Low speed, p2p, wireless as a secure alternative to SMS and Signal-like services.

coderman coderman at protonmail.com
Tue Oct 29 19:26:33 PDT 2019


‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, October 28, 2019 9:54 PM, Steven Schear <schear.steve at gmail.com> wrote:

> Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives.

the least recommended method, but effective for certain!
 engage these sigint spooks and see what they've got.

there was dirtbox deployed at Rio for DEF CON to catch some anons. loaded with custom exploits to stage always on Google Voice (open mic night) masquerade low power to encourage device to remain plugged in at room, PRL force pushes to prefer routes through middle towers, etc, etc.

problem is when triggered by DHCP, you can DHCP RELAY for hundreds, maybe thousands! yes, you can fork bomb a dirtbox dead, if vuln like this :P

one of many, find some yourself!

best regards,
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1529 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20191030/52c68555/attachment.txt>


More information about the cypherpunks mailing list