Hacker Newsnew | past | comments | ask | show | jobs | submit | ElectRabbit's commentslogin

Quite a few Ubiquiti APs can be reflashed with OpenWRT.


I really love their Switches, Routers and directional radio link stuff.

But: Mikrotik has problems with end-user Wifi - Their APs are old and weak.


By looking at the security history of Checkpoint.. uhm.. :-)


At least in Germany solar panels are absurdly cheap right now.

You can get a ~440W panel for around 40€. Latest generation and industrial grade.

There are dozens of shops where you can pick them up after ordering.


Yes, that's the cheap bit.


RIP Cariad


Cool stuff!

Also keep a close eye on the Opensource SatDump project. That's a group of (mostly ham, but not all of them) radio enthusiasts that are listening to all kind of science satellites. They managed to decode many of them.

They are far far beyond the old 137MHz analog NOAA stuff. Collecting crazy broadband from S- or X-band is no challenge for them.



I wouldn't say it's mostly HAMs. More that it's a small community of largely European teenagers and 20 somethings. I say that as someone who found their way into the hobby back during covid and now have up and running L, S, and X band setups.


1) Do they post SatDump data somewhere?

2) (I doubt it but) Is it under a free license?


Twitter, Derek's SGC's discord (https://discord.gg/7fFFzNsPEF), and Alan's Matrix server are the three main places to find imagery. That and people's own personal web sites. Here's mine. https://geostation.io/ Please don't criticize my site too much, I've not updated it for ages and historically I used it as a place to dump output from my geostationary satellite stations.


And I guess the other thing to mention is that x band data often adds up real quick, so it's nowhere near as prevalent in full resolution online. I'm basically surrounded by forest and only get sync on Chinese LEO sats at maybe 35°+ north and then lose sync due to the forest at ~30° elevation south. My resulting true color composites are routinely 400-500MB. Someone with clear LoS to either horizon can easily produce composites that are over 1GB per image.


> 1) Do they post SatDump data somewhere?

Don't know.

> 2) (I doubt it but) Is it under a free license?

SatDump is GPLv3


On the HCI interface. That's not a OTA attack.

If an attacker can write raw data the HCI interface you are doomed anyway.


If you have access to the targets computer and their password there is an attack vector where you can feasibly gain access their files.


If and only if the host's serial or HCI driver has some undocumented exploit to gain code execution. (They probably don't)


> Galileo

Which has optional cryptographic signatures of its positioning data. It's not spoofable anymore (but still jam'able with strong transmitters).

Free for use.

(https://www.gsc-europa.eu/sites/default/files/sites/all/file...)

Same for the HAS (High Accuracy Service) which offers precision down to 30cm without additional correction data.

Also free for use. But requires a special receiver as it's using an additional band.

Galileo was the ugly duckling for a very long time - but it turned into a shining one after it aged a bit.


> Galileo was the ugly duckling for a very long time - but it turned into a shining one after it aged a bit.

Yeah, for some time I was also in the camp of "why we need our own expansive service". But the current development has shown, that it was a wise desicion to have our own system.

BTW: thanks for updating on some other details. I never followed up really, it was from the initial plans, that I was told there should be comercial service, that should pay. Also that for some emergency services there is a very limited possibility to have a back channel.


As far as I know all nav sats have emergency beacon payloads (Cospas-Sarsat). All providers (Beidou, GPS, Glonass, Galileo) joined this.


It has optional cryptographic signatures of the navigation message, i.e. the data indicating position of satellites.

Spoofing generally works not by altering the navigation message, but by altering the timing of arriving signals. I'd recommend this video for a publicly-available overview of the techniques: https://www.youtube.com/watch?v=sAjWJbZOq6I

tl;dr Galileo spoofers exist and work just fine.


Nope, the GNAV message is not only the position of the sateellites, the almanac https://gssc.esa.int/navipedia/index.php?title=Galileo_Navig...

Spoofing of Galileo was possible as long as the authentification was not enabled. https://www.septentrio.com/en/learn-more/insights/osnma-late...


A) you keep on using the word "almanac". That term only refers to the imprecise information about all satellites that every satellite broadcasts, mostly to improve TTFF. The actual position used for navigation is called "ephemeris", and each satellite only broadcasts its own.

B) none of that other stuff in the navigation message changes the pseudorange, which is what spoofers mess with. For a networking analogy - pseudoranges are calculated based on layer 1/2 properties of the network. (Specifically the code phase and Doppler shift.) Navigation messages are layer 7 information passed on top of that physical layer. You can change the timing and frequency characteristics of the PRN code without touching a single bit of the navigation message.)

The G/NAV message (note the G - government) is for a separate service - not OSNMA - where not only is the navigation message encrypted, but the PRN code is also encrypted (symmetrically, so it can't be done for the mass market or even untrusted commercial customers).


In other comments to this link people are describing GPS according to my mental model, which is hard to combine with cryptography making it un-spoofable.

If someone can re-broadcast the keystream and control the latency I perceive as a receiver, how would me checking that the MAC is correct help?


Galileo offers optional cryptographic signatures for their positioning data.

It's a solved problem and free for use.

https://www.gsc-europa.eu/sites/default/files/sites/all/file...


Sadly this doesn’t solve the problem.

Spoofers simply receive the signed signal and re-broadcast it with a tiny delay. Signatures still intact.


If you ever received unspoofed data, and have a somewhat accurate local clock (rubidium is fairly cheap), you can detect the spoofing.


Kicad brings its own Python and is fully interfaceable.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: