this post was submitted on 14 Oct 2025
318 points (98.8% liked)

Technology

76041 readers
3219 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

https://archive.md/QMvAI

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.

top 20 comments
sorted by: hot top controversial new old
[–] stoy@lemmy.zip 74 points 1 day ago (2 children)

I remember reading that drug cartells in South America are using disused military communications satellites.

These satellites simply takes a signal recieved on one band and rebroadcast it on another band over a wide area, so as long as the satellite can pick up your signal you can basically talk to an entire continent at once, all while remaining anonymous.

[–] vacuumflower@lemmy.sdf.org 31 points 1 day ago* (last edited 1 day ago) (3 children)

There must be some additional steps. Otherwise those satellites would be overloaded by hooligans.

[–] FE80@lemmy.world 14 points 16 hours ago (1 children)

Someone tell me how to join team "satellite hooligan".

[–] knightly@pawb.social 8 points 15 hours ago

You can get a cheap SDR for a few bucks and an antenna for about the same. The rest is software and ingenuity.

[–] Theoriginalthon@lemmy.world 8 points 20 hours ago

Well the biggest steps I'm going to assume are having a satellite dish, knowing where to point it, knowing what to send, then hope that someone is listening. Much easier for a hooligan to throw a rock at someone or find a can of spray paint

[–] aBundleOfFerrets@sh.itjust.works 34 points 1 day ago (1 children)

Nope, lol. These suckers are fucking ancient. There isn’t any processing, you can’t overload something that isn’t actually reading the data or using a protocol.

[–] vacuumflower@lemmy.sdf.org 4 points 1 day ago (1 children)

They still use energy, no? To relay signals on another frequency. That should come from somewhere, and also the more different signals, the more noise. And without their input frequency being regulated, there must be lots of noise.

[–] Arkthos@pawb.social 20 points 1 day ago (1 children)

You can do this same attack on any antenna, noise can't be protocolled away. Repeating both signal and noise is a downside to bent-pipe setups.

Input frequencies are regulated via band-pass filters.

[–] vacuumflower@lemmy.sdf.org 0 points 1 day ago (1 children)

I'm not talking about technical things, just that IRL on regulated frequencies one can do something because people using it for bullshit are legally prosecuted. Depends on wavelength, of course.

But OK, now I think I get what you are talking about.

[–] Arkthos@pawb.social 5 points 1 day ago

Oh. Yeah most bands used by satellites are also regulated.

[–] obinice@lemmy.world 3 points 1 day ago

That's fuckin rad, I love satellites! So eerie and mysterious ~

[–] JamonBear@sh.itjust.works 21 points 1 day ago
[–] treadful@lemmy.zip 15 points 1 day ago (2 children)

“Generally, our users choose the encryption that they apply to their communications to suit their specific application or need,” says a spokesperson for SES, the parent company of Intelsat. “For SES’s inflight customers, for example, SES provides a public Wi-Fi hot spot connection similar to the public internet available at a coffee shop or hotel. On such public networks, user traffic would be encrypted when accessing a website via HTTPS/TLS or communicating using a virtual private network.”

Can't decide the side of the fence I am on for this. Of course the vast majority of Internet traffic across the world is unencrypted. Anyone could be on the line between me and this Lemmy instance, just as they could if there was a satellite between us. However, you're also broadcasting it to like 25% of the globe and not even making any kind of physical infrastructure efforts.

Quest can't entirely guarantee nobody will snoop a fiber line, but they do bury them.

[–] Dekkia@this.doesnotcut.it 62 points 1 day ago (1 children)

vast majority of Internet traffic across the world is unencrypted.

In 2023 between 80% and 95% of web traffic was encryted. Unencrypted web traffic is getting pretty rare.

https://www.eff.org/deeplinks/2023/12/year-review-last-mile-encrypting-web

[–] treadful@lemmy.zip 7 points 1 day ago (2 children)

I should've been more clear, I didn't mean the data, but at the protocol level it's all open.

Same with the Internet traffic through these satellites.

[–] Cocodapuf@lemmy.world 1 points 11 hours ago (1 children)

I mean, some parts of the protocols we use for the Internet need to be in the clear to work, DNS comes to mind. If you want that kept private as well you need to use something like tor.

But regardless, what people generally actually care about keeping secret is the content, not the protocol.

[–] treadful@lemmy.zip 2 points 10 hours ago

I mean, some parts of the protocols we use for the Internet need to be in the clear to work, DNS comes to mind. If you want that kept private as well you need to use something like tor.

Not really. We also have DNS over HTTPs, DNS over TLS, and DNSCrypt which are all becoming more popular. But that's still application level data that I'm not really talking about.

But regardless, what people generally actually care about keeping secret is the content, not the protocol.

A lot of information can be gleaned from protocol metadata though. Source, destination, which applications are being used, maybe more depending on protocols. Not exactly information I want to be easily available to the public, but also not exactly critical either.

[–] Natanael@infosec.pub 5 points 1 day ago

You should be clear with the difference between link encryption and application encryption here

[–] Arkthos@pawb.social 1 points 1 day ago

Typically satellites have beams they turn on and off to service different areas, with one beam pointing towards the RAN that receives the data rather than just repeating a broadcast out to everywhere the satellite can theoretically reach. For mobile telecom backhaul via satellite it is standardized that the data should be encrypted for untrusted transport links so this seems to me like an issue of not following specs.

[–] obinice@lemmy.world 4 points 1 day ago

A fascinating read, thanks for sharing :-)