https://rusi.org/explore-our-research/publications/special-resources/meatgrinder-russian-tactics-second-year-its-invasion-ukraine
https://rusi.org/explore-our-research/publications/special-resources/meatgrinder-russian-tactics-second-year-its-invasion-ukraine
Russians killed Motorola?
i think we'll know on monday when the stock market opens wtf happened with the motorolla radios.
if motorolla stock tanks, then smart hedge fund garden gnomes know that motorolla radios actually got cracked
>believing that Russians have functioning technology
kek, you have been absolutely mindbroken by vatnik psyops
Can you read? It's not me saying but this britbong think tank
Are you retarded? If Russians could break encryption like that it would have more impact on the world than this whole war.
first of all we dont know the details of the mainframe behind their EW systems
second of all there are 10.000 combinations if its a 4 digit 80.000 combinations if its 8 and 120.000 combinations if its 9(max input for srx) and since they do not have letters or special types/slx the job is relatively easy
plus we know for a fact that nsa had a backdoor on drgb and this means that most surely a backdoor exist in aes too
do the russians know about it? for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released
you're certifiably retarded
The best known attack with available plaintext only reduces the keyspace to 254.3. The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department. The idea that the Russians have the backdoor because they can crack Denuvo, and don't use the capability to compromise half the world's IT systems, is pretty wild stuff.
>The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department.
yes remind us again about truecrypt?
not even gonna mention prism
or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
nevermind the fact that we do know about the backdoor because of this
https://seclists.org/oss-sec/2016/q3/600
thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key
>yes remind us again about truecrypt?
About what to do with Truecrypt? The fucking conspiracy theory based on schizo reading between lines and bad latin translation?
>not even gonna mention prism
Good, because it has absolutely zero to do with encryption.
>or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
The last three are a solid maybe, the first is a solid no unless you're on ARM and even then it's a solid maybe. The maybe hinges on what you mean by backdoor. If by backdoor you mean something that can read and influence state that isn't the CPU and which you can't audit or directly control then sure, but also your BIOS, the subcomponents of your CPU, all your firmware and any devices with DMA fit that description as well, but all of them require physical access to exploit most of the time, which would be gg no re for your CPU and RAM anyway.
>nevermind the fact that we do know about the backdoor because of this
>https://seclists.org/oss-sec/2016/q3/600
That's not a backdoor you dumb fuck, it's detectable in the blob, limited to a single compiler toolchain that's rare as fuck and the result of a clearly honest mistake using a function that's prohibited in a single compiler that most devs have never touched. It was also closed within a few months of a private report of it - protip, read the actual related PR.
>thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key
I think that you don't understand what that bug did, because it isn't what you described.
>he fucking conspiracy theory based on schizo reading between lines and bad latin translation?
he literally and publicly said do not use it because they have a backdoor
i think the ceo knows a bit better dont you think?
>because it has absolutely zero to do with encryption.
yes it does when you have backdoors at ring 0
>solid
no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
> limited to a single compiler toolchain that's rare as fuck and the result of a clearly honest mistake
honest mistake from a bug on the only part of the crypto++that can break the encryption?
riiiiiiight
>because it isn't what you described.
check the github
>he literally and publicly said do not use it because they have a backdoor
>i think the ceo knows a bit better dont you think?
The CEO never did that retard.
>yes it does when you have backdoors at ring 0
You're not getting closer to proving anything by giving yourself more things to prove.
>no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
You literally don't know what security rings are and are throwing around terms that out you as ignorant over and over again. The systems you're talking about are ring -3 (EL2 on ARM). They are not ring zero you fucking pleb.
>honest mistake from a bug on the only part of the crypto++that can break the encryption?
Read the CVE and read the github you pleb. The CVSS has ZERO ratings for confidentiality and integrity, and has a low availability rating. It doesn't create ANY risks of breaking crypto. Under an unlucky configuration you get a bluescreen that can't even be externally triggered. Under most configurations you get zero effect.
>riiiiiiight
You dumb fuck, your idea of a NSA backdoor is a fucking pointer mistake that can't leak plaintext, can't leak keys, can't cause an availability loss on demand but might cause a bluescreen if you're really unlucky. Congrats bro, you're retarded.
>check the github
You need to learn to fucking read git you dumb cunt. The change was committed to master on 10 Feb 16. Master became Release 5.6.4 on 12 Sep 16. The PR (306) that fixed it was merged on 25 Sep 16 and released as 5.6.5 on 11 Oct 16. The bug potentially caused a memory corruption that would lead to a BSOD if you were unlucky, and it's that luck factor that let it get through testing. Your idea of a hektik NSA backdoor that proves that AES-256 is completepy broken by both the Russians and Americans is a minor bug that only affected a program if compiled on a rare toolchain, only caused rare crashes, caused no leaks and was only released for 30 days. You are a retard.
>The CEO never did that retard.
watch the audit
>Read the CVE and read the github you pleb.
and remind us again anon where it stores the exchange again?
what happens to your ram when your pc freezes ?
oh yeah thats right...back then intelME dumped it into their cache which by design was encrypted on the fly
the same cache we found out it was backdoored by nsa via intelME
WHO KNEW!
i guess it was a honest mistake too
This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence then the entire elaborate procedure of crashing the computer to then extract the keys that the ME encrypted would be unecessary, since the ME could simply pluck the keys out of memory with a DMA leech attack or ask the CPU for them. The entire premise is feverishly retarded and just keeps looping back to the fact that you don't seem to have a grasp on the topic. The world in your head has a compromised and all powerful ring -3, but the malicious actor instead trying to launch attacks from user space by crashing programs with code that was immediately identified and fixed. And this fever dream combines with CEOs giving speeches that don't exist and trannies cracking Denuvo to prove that the Russians and Americans have real time AES backdoors. Just fucking stop man
See a doctor, jesus.
>This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence
HELLOOOOO where do you live?
My IP is 192.168.1.1. I bet you can't DDOS me.
i just sent you a nasty surp-
not him but you are literally wrong
intelME is a backdoor there is no discussion about this it even revealed to have a custom made lynx version on it
Hi anon! Re read that other anons post you replied too! Id really appreciate if you could understand his point about userland hacky crashes being pointless due to ime having -ring access to cpu ram etc etc. Have a good day 🙂
>for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released
There's literally a single person in the world capable of cracking denuvo v17 and it's a moderately insane and racist chud.
Yes and its retarded
Is it? Where is the source, you bloated clown?
are you blind or retarded?
And the britbong is fucking retarded you retard, which is surprising given cryptology has such history in the UK
It says
>Rus EW is apparently
>Apparently
>You use apparently to indicate that the information you are giving is something that you have heard, but you are not certain that it is true.
Settle down Internet incels...learn to read
Maybe they should have used their brain first before making such assessments
If the world's oldest military thinkthank is spreading rumors, I don't think I trust them anymore.
>aaaaaa I'm not capable of handling shades of gray
It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.
>It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.
Publishing this tells me they haven't run anything past experts in the field. How many other things are bullshit, but people don't have the insider knowledge to call out? How many other things are anecdotes that only happened once or twice?
>AAAA I CAN'T DEAL WITH UNCERTAINTY
that's life outside the basement
live with it or become a shut-in
Good job detectives, you managed to misread the article and post cope.
>misread
that would involve actually reading in the first place, which just about nobody ITT has
no one cares what you think you daft moron
>Apparently
I don't care how apparently they think it is, trying to decrypt AES 256-bit in real-time is an absolutely horseshit speculation unless they actually got the crystal skull from the 4th Indy movie to do the work. That or the Ukrainians need to work on those issues in their implementation
I don't need to read the whole article to spot a shit-take already telling me everything I need to know.
t. comp. e fag
It's obviously the Ukrainians not using the Motorolla correctly.
>Ukie gets AES 256
>Uses it wrong, gets artyd
>Explains to west Russia decrypted it in real time to save face
>West has to take what they say at face value because we are the good guys
If the rest of the gays in the thread actually read the report or at least searched the PDF, they would see the other paragraph on the matter.
>Another function of Russian EW troops is interception and decryption of Ukrainian military
communications. The Russian military is proving highly capable in this area. Ukrainian officers
recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
of an artillery strike based on Ukrainian troops calling in a fire mission.56 The Ukrainian troops
were communicating with Motorola radios with 256-bit encryption, but it appeared that the
Russians were able to capture and decrypt these transmissions in near real time. The most likely
system for such functions is the Torn-MDM.57 When the Russians are not intercepting traffic,
Ukrainian units note that they are reliably able to suppress the receivers on Motorola radios out
to approximately 10 km beyond the FLET.58
>Appeared
>Apparently
Notice the language RUSI is using to distance itself from the claim? Because they know either the claim is total bullshit but don't want to flat out call the Ukies liars or they suspect the radio was used incorrectly.
The source for that claim wasn't Ukrainian though
>Ukrainian officers
recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
of an artillery strike based on Ukrainian troops calling in a fire mission
>Ukrainian officers
recalled
You're retarded
They didn't say they decrypted it, they said "it seems like they figured us out". This is not the abject admission of cracking decryption, nor is it t"the US having to take it at face value". The "decryption was cracked" claim was from a Russian source in the same section
>The "decryption was cracked" claim was from a Russian source in the same section
what Russian source?!
this is where NOT READING THE PAPER gets you: making shit up to justify your shit take
I read it. They're interviews from ????
Yeah. Not
>a Russian source in the same section
Way to totally make shit up, bro
If you hear something you think is bullshit you're not obligated to actually post the questionable content. They're not a news organization reporting what's said they're a think tank supposed to actually judge the content for believability not couch their report on "hey I don't believe this crap I just read the news buddy"
The fact thAT RUSI published these claims without checking with anybody that knows anything about encryption standards and how encryption keys are generated, stored and transmitted shows that they did not do due diligence. EW and general computer networks are really not well understood so the fact that a bunch of wargaming nerds do not have any idea of how they work is semi-understood but hiding behind "apparently" is completely unacceptable for a reputable source such as RUSI and brings all their previous works into doubt.
The strength of an encryption standard does not rely on the standard itself but in the "keys" it generates. These keys are regularly changed and unless some sort of workaround to shorten the amount of bits that need to be cracked to crack the standard can be found, (WEP, DES) then the standard remains robust. There is no "enigma machine" to be found or broken that would crack the whole standard open. Every single key in use needs to be cracked individually to gain access to the encrypted data.
Is it possible that Motorolla made some sort of mistake on their end? Yes. Is it possible that the Russians got their hands on a "hot" radio? Yes.
The fact that RUSI jumped to the least possible answer and then published it is completely unacceptable. If Russians could crack 256 bit encryption in real time in the field then they could easily gain access to ALL the US classified information.
Are you guys crying?
>-t. non technical
Social studies majors should be silent.
Are you crying though? Seems like you typed your little heart out and no one cared lol
NTA but you deserve to be shoved into a locker for this post
Yeah
>show off an uninformed cretin opinion online
>get made fun of by people who know shit
>"a-are you crying n-nerd?"
Rope holds all the answers you require Anon.
(I doubt you own a gun.)
I cri evrytim i talk to vatmorons like you
Everything in your post is wrong as fuck. Ciphers matter, not just their key size. Ciphers (encryption methods) also don't generate keys at all, they just use them. RUSI said they broke 256 bit encryption in real time, not that they broke AES-256. The overwhelmingly most likely explanation is either that the Ukrainians were using the RC4 based stream cipher mode on their radios with a 256 bit key, and the Russians were breaking that in real time or that the Russians had access to the Ukrainian keys.
Also AES is symmetric and the models in use only hold something like 16. Having even a single live key would let you read fuckloads, and if you had one you'd most likely have all of the ones in local use.
>apparently
Apparently means the opposite of "something we've heard". It means "it is apparent that", ie this explanation fits what has been observed.
People who are educated don't use the colloquial meaning of words in academic or professional writing. They use the real meaning of the words.
Apparently means "it would appear so"
The word you're looking for is "reportedly"
You said it you fuck
per month
Also
>9000+ ukrainian tanks destroyed
>1000+ Bayraktars
>68 HIMARS
and other vatmoron cope
this pic doesnt say 9000 tanks its tanks and amoured vehicles
same thing
which is still way more than ukraine has
Initially, they wrote it as "tanks", but when the numbers turned out to be just idiotic, they shamefully removed both pages and drew these numbers. However, now it looks even dumber
>RUSI are vatmorons
shut the fuck up retard
>Ria novosti
You're complexly retarded.
10000 per month is absolutely believable. Cheap and disposable anon
>deconflict
Well, I learned a new word today
You do realize that if they had the technology to break live AES-256 crypto TX that the capability would 1: be everywhere or 2: be the most desired Russian export
They don't know shit about fuck. They live in a fantasy world, not understanding what cryptography is, beyond thinking that it's some magic that Russian wizards can overcome.
>Oh shit sorry guys we were actually using a 256-bit WEP implementation from 2003.
that'd be really funny
>https://www.motorolasolutions.com/en_us/products/two-way-radios/project-25-radios/portable-radios/srx2200.html
>Wi-Fi enabled
Christ this would be the funniest shit.
>The fuck is a WPA3? Set that shit to WEP it's uncrackable.
Nyet, we're going to WPA. Untraceable by Kismet, uncrackable by hashcat
>Ukrainian UAV losses remain at approximately 10,000 per month
Am I misunderstanding this or is this a typo? I'd have a hard time believing they're losing even 1,000 a month. Do they realize how many fucking drones 10,000 a month is?
lmao
10,000 drones per month = $20,000,000, really not that unbelievable if they are mainly consuming DIY kits and cheap consumer drones
Watch Perun's video about drones, and read the interview with that ukie commander. The typical consumer-grade quadcopter lifespan is about 3-5 sorties in frontline duty. They are expendable, like ammunition.
I would neither trust nor discredit their capabilities. The only way to answer an encryption threat is with better encryption.
The radios only use WIFI for updates during servicing according to the documentation on the website.
The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).
According to the spec sheet, the radios support:
ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X
AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.
>defeat 256 bit crypto
>via bruteforce attack
>in real time
>when the key is going to change on a set interval making the bruteforce window absolutely minuscule
>when the message isn't even plaintext and is likely split
most attacks on crypto involve circumventing the crypto entirely
in fact the radio firmware is often
>accidentally
left with these vulnerabilities to interception at key points and never fixed even though the manufacturer is aware of them.
guess that's what happens when you insist on leaving a backdoor open for your own snooping but forget it's a universal backdoor now used by russia and china
Should throw some programmers at it and flash tge software
>guess that's what happens when you insist on leaving a backdoor open for your own snooping
The NSA insisting on adding backdoors to shit that absolutely shouldn't have them is one of the bigger self-owns of the burger intel community.
> break
Wrong. Article does never mention breaking of encryption. What it mentions is decryption, which would assume a key management issue.
Keys could be leaked, stolen or simply mismanaged - sent over unencrypted channels.
On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.
AES-256 is quantum secure anyway, so your scifi portable quantum computers won't help.
RUSI simply don't know what they're talking about
If you're a Russian scientist who can break encryption in linear time, you just broke the whole class of NP-hard problems wide open
RIP all cryptography
I'm not sure about the real-time decryption of Motorolas, but when we operate we assume our comms are intercepted and will be decrypted eventually. Even when we use Harris radios. Harris also has a much better range of transmission (motorolas are usually useless past 1-1.5km), but it is bulky and inconvenient
>10k UAVs a month
There would be no UAVs left with such attrition rate. Absolutely preposterous.
Even if they count mavics and fpv drones it's not even close to be realistic
Russians were world leaders in hacking until recently when China poached all their top talent.
NSA Equation Group have been top dog hackers for a while
Dictator memehackers literally eat their scraps (eternalblue exploit) to pull shit off
I think they're talking about radios with the P25 encryption standard, which is mandated to be AES 256.
https://www.dhs.gov/sites/default/files/publications/P25-CAB-ENC_REQ-508_0.pdf
P25 mandates that AES-256 is included, not that it's the only available encryption mode. See
for the modes the radios support.
> break 256 bit encryption in real-time
Instantly discarded
But the 80 year old professor leading the think tank said so, surely he would know.
Russians obviously do not have a general purpose 256-bit AES crack on hand, but there's any number of implementation or procedural mistakes that may allow them to be decoded. Recording some 25kHz bandwidth VHF/UHF signals is completely trivial and it can then be sent off for offline cryptanalysis.
The UAV loss figure I'm curious about, there's some hundreds of thousands of ukie troops deployed, 10k UAV losses would be 1 UAV lost per month per 10-30 soldiers? It could very well be in the ballpark, but it depends on how ubiquitous drones are within the ukie army structure, if every 10 man squad has a quadcopter then they are obviously losing them as well.
I think most squad sized elements operate with a UAV and I read a figure that the life expectancy of a UAV is a couple of weeks max
anon, you're retarded, either kys or get on some gov support program
they imply russian have means to crack one in > 1.1579209e+77
> fucking
> keys
it's eternity on modern cpus
> implementation or procedural mistakes that may allow them to be decoded
That anon means mistakes like:
> key generation is flawed and don't actually provide 256 bits of entropy
> key distribution is flawed so the key gets stolen through a sidechannel
> protocol implementation is flawed, so falls back to an insecure algorithm
> AES was correctly implemented, but some other part of the scheme like block chaining has a bug
AES256 is an impenetrable door for now. But in a flawed system, you can attack the hinges or dig under it.
Thank you anon. There are also general RF fuckups, albeit I don't expect these from a Motorola product, ditto for some chinese wares though, e.g., microphone incidentally modulates transmission, summing AM voice over encrypted data comms. Then there's the concerns whether the key exchange is safe and that keys are utilized correctly seeing that Russians definitely capture 'hot' radios every now and then.
We will not know about the EW effectiveness until after the war, if even then, and it will likely be in the form of testimonies and the like.
Anon you're genuinely retarded on both points.
>On more than one occasion Ukrainian soldiers report that disposable infantry have been shot from Russian positions when attempting to retreat
never change, pidors
>The patterns of fire are being described as
>‘Nomadic Cannon’
>harassing fire, delivered from mobile firing points, often to draw counterbattery fire or conduct artillery raids
>‘Fiery Carousel’
>a means of maintaining survivability while sustaining barrage
>‘Roaming Platoon’
>manoeuvring guns maximising the weight of
salvo deliverable against a target
>‘Umbrella Cover’
>essentially a means of suppression
kino names
>Gun positions are no longer dug. Instead, a battery will conceal itself in a woodblock and move to a firing position where ammunition will have been placed for a defined salvo. It will then move to the next. If fixed by counterbattery fire, operators tend to leave their guns and seek cover, only returning to them when it is safe to do so.
they're learning
>Along with the successful interception of most high-speed anti-radiation missiles (HARMs) fired by Ukrainian aircraft, the Russian air defence network is now assessed to be achieving a significant number of intercepts against GMLRS munitions
oh no HIMARSbros
>The longest-known shoot-down against Ukrainian aircraft was at 150 km when the aircraft was flying lower than 50 feet. This appears to have been cued by a 48Ya6 ‘Podlet-K1’ all-altitude radar with the air defence missile achieving a post-apex lock on the target
okay that's actually pretty impressive
>The strength of the air defence network is bolstered by persistent combat air patrols at medium altitude by Russian Su-35Ss
>According to the Ukrainian Air Force, the longest-range recorded kill by a Russian R-37 was at 177 km
Mig31s BTFO
>There are believed to be eight Russian
Mi-17s with EW suites operating in southern Ukraine. These are being utilised to some effect
for the purposes of electronic attack against Ukrainian command and control, and through their altitude are able to do so in greater depth than is achievable by comparable systems based on the ground
only six now
With how absolutely retarded RUSI is on encryption and number of UAVs shot down, I have to doubt everything else they said
Let him rest in peace
And Russians love to get butthurt when we call them liars, absolute retarded shit
russian flavor of the month wunderwaffe are getting boring, yawn
>ITT: retards who don't even read say the world's oldest military thinktank is retarded
sigh
>Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time.
It is more feasible that they fluked or someone broke opsec than they decoded anything.
someone forgot to turn the encryption on.
no amount of coping will change the fact that realtime cracking of AES-256 is impossible at the moment.
RUSI is flat out wrong in their statement that it was "cracked". snooped an accidental plaintext transmission, maybe. Pozzians got hold of a hot radio and Ukrainians never bothered to rotate the keys? perhaps. saying that AES-256 was "cracked" is the digital equivalent of a reputable publication saying "military-style rifle with high capacity clips". it destroys the credibility of the statement because it displays a fundamental lack of knowledge about the subject.
Unless Russians use quantum computing. That would crack AES256 in real time.
thinkingemoji.jpg
AES256 is quantum safe
>saying that AES-256 was "cracked"
except they never said that, shit for brains
>making it suspect where they are getting their info from
you'd know if you'd READ THE FUCKING PAPER
>bruh just believe russian propaganda ok?
The idea that they had broken encryption would imply that Russia has accelerated the development of Quantum computing to a scale not actually possible yet.
RUSI also has not verification of that UAV number, making it suspect where they are getting their info from.
Russian EW is understated. HIMARS stopped being effective once they employed EW countermeasures to throw its guidance off before impact. One of the more competent areas they have.
They just lost 10 T-90S in fucking Donetsk to HIMARS
According to who, Ukrainian MoD? Western rags like CNN?
>quoting unnamed officer stating Russia intercepts all HARM and HIMARS rockets
>good
>quoting unnamed officer stating Russia lost 10 T-90 tanks to HIMARS
>bad
Hmmm
There's actual proof of Russia reducing HIMARS effectiveness unlike your fantasy scenario of losing 10 T-90s to HIMARS
May I see it?
https://eurasiantimes.com/us-admits-russias-on-point-jamming-has-made-life-miserable/
You're literally quoting "an anonymous source told cnn" and the only official word on it is that it's a constant cat and mouse game, which is well understood even by smooth brains like yourself. Do you even read past the headline from your preferred propsource?
>eurasian times
>anonymous sources
Yea
HIMARS effectiveness can be reduced via GPS interference.
It has backup inertial guidance though it would technically degrade its performance
>lol nope I'm not gonna read the report
Delusional
>understated
I'd say it's probably the only thing they had that wasn't overstated. Russian ew has always been taken seriously. It also happens to be one of the only areas in which it was warranted
What the fuck happened to RUSI? I thought they were good and enjoyed reading their previous take on Russian intelligence operations but now I have to take all their prior materials with a MASSIVE dose of salt. All their ""evidence"" of their wild claims that Ukraine is losing 10000 drones a month and Russia has managed to crack AES 256bit with magical Banan technology comes soleley from interviews with no actual solid evidence whatsoever.
Source: random Slav in Ukraine that did not finish high school
are those radios by chance made bya chinise owned company that is using "motorola" name? (similar as with lenovo producing IBM thinkpads and so on?
Motorola is owned by a taiwanese company now and for awhile. Google bought up all of their patents before selling the name to the company in question, however
AES256 is mathematically proven, but translating proven math into real code ran on real computers, especially when doing bare metal embedded is hard and error prone. Its perfectly reasonable that Russia has found exploitable errors in implementation. Unfortunately many software and hardware vendors have a 'locks keep honest people honest' view of security and aren't really trying to verify that the implementation holds up to scrutiny.
That's next level hopium
>10k UAVs a month
The source is that some Russians moved out of a position before they were going to be hit with artillery barrage.
It could literally just be coincidence.
China cracked 128bit encryption years ago, 256bit is just the next step
> just square the amount of enthropy bro, it's just twice the bits
this is the reason people live in their mother's basement. morons know fuck about shit and then parrot dumb opinions on the internet
The key space is only one variable in the schema, and the Chinese haven't broken AES-128.
You
in particular need to stop pretending that you have a technical education relevant to crypto because you clearly don't. Going from 128 to 256 AES is not a squaring of the entropy, it's a raising to the 128th power, ie squaring 128 times.
Another possibility regarding the Russians being able to bypass the AES256 encryption in real time is that they simply hacked Motorola's systems, stole the code for the firmware used on the radios and managed to find vulnerabilities within it that would enable them to listen in it Ukrainian comms without having to worry about the encryption at all.
>butthurts ESL East Euro morons.
Stuttering a bit there, rajesh. Try to be less obvious next time you shill for russia.
>this is the guy calling you a hohol shill online
Suddenly I don't even feel so bad being associated with cringy NAFO chuds.
>Me before the internet: How the hell did 1600 British civil servants manage to control the whole of India?
>Me after the internet: Why did it take as many as 1600 British civil servants to control India?
crypto is hard bros
I thought Motorolas use AES-256?
Or is this some NSA export gimped AES-256?
the fact that everyone ITT thinks bruteforcing 256 is is the ONLY way to decrypt signals is precisely why side-channel attacks are so successful
Both the authors of this piece have backgrounds in the arts and humanities. In the report the claim is unsupported.
It appears to come from "Ukrainian field notes", which I find somewhat unreliable particularly in this area. Soldiers are very understandably not necessarily the most reliable people when they say shit like "they knew we were coming" or "how did they know". I suspect the most likely way decrypting this in real time is to have a spy who fucking texts you the information. If not just a few coincidences or misunderstandings.
>rusi
>when they keep being wrong about things that are verifiable with OSINT
>when they claimed that russia hasn't used s300 in ground attack
>claimed Ukraine wasnt using harms at all and was stockpiling them
Being in a think tank is the easiest fucking job. I'd love to have a high paying gig where I can be even more inaccurate than snopes and get 6 figures.
Don’t forget when they dismissed the ability for Ukraine to regain Kherson in 2022.
People need to understand that Think tanks are not impervious to making mistakes, no matter how “old” they are. They are information aggregates that make best-guess opinions based off what they’ve seen.
Yeah, but we're allowed to notice when they're wrong and ask for some accountability, right?
what more accountability do you want, when they have already stated their methodology and reasoning? in fact they are the most conscientious in this regard; most other OSINT commentators and analysts don't dwell much on the sources of their data
>when they claimed that russia hasn't used s300 in ground attack
>claimed Ukraine wasnt using harms at all and was stockpiling them
when did they say that
Tryhard vatnick esl. How boring.
Ok, what the hell is happening with RUSI now? In a short timeframe we had:
>Russia can crack 256 bit encryption
>Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
>Russia is destroying 10k drones per month!
>Russia can crack 256 bit encryption
They never said that, but every 4chud wanted to show off they grok encryption
>Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
They never said that either, just that T55s are dangerous enough when used as SPGs and IFVs
which is not wrong since the Ukrainians are doing the same with the M55s
>Russia is destroying 10k drones per month!
They did say this, but probably this refers to handheld drones of the DJI type, which they previously reported do have high attrition rates
Just curious, why doesn't Ukraine actively target the UAV jammers? I don't think it would even be hard -- set up a recon drone with a couple of antennas on a wide beam strapped under the UAV, and use differential signal strength through a couple of op amps to guide it straight to the jammer antenna. Take video the whole way. UAV then flies back using inertial and magnetic guidance, and calls in the artillery.
"We can blow up your fucking jammers faster than you can buy them from China."
>Rusmoron(i)
No, thank you.
>vatniks breaking 256 AES
somehow I doubt it
why do I keep reading EW as early warning
>russians can real-time break 256bit encryption
yeah no, if they could do that they wouldn't need to invade ukraine - they could simply hack every bank in the world or make trillions selling their super-duper-quantum computers.
The bongs have just worded that in a stupid way.
Russians are not brute-forcing the keys, they more likely found bugs in the million lines of Pajeetware running on those radios and/or their key management system.
Lots of retards in this thread who have no idea what they are talking about so let me explain how this industry fucking works.
So you have a cryptographic primitive designed by very smart people in Europe. This becomes the Advanced Encryption Standard (AES). This has been widely analysed for decades by the best minds in cryptography research, and is widely believed to be very secure.
Now you take that and put it into a PRODUCT. That's where product managers, in this industry, jarheads who got a MBA degree, enter the picture. They take the very secure primitives and sell products that add TONS AND TONS AND TONS of features on top of it, because features is what you can sell to the police departments, militaries and whoever buys those things. Now those guys don't really know about that shit either, they just know that AES is the secure standard of the US government and it says it has AES inside, so they trust it.
Now, our MBA/jarhead product manager has sold yet another version of the product with super fancy functions to upgrade the keys over the air, rotate them and what not. There is a super fancy web GUI because you need to sell a cool product. Who writes that? Pajeets. Pajeets with green cards and security clearances. Because who else is going to write that code? MIT grads? No those guys work in banks or Google, not for fucking Motorola.
In Russia it's different. The top grads of Russian universities don't work for FAGMAN companies because outside of Yandex and a few others, this just doesn't exist. So many of their top mathematicians and coders work for defense.
They get brought radios captured, or in fact literally just buy them from brand new from a dealer, and reverse engineer them.
No, they can't fucking crack AES. But they will methodically analyse the millions of lines of code written by Pajeets and find a bunch of vulnerabilities. And from there the sky is the limit. Maybe the rekeying protocol is badly designed and leaks sequences... (1/)
... leaks sequences in the protocol that can be identified. You can then jam the fuck out of the packet containing the response, meaning you prevent the device from rekeying (so it keeps the same key that is on one unit you have captured).
This is just a stupid example and it's most likely not the exact method they have used, but you get the idea.
Cryptosystems don't get broken because of the encryption primitives (although many ones believed to be secure turned out to be completely flawed: RC4, MD5, etc.)
They get broken because the implementation is retarded and there is a 50 IQ point differential between the people who designed the crypto primitive and the PM/coders who wrote all the shit around it.
there's unironically a shit load of pajeets who work at Motorolla
I wonder how many companies have to go under until Americans finally stop hiring Indians.
>So many of their top mathematicians and coders work for defense.
They don't.
A few idealists and austists do, but the vast majority just leave the country or work for western companies from Russia.
Because the west pays you $2-5k per month, while the Russian government pays you $300-1000 on some months.