Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Technical Analysis of Starlink Terminal GPS Spoofing/Jamming Detection in Iran (github.com/narimangharib)
31 points by bazzmt 3 months ago | hide | past | favorite | 2 comments


This looks like it was the output of running a Starlink app log through an LLM. The data is interesting but I don't think it supports the conclusions.

I'm also interested in whatever LLM was used not being able to use Google to determine that CADY is the Starlink internal clock module, and that on the latest board revisions it isn't present and I think the `false` state is expected and maybe a red herring.


A thread on beating EW against Starlink. https://x.com/TrentTelenko/status/2011251398055489972

Couple of tips: burying Starlink in a hole a meter below ground level blocks ground-based jammers.

Mesh nets around the antenna to block signals, effectively a high-pass filter.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: