after we split up. But for some convoluted Ocean's Umpteen reason we need to communicate and coordinate. I see 3 possible scenarios here:

    1. Leader just needs to say GO to the rest of the team, expecting no reply. So one, very brief, one-way communique.
    2. Leader needs to send several detailed instructions over a long period of time, expecting no reply. Repeated, large, one-way communiques.
    3. The team is going to gather some intelligence and report back, and based on all their observations the leader will say go. Full on two-way communication.

    In all three cases, the internet is the better tool for this.

    You are correct in that it is difficult or impossible to remotely detect radio receivers, no matter what the BBC tells you. There's no machinery making a log of who accesses what over analog radio. But the realities of radio equipment and propagation are going to eat into that advantage somewhat.

    If we're talking truly coast-to-coast, you're going to need HF. MF/longwave won't reach far enough, you need skywave propagation, and you get that on HF...mostly at night mostly during favorable sunspot activity.

    I bet you're imagining most of the team using one of those handheld commodity shortwave receivers that does AM/FM and shortwave, about the size of a pencil case with one of those telescoping whip antennas. That might do for 1 and 2, people hear hams on those sometimes.

    The bosses transmitter would need to be a reasonably serious bit of kit. At the very least something like an Icom 706 mobile HF rig plus power supply and at least a two element yagi for 20 or 40m. This is an antenna that's 30 to 60 feet wide. Hams do routinely make do with less, but when you're talking to someone with those crappy little antennas, probably inside a building, I'd want to focus my beam at least a bit. A wire in a tree ain't gonna do.

    Oh, and, let's say Boss is in Washington DC. It's possible he can make himself heard in Los Angeles but not Wichita, because the "optics" of the ionosphere doesn't bounce his signal down to the ground in the middle of the continent.

    One communique of "Baker this is Oven: Preheat complete, insert the bread. Repeat: Insert the bread." might not be noticed. Or some ham somewhere will hear it and go "What the hell, who's horsing around?" If you don't transmit again, you're probably not going to be direction found. But that big radio tower you've got is a weird thing to have.

    If you need to make routine transmissions, well now you're going to have to try some steganography crap. They did recently relax the baud restrictions on HF, but you're still talking about 2.8kHz of analog bandwidth that MIGHT get through. It's gonna look really weird if you're repeatedly sending digital pictures to...no one in particular on a regular basis. Now, to blend in, you'll need some genuine callsigns, because the FCC amateur radio license database is a matter of public record. You use a bogus callsign and you'll be found out. If you're transmitting a lot, people will find you, possibly out of curiosity.

    Especially if you're talking about everyone in the terrorist cell communicating, well now EVERYONE has to have an amateur radio license from the government, and fairly large, fairly conspicuous radio hardware. There have been spies caught with shortwave radio equipment, and said equipment was used as evidence against them. Entering the US with a smart phone and laptop is utterly normal, entering the US with a shortwave radio is weird.

    OR

    Get accounts on Reddit, and post cat memes. Compared to sitting around listening to static on an HF set, that looks way more normal these days. Yes, there probably is a log of what IP addresses sent and received what, but it's really easy to make two-way secret communications look like perfectly legitimate traffic. The equipment required doesn't draw as much attention. Keep the steganography subtle or a matter of "which picture I post" and not doctor them at all, well now it's 100% indistinguishable from people having casual fun. Some guy posts a picture of an orange cat, it gets 30,000 views 975 likes and 75 comments, and ten IRS buildings explode. Do you think the authorities make the connection to the cat meme in the first place?

  • How would that work for the people already using 6 GHz routers?

    Presumably given they’ve all been released in the past few years and are still getting updates the manufacturers would release an update disabling the functionality to comply with law. Same with end user devices removing the functionality via software update.

    You’d have a small percentage of holdouts who have auto updates off and also refuse to apply it manually and who also have non-updated computers or smartphone. They’d leave it up to whoever buys the spectrum to locate illegal use like this based on detected interference in their usage, report it to the FCC and they send you a nasty letter followed by debilitating fines and a legal order to seize your equipment if that fails.

    In practice people who go out of their way to avoid the updates that disable it will probably see no consequences but decreasing benefits as well and will eventually update or replace devices.

  • So...let's actually set up a pretend scenario here. Pretend. We are pretend red teaming here; any resemblance to actual terrorist plots living or dead is purely coincidental.

    Let's pretend our terrorist cell is going to spit up, travel to 10 places around the United States, and we're going to do a coordinated strike on 10 government buildings. Probably the smartest thing to do is just...do it at a planned time and not communicate after we split up. But for some convoluted Ocean's Umpteen reason we need to communicate and coordinate. I see 3 possible scenarios here:

    1. Leader just needs to say GO to the rest of the team, expecting no reply. So one, very brief, one-way communique.
    2. Leader needs to send several detailed instructions over a long period of time, expecting no reply. Repeated, large, one-way communiques.
    3. The team is going to gather some intelligence and report back, and based on all their observations the leader will say go. Full on two-way communication.

    In all three cases, the internet is the better tool for this.

    You are correct in that it is difficult or impossible to remotely detect radio receivers, no matter what the BBC tells you. There's no machinery making a log of who accesses what over analog radio. But the realities of radio equipment and propagation are going to eat into that advantage somewhat.

    If we're talking truly coast-to-coast, you're going to need HF. MF/longwave won't reach far enough, you need skywave propagation, and you get that on HF...mostly at night mostly during favorable sunspot activity.

    I bet you're imagining most of the team using one of those handheld commodity shortwave receivers that does AM/FM and shortwave, about the size of a pencil case with one of those telescoping whip antennas. That might do for 1 and 2, people hear hams on those sometimes.

    The bosses transmitter would need to be a reasonably serious bit of kit. At the very least something like an Icom 706 mobile HF rig plus power supply and at least a two element yagi for 20 or 40m. This is an antenna that's 30 to 60 feet wide. Hams do routinely make do with less, but when you're talking to someone with those crappy little antennas, probably inside a building, I'd want to focus my beam at least a bit. A wire in a tree ain't gonna do.

    Oh, and, let's say Boss is in Washington DC. It's possible he can make himself heard in Los Angeles but not Wichita, because the "optics" of the ionosphere doesn't bounce his signal down to the ground in the middle of the continent.

    One communique of "Baker this is Oven: Preheat complete, insert the bread. Repeat: Insert the bread." might not be noticed. Or some ham somewhere will hear it and go "What the hell, who's horsing around?" If you don't transmit again, you're probably not going to be direction found. But that big radio tower you've got is a weird thing to have.

    If you need to make routine transmissions, well now you're going to have to try some steganography crap. They did recently relax the baud restrictions on HF, but you're still talking about 2.8kHz of analog bandwidth that MIGHT get through. It's gonna look really weird if you're repeatedly sending digital pictures to...no one in particular on a regular basis. Now, to blend in, you'll need some genuine callsigns, because the FCC amateur radio license database is a matter of public record. You use a bogus callsign and you'll be found out. If you're transmitting a lot, people will find you, possibly out of curiosity.

    Especially if you're talking about everyone in the terrorist cell communicating, well now EVERYONE has to have an amateur radio license from the government, and fairly large, fairly conspicuous radio hardware. There have been spies caught with shortwave radio equipment, and said equipment was used as evidence against them. Entering the US with a smart phone and laptop is utterly normal, entering the US with a shortwave radio is weird.

    OR

    Get accounts on Reddit, and post cat memes. Compared to sitting around listening to static on an HF set, that looks way more normal these days. Yes, there probably is a log of what IP addresses sent and received what, but it's really easy to make two-way secret communications look like perfectly legitimate traffic. The equipment required doesn't draw as much attention. Keep the steganography subtle or a matter of "which picture I post" and not doctor them at all, well now it's 100% indistinguishable from people having casual fun. Some guy posts a picture of an orange cat, it gets 30,000 views 975 likes and 75 comments, and ten IRS buildings explode. Do you think the authorities make the connection to the cat meme in the first place?

    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything.

    HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.

  • New Orleans debates real-time facial recognition legislation

    Technology technology
    12
    1
    150 Stimmen
    12 Beiträge
    27 Aufrufe
    A
    [image: 62e40d75-1358-46a4-a7a5-1f08c6afe4dc.jpeg] Palantir had a contract with New Orleans starting around ~2012 to create their predictive policing tech that scans surveillance cameras for very vague details and still misidentifies people. It's very similar to Lavender, the tech they use to identify members of Hamas and attack with drones. This results in misidentified targets ~10% of the time, according to the IDF (likely it's a much higher misidentification rate than 10%). Palantir picked Louisiana over somewhere like San Francisco bc they knew it would be a lot easier to violate rights and privacy here and get away with it. Whatever they decide in New Orleans on Thursday during this Council meeting that nobody cares about, will likely be the first of its kind on the books legal basis to track civilians in the U.S. and allow the federal government to take control over that ability whenever they want. This could also set a precedent for use in other states. Guess who's running the entire country right now, and just gave high ranking army contracts to Palantir employees for "no reason" while they are also receiving a multimillion dollar federal contract to create an insane database on every American and giant data centers are being built all across the country.
  • Seven Goldfish

    Technology technology
    1
    5 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • 149 Stimmen
    33 Beiträge
    29 Aufrufe
    B
    That’s not the right analogy here. The better analogy would be something like: Your scary mafia-related neighbor shows up with a document saying your house belongs to his land. You said no way, you have connections with someone important that assured you your house is yours only and they’ll help you with another mafia if they want to invade your house. The whole neighborhood gets scared of an upcoming bloodbath that might drag everyone into it. But now your son says he actually agrees that your house belongs to your neighbor, and he’s likely waiting until you’re old enough to possibly give it up to him.
  • 377 Stimmen
    58 Beiträge
    22 Aufrufe
    avidamoeba@lemmy.caA
    Does anyone know if there's additional sandboxing of local ports happening for apps running in Private Space? E: Checked myself. Can access servers in Private Space from non-Private Space browsers and vice versa. So Facebook installed in Private Space is no bueno. Even if the time to transfer data is limited since Private Space is running for short periods of time, it's likely enough to pass a token while browsing some sites.
  • 24 Stimmen
    4 Beiträge
    10 Aufrufe
    S
    Said it the day Broadcom bought them, they're going to squeeze the smaller customers out. This behavior is by design.
  • 104 Stimmen
    168 Beiträge
    62 Aufrufe
    smartmanapps@programming.devS
    At least that’s not how I’ve been taught in school If you had a bad teacher that doesn't mean everyone else had a bad teacher. You’re not teaching kids how to prove the quadratic formula, do you? We teach them how to do proofs, including several specific ones. No, you teach them how to use it instead. We teach them how to use everything, and how to do proofs as well. Your whole argument is just one big strawman. Again, with the order of operations Happens to be the topic of the post. It’s not a thing Yes it is! I’ve given you two examples that don’t follow any So you could not do the brackets first and still get the right answer? Nope! 2×2×(2-2)/2=0 2×2×2-2/2=7 That’s kinda random, but sure? Not random at all, given you were talking about students understanding how Maths works. 2+3×4 then it’s not an order of operation that plays the role here Yes it is! If I have 1 2-litre bottle of milk, and 4 3-litre bottles of milk, there's only 1 correct answer for how many litres of milk of have, and it ain't 20! Even elementary school kids know how to work it out just by counting up. They all derive from each other No they don't. The proof of order of operations has got nothing to do with any of the properties you mentioned. For example, commutation is used to prove identity And neither is used to prove the order of operations. 2 operators, no order followed Again with a cherry-picked example that only includes operators of the same precedence. You have no property that would allow for (2+3)×4 to be equal 2+3×4 And yet we have a proof of why 14 is the only correct answer to 2+3x4, why you have to do the multiplication first. Is that not correct? Of course it is. So what? It literally has subtraction and distribution No it didn't. It had Brackets (with subtraction inside) and Multiplication and Division. I thought you taught math, no? Yep, and I just pointed out that what you just said is wrong. 2-2(1+2) has Subtraction and Distribution. 2-2 is 2 being, hear me out, subtracted from 2 Which was done first because you had it inside Brackets, therefore not done in the Subtraction step in order of operations, but the Brackets step. Also, can you explain how is that cherry-picking? You already know - you know which operations to pick to make it look like there's no such thing as order of operations. If I tell you to look up at the sky at midnight and say "look - there's no such thing as the sun", that doesn't mean there's no such thing as the sun.
  • Nextcloud cries foul over Google Play Store app rejection

    Technology technology
    31
    1
    256 Stimmen
    31 Beiträge
    21 Aufrufe
    S
    I have the regular F-droid and it does automatic updates now.
  • Short summary of feature phone market in 2025

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet