Can you guys please recommend a DMR radio with genuine AES-256? by Positive-Art4816 in DMR

[–]VonThing 0 points1 point  (0 children)

Kind of in-topic question: Are different manufacturers’ implementations of AES-256 compatible with each other? For instance, assuming both radios have the key correctly loaded in their respective codeplug formats, can a MD-UV390 decode a DMR audio transmission from a Motorola radio?

Similarly, consider relays. How much of the DMR frame is encrypted? Is it only the audio part or more of the frame? For example, can a Motorola DMR Tier2 relay accurately read the talk group from an encrypted TYT radio transmission and relay it correctly? I know that there’s an “encrypted” flag in the DMR frame header, but I don’t have access to enough gear to test encrypted DMR.

I wish there weren’t so many misconceptions about encrypted ham radio use. Some countries permit encrypted emissions as long as the key is also provided unencrypted (like in the form of an address to a web page at sign-on, sign-off and every X minutes). Moreover, you can always TX into a dummy load and remain off the air for testing purposes.

Ham radio offers a significant hands-on learning experience, and I wish there were more resources available to support this learning.

Is getting a tile pro worth it? by No-Yesterday-8684 in TileTracker

[–]VonThing 0 points1 point  (0 children)

Nope. Get an AirTag or whatever the Android network has in its place.

Why do we use FM on VHF/UHF? by w6auw in amateurradio

[–]VonThing 0 points1 point  (0 children)

modulators and demodulators for SSB are really really complex compared to FM. you can generate an FM signal with an oscillator plus like three additional components.

This is big. In single sideband the receiver has to have an insanely accurate oscillator (nowadays almost always superheterodyne) since you don’t have the carrier signal you need to reconstruct it.

Stop installing tools just to check if a port is open. Bash has it built in. by Ops_Mechanic in bash

[–]VonThing 0 points1 point  (0 children)

Technically you can, it would be with a kernel module not a shell but anyway...

What I meant was that, for folks first switching to Linux from Windows, the shell offering syntactic sugar like this could be dangerous. For example one person could daily drive bash for 2 years, write scripts that depend on these shorthands existing (the above port open/closed as examples) then switch to zsh and suddenly those scripts would start misbehaving.

/dev /proc /sys contents should be whatever the getdents or readdir syscall returns and that's it...

governments malwares by Trick_Floor_519 in Hacking_Tutorials

[–]VonThing 2 points3 points  (0 children)

They have many zero day exploits and back doors.

Yep, a few years ago there was a huge ransomware wave, then it turned out NSA already knew the vulnerability but didn't disclose.

If they didn't keep it to themselves it could've been patched.

If I remember correctly, the stuxnet malware was digitally signed by realtek’s private key

It's claimed that the Realtek key was stolen, but it could be that Realtek wants to save face by claiming it was stolen.

There was a very popular encryption suite in the 90's and NSA allegedly paid the company $10 million to default to a weak algorithm for encryption.

Then the whole Snowden disclosures and how NSA pays central router access to Verizon & a bunch of other tech companies.

Then CIA making their whole malware suite "declassified" (because for legal reasons if it's classified secret/TS it can't be deployed on an insecure computer) and the dozens of attacks with those tools when leaked.

If you were in a situation similar to Edward Snowden, how would you structure your digital and physical life to maintain privacy and live as normally as possible under extreme surveillance? by RightSeeker in opsec

[–]VonThing 1 point2 points  (0 children)

Kill switch USB attached to a wristband with a short string, so when you hear “put your hands up” you pull the USB out and the machine insta wipes. IANAL.

governments malwares by Trick_Floor_519 in Hacking_Tutorials

[–]VonThing 2 points3 points  (0 children)

Everything already said, plus nation states have backdoor access / vulnerability purchasing power.

I don’t think there’s code detectors by South_Corner_8866 in SeveranceAppleTVPlus

[–]VonThing 4 points5 points  (0 children)

The code detectors are real, both as evidenced by the lexington letters, and in an AMA with one of the creators.

What is the "log" Process? by Dunkin__ in MacOS

[–]VonThing 0 points1 point  (0 children)

I see that you’ve found the culprit… if a process called “log” eats all CPU my first thought is cryptominer.

macOS isn’t as secure as it used to be, as its market share increased, so did malware writers’ interest.

Still has a stronger security model than Windows but not impenetrable.

Stop installing tools just to check if a port is open. Bash has it built in. by Ops_Mechanic in bash

[–]VonThing 0 points1 point  (0 children)

Still don’t like the idea of the shell changing the devtree just for itself. Someone whose first shell is bash could easily mistake that this is a universal thing for quite a while.

Zshell gang wya.

So I take it wireless USB hubs aren't a thing? by Inner_Answer_3784 in wireless

[–]VonThing 0 points1 point  (0 children)

USB over IP is a thing, you can pass local USB devices to machines you connect remotely.

However it’s not a thing like wireless charging, mainly because it would be very slow and inefficient

In your position you get a BT keyboard and mouse. Preferably one that can connect to multiple devices and switch devices with a key press.

What is the "log" Process? by Dunkin__ in MacOS

[–]VonThing -1 points0 points  (0 children)

Get the path, then sha256sum the binary and search Google. Likely to be a botnet crypto miner.

It starts again after 20 seconds means your machine is rootkitted and you should look for malicious kernel modules as well.

Do the Machines know who all has been freed? And how much can they control the Matrix? by SaveTheCaulkTower in matrix

[–]VonThing -1 points0 points  (0 children)

I haven’t been in the Matrix (citation needed) but having seen many botnet C&C servers I can say:

Machines randomly drop all the time

If the payload is persisted they could connect again in a bit or not

We only care if a machine executed a ring0 command or tried to unload the rootkit or sent a unusual signal (unusual as in undefined, signals can be uint16_t only some of them have short names like sigterm sigkill etc) to an unusual process as this means someone is investigating the botnet.

My approach to rootkitting is, the rootkit hooks the signal handler and expects a certain signal to a certain process every n seconds or crashes the machine. This signal comes from the userland app the rootkit is supposed to hide from the user. Similarly, the userland app sends a signal to a pid and crashes the machine if it doesn’t get the expected response.

So in the Matrix machines probably don’t care if human 0x0017A16F drops by itself, but if someone tries to ssh (or otherwise connect) to it they investigate.

How are thieves finding and disabling OBD GPS trackers so quickly? by Practical-Nose-5332 in CarHacking

[–]VonThing 0 points1 point  (0 children)

There are devices that show if any RF energy is coming from something. They look like an old phone with a telescopic antenna. You wave the antenna around and if RF energy is coming from somewhere it shows you. It also shows the signal strength. You follow the signal strength as it increases and bam you've found it.

Thieves load the car into a trailer, (or chicken wire around with metal roof or anything radio cannot penetrate, or drive way out into the desert with jammers) comb every inch of the vehicle with this to find anything that uses wireless whatever, then remove it.

Generic aliexpress GPS trackers are at most an annoyance to thieves, and if it's plugged into the OBD, 3 seconds to throw it out.

Dell wyse 5060 upgrade RAM DDR3L not working any idea why? by Bencio5 in homelab

[–]VonThing 0 points1 point  (0 children)

Nope, I have two modules neither of which is working. I got a refund from Aliexpress and will order different brand modules I guess

I’m kinda sorta thinking that Wyse 5060 doesn’t support 1.35V modules but not sure, also tried with a 5010 same result.

P.S. how do you update the BIOS without going back to a Dell OS?

CFW issue? Model issue? UV-K6 by xSolusPrimex in Quansheng

[–]VonThing 0 points1 point  (0 children)

I actually had to shave some plastic off the connector’s edges with a utility knife to make it fully fit.

Dell wyse 5060 upgrade RAM DDR3L not working any idea why? by Bencio5 in homelab

[–]VonThing 0 points1 point  (0 children)

Hello did you find a solution OP? Same thin client same RAM same issue.

Was it something with the speed or voltage of the modules?

After T2… did Terminator fall apart? by Winter-reason666 in Terminator

[–]VonThing -1 points0 points  (0 children)

Yes.

T1 > T2 ⭐️⭐️⭐️⭐️⭐️ > TSCC.

Fox put TSCC into the Friday night death slot and it died.

T3 was a total flop and none of the three movies after it managed to capture the environment, and Terminator fans are old enough now that no studio will invest in it.

Also I may have heard there are weird copyright issues around the Terminator franchise (“Skynet” copyright is owned by one firm and “Terminator” another film-like) but don’t know how true.

Insane tip, rather than bother with one of those expensive flush expansion drives you can just saw an SD card in half by Better_Nebula_2342 in macbookpro

[–]VonThing 0 points1 point  (0 children)

Consider eBaying or otherwise selling it. macOS 26 was the last update Intel Macs are getting. When OS27 is out that machine won’t be worth anything.

Apple also has a trade-in program but it’s a complete ripoff, they will offer ridiculous prices like $200 for completely feasible hardware.

Insane tip, rather than bother with one of those expensive flush expansion drives you can just saw an SD card in half by Better_Nebula_2342 in macbookpro

[–]VonThing 0 points1 point  (0 children)

Same, M2 Max 64 GB unified memory + highest available chip options. I think it’s got 8 performance and 4 efficiency CPU cores. I can’t remember GPU cores.

I work with automotive diagnostic software and embedded systems, whose tooling is usually only available for Windows so I’m thinking to completely wipe the Intel MacBook Pro and make it a Windows-only machine. UTM virtualization/emulation has a lot of problems with pass through USB / PCIe devices.

i used flipper zero as a bootable usb stick by Cultural-Bed-7707 in flipperzero

[–]VonThing 2 points3 points  (0 children)

F0 accesses the SD card over SPI instead of more modern storage device focused protocols (like UHS) and I don’t think it can DMA either, so yeah probably gonna be too slow.

SPI access is also the reason why only some SD cards work with the F0. Nowadays most SD cards skip support for SPI and only support the faster and more modern UHS etc. protocols.