Hacker News new | past | comments | ask | show | jobs | submit login

In a tactical context, it's a huge ask to get intel value out of a radio in a timeframe that'll be useful. On top of that, compromised comms are almost certainly better than no comms. Military radio comms are pretty good (at least in the US), what I though OP was probably referring to was P25 which is a civilian protocol with several issues [1][2]

[1]https://www.youtube.com/watch?v=re9nG81Vft8

[2]https://www.youtube.com/watch?v=2se6th_6eYc

(I was there for Matt's 2019 talk, haven't actually watched the 2024 one)




Very interesting; thanks for the references. I'm no tactical radio expert, and can't quite remember, but I think the radio I'm referring to must have been the EZ-PRR[1], as that's the only similar-looking one that is reportedly in use by the British Army.

> compromised comms are almost certainly better than no comms.

Is this true when undercover though? As a layman, I would assume it is better for each soldier to attempt to find each other at first (like any other human beings, they'd have their 'Schelling points'), and failing that, attempt to get home safely on their own. The alternative - arranging a rendezvous over a potentially compromised comms method - could get them all killed or captured together. Is there a flaw in my reasoning?

[1]: https://www.cryptomuseum.com/radio/selex/ezprr/index.htm




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: