Motorolasisters...

https://rusi.org/explore-our-research/publications/special-resources/meatgrinder-russian-tactics-second-year-its-invasion-ukraine

  1. 2 weeks ago
    Anonymous

    Russians killed Motorola?

    • 2 weeks ago
      Anonymous

      i think we'll know on monday when the stock market opens wtf happened with the motorolla radios.

      if motorolla stock tanks, then smart hedge fund garden gnomes know that motorolla radios actually got cracked

  2. 2 weeks ago
    Anonymous

    >believing that Russians have functioning technology
    kek, you have been absolutely mindbroken by vatnik psyops

    • 2 weeks ago
      Anonymous

      You do realize that if they had the technology to break live AES-256 crypto TX that the capability would 1: be everywhere or 2: be the most desired Russian export

      They don't know shit about fuck. They live in a fantasy world, not understanding what cryptography is, beyond thinking that it's some magic that Russian wizards can overcome.

      Can you read? It's not me saying but this britbong think tank

      • 2 weeks ago
        Anonymous

        Are you retarded? If Russians could break encryption like that it would have more impact on the world than this whole war.

        • 2 weeks ago
          Anonymous

          first of all we dont know the details of the mainframe behind their EW systems
          second of all there are 10.000 combinations if its a 4 digit 80.000 combinations if its 8 and 120.000 combinations if its 9(max input for srx) and since they do not have letters or special types/slx the job is relatively easy
          plus we know for a fact that nsa had a backdoor on drgb and this means that most surely a backdoor exist in aes too
          do the russians know about it? for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released

          • 2 weeks ago
            Anonymous

            you're certifiably retarded

          • 2 weeks ago
            Anonymous

            The best known attack with available plaintext only reduces the keyspace to 254.3. The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department. The idea that the Russians have the backdoor because they can crack Denuvo, and don't use the capability to compromise half the world's IT systems, is pretty wild stuff.

            • 2 weeks ago
              Anonymous

              >The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department.

              yes remind us again about truecrypt?
              not even gonna mention prism
              or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
              nevermind the fact that we do know about the backdoor because of this
              https://seclists.org/oss-sec/2016/q3/600
              thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key

              • 2 weeks ago
                Anonymous

                >yes remind us again about truecrypt?
                About what to do with Truecrypt? The fucking conspiracy theory based on schizo reading between lines and bad latin translation?
                >not even gonna mention prism
                Good, because it has absolutely zero to do with encryption.
                >or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
                The last three are a solid maybe, the first is a solid no unless you're on ARM and even then it's a solid maybe. The maybe hinges on what you mean by backdoor. If by backdoor you mean something that can read and influence state that isn't the CPU and which you can't audit or directly control then sure, but also your BIOS, the subcomponents of your CPU, all your firmware and any devices with DMA fit that description as well, but all of them require physical access to exploit most of the time, which would be gg no re for your CPU and RAM anyway.
                >nevermind the fact that we do know about the backdoor because of this
                >https://seclists.org/oss-sec/2016/q3/600
                That's not a backdoor you dumb fuck, it's detectable in the blob, limited to a single compiler toolchain that's rare as fuck and the result of a clearly honest mistake using a function that's prohibited in a single compiler that most devs have never touched. It was also closed within a few months of a private report of it - protip, read the actual related PR.
                >thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key
                I think that you don't understand what that bug did, because it isn't what you described.

              • 2 weeks ago
                Anonymous

                >he fucking conspiracy theory based on schizo reading between lines and bad latin translation?
                he literally and publicly said do not use it because they have a backdoor
                i think the ceo knows a bit better dont you think?
                >because it has absolutely zero to do with encryption.
                yes it does when you have backdoors at ring 0
                >solid
                no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
                > limited to a single compiler toolchain that's rare as fuck and the result of a clearly honest mistake
                honest mistake from a bug on the only part of the crypto++that can break the encryption?
                riiiiiiight
                >because it isn't what you described.
                check the github

              • 2 weeks ago
                Anonymous

                >he literally and publicly said do not use it because they have a backdoor
                >i think the ceo knows a bit better dont you think?
                The CEO never did that retard.
                >yes it does when you have backdoors at ring 0
                You're not getting closer to proving anything by giving yourself more things to prove.
                >no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
                You literally don't know what security rings are and are throwing around terms that out you as ignorant over and over again. The systems you're talking about are ring -3 (EL2 on ARM). They are not ring zero you fucking pleb.
                >honest mistake from a bug on the only part of the crypto++that can break the encryption?
                Read the CVE and read the github you pleb. The CVSS has ZERO ratings for confidentiality and integrity, and has a low availability rating. It doesn't create ANY risks of breaking crypto. Under an unlucky configuration you get a bluescreen that can't even be externally triggered. Under most configurations you get zero effect.
                >riiiiiiight
                You dumb fuck, your idea of a NSA backdoor is a fucking pointer mistake that can't leak plaintext, can't leak keys, can't cause an availability loss on demand but might cause a bluescreen if you're really unlucky. Congrats bro, you're retarded.
                >check the github
                You need to learn to fucking read git you dumb cunt. The change was committed to master on 10 Feb 16. Master became Release 5.6.4 on 12 Sep 16. The PR (306) that fixed it was merged on 25 Sep 16 and released as 5.6.5 on 11 Oct 16. The bug potentially caused a memory corruption that would lead to a BSOD if you were unlucky, and it's that luck factor that let it get through testing. Your idea of a hektik NSA backdoor that proves that AES-256 is completepy broken by both the Russians and Americans is a minor bug that only affected a program if compiled on a rare toolchain, only caused rare crashes, caused no leaks and was only released for 30 days. You are a retard.

              • 2 weeks ago
                Anonymous

                >The CEO never did that retard.
                watch the audit
                >Read the CVE and read the github you pleb.
                and remind us again anon where it stores the exchange again?
                what happens to your ram when your pc freezes ?
                oh yeah thats right...back then intelME dumped it into their cache which by design was encrypted on the fly
                the same cache we found out it was backdoored by nsa via intelME
                WHO KNEW!
                i guess it was a honest mistake too

              • 2 weeks ago
                Anonymous

                This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence then the entire elaborate procedure of crashing the computer to then extract the keys that the ME encrypted would be unecessary, since the ME could simply pluck the keys out of memory with a DMA leech attack or ask the CPU for them. The entire premise is feverishly retarded and just keeps looping back to the fact that you don't seem to have a grasp on the topic. The world in your head has a compromised and all powerful ring -3, but the malicious actor instead trying to launch attacks from user space by crashing programs with code that was immediately identified and fixed. And this fever dream combines with CEOs giving speeches that don't exist and trannies cracking Denuvo to prove that the Russians and Americans have real time AES backdoors. Just fucking stop man
                See a doctor, jesus.

              • 2 weeks ago
                Anonymous

                >This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence
                HELLOOOOO where do you live?

              • 2 weeks ago
                Anonymous

                My IP is 192.168.1.1. I bet you can't DDOS me.

              • 2 weeks ago
                Anonymous

                i just sent you a nasty surp-

              • 2 weeks ago
                Anonymous

                not him but you are literally wrong

                intelME is a backdoor there is no discussion about this it even revealed to have a custom made lynx version on it

              • 2 weeks ago
                Anonymous

                Hi anon! Re read that other anons post you replied too! Id really appreciate if you could understand his point about userland hacky crashes being pointless due to ime having -ring access to cpu ram etc etc. Have a good day 🙂

          • 2 weeks ago
            Anonymous

            >for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released
            There's literally a single person in the world capable of cracking denuvo v17 and it's a moderately insane and racist chud.

      • 2 weeks ago
        Anonymous

        Yes and its retarded

      • 2 weeks ago
        Anonymous

        Is it? Where is the source, you bloated clown?

        • 2 weeks ago
          Anonymous

          are you blind or retarded?

      • 2 weeks ago
        Anonymous

        And the britbong is fucking retarded you retard, which is surprising given cryptology has such history in the UK

        • 2 weeks ago
          Anonymous

          [...]
          AES-256 is quantum secure anyway, so your scifi portable quantum computers won't help.
          RUSI simply don't know what they're talking about

          With how absolutely retarded RUSI is on encryption and number of UAVs shot down, I have to doubt everything else they said

          It says
          >Rus EW is apparently
          >Apparently
          >You use apparently to indicate that the information you are giving is something that you have heard, but you are not certain that it is true.
          Settle down Internet incels...learn to read

          • 2 weeks ago
            Anonymous

            Maybe they should have used their brain first before making such assessments

          • 2 weeks ago
            Anonymous

            >ITT: retards who don't even read say the world's oldest military thinktank is retarded
            sigh

            >Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time.

            If the world's oldest military thinkthank is spreading rumors, I don't think I trust them anymore.

            • 2 weeks ago
              Anonymous

              >aaaaaa I'm not capable of handling shades of gray
              It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.

              • 2 weeks ago
                Anonymous

                >It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.

                Publishing this tells me they haven't run anything past experts in the field. How many other things are bullshit, but people don't have the insider knowledge to call out? How many other things are anecdotes that only happened once or twice?

            • 2 weeks ago
              Anonymous

              >AAAA I CAN'T DEAL WITH UNCERTAINTY
              that's life outside the basement
              live with it or become a shut-in

            • 2 weeks ago
              Anonymous

              Maybe they should have used their brain first before making such assessments

              Good job detectives, you managed to misread the article and post cope.

              • 2 weeks ago
                Anonymous

                >misread
                that would involve actually reading in the first place, which just about nobody ITT has

            • 2 weeks ago
              Anonymous

              no one cares what you think you daft moron

          • 2 weeks ago
            Anonymous

            [...]
            Good job detectives, you managed to misread the article and post cope.

            >Apparently

            I don't care how apparently they think it is, trying to decrypt AES 256-bit in real-time is an absolutely horseshit speculation unless they actually got the crystal skull from the 4th Indy movie to do the work. That or the Ukrainians need to work on those issues in their implementation

            >misread
            that would involve actually reading in the first place, which just about nobody ITT has

            I don't need to read the whole article to spot a shit-take already telling me everything I need to know.

            t. comp. e fag

            • 2 weeks ago
              Anonymous

              It's obviously the Ukrainians not using the Motorolla correctly.
              >Ukie gets AES 256
              >Uses it wrong, gets artyd
              >Explains to west Russia decrypted it in real time to save face
              >West has to take what they say at face value because we are the good guys

              If the rest of the gays in the thread actually read the report or at least searched the PDF, they would see the other paragraph on the matter.

              >Another function of Russian EW troops is interception and decryption of Ukrainian military
              communications. The Russian military is proving highly capable in this area. Ukrainian officers
              recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
              of an artillery strike based on Ukrainian troops calling in a fire mission.56 The Ukrainian troops
              were communicating with Motorola radios with 256-bit encryption, but it appeared that the
              Russians were able to capture and decrypt these transmissions in near real time. The most likely
              system for such functions is the Torn-MDM.57 When the Russians are not intercepting traffic,
              Ukrainian units note that they are reliably able to suppress the receivers on Motorola radios out
              to approximately 10 km beyond the FLET.58
              >Appeared
              >Apparently
              Notice the language RUSI is using to distance itself from the claim? Because they know either the claim is total bullshit but don't want to flat out call the Ukies liars or they suspect the radio was used incorrectly.

              • 2 weeks ago
                Anonymous

                The source for that claim wasn't Ukrainian though

              • 2 weeks ago
                Anonymous

                >Ukrainian officers
                recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
                of an artillery strike based on Ukrainian troops calling in a fire mission
                >Ukrainian officers
                recalled
                You're retarded

              • 2 weeks ago
                Anonymous

                They didn't say they decrypted it, they said "it seems like they figured us out". This is not the abject admission of cracking decryption, nor is it t"the US having to take it at face value". The "decryption was cracked" claim was from a Russian source in the same section

              • 2 weeks ago
                Anonymous

                >The "decryption was cracked" claim was from a Russian source in the same section
                what Russian source?!
                this is where NOT READING THE PAPER gets you: making shit up to justify your shit take

              • 2 weeks ago
                Anonymous

                I read it. They're interviews from ????

              • 2 weeks ago
                Anonymous

                Yeah. Not
                >a Russian source in the same section

                Way to totally make shit up, bro

              • 2 weeks ago
                Anonymous

                If you hear something you think is bullshit you're not obligated to actually post the questionable content. They're not a news organization reporting what's said they're a think tank supposed to actually judge the content for believability not couch their report on "hey I don't believe this crap I just read the news buddy"

              • 2 weeks ago
                Anonymous

                The fact thAT RUSI published these claims without checking with anybody that knows anything about encryption standards and how encryption keys are generated, stored and transmitted shows that they did not do due diligence. EW and general computer networks are really not well understood so the fact that a bunch of wargaming nerds do not have any idea of how they work is semi-understood but hiding behind "apparently" is completely unacceptable for a reputable source such as RUSI and brings all their previous works into doubt.
                The strength of an encryption standard does not rely on the standard itself but in the "keys" it generates. These keys are regularly changed and unless some sort of workaround to shorten the amount of bits that need to be cracked to crack the standard can be found, (WEP, DES) then the standard remains robust. There is no "enigma machine" to be found or broken that would crack the whole standard open. Every single key in use needs to be cracked individually to gain access to the encrypted data.
                Is it possible that Motorolla made some sort of mistake on their end? Yes. Is it possible that the Russians got their hands on a "hot" radio? Yes.
                The fact that RUSI jumped to the least possible answer and then published it is completely unacceptable. If Russians could crack 256 bit encryption in real time in the field then they could easily gain access to ALL the US classified information.

              • 2 weeks ago
                Anonymous

                If you hear something you think is bullshit you're not obligated to actually post the questionable content. They're not a news organization reporting what's said they're a think tank supposed to actually judge the content for believability not couch their report on "hey I don't believe this crap I just read the news buddy"

                Are you guys crying?

              • 2 weeks ago
                Anonymous

                >-t. non technical
                Social studies majors should be silent.

              • 2 weeks ago
                Anonymous

                Are you crying though? Seems like you typed your little heart out and no one cared lol

              • 2 weeks ago
                Anonymous

                NTA but you deserve to be shoved into a locker for this post

              • 2 weeks ago
                Anonymous

                >show off an uninformed cretin opinion online
                >get made fun of by people who know shit
                >"a-are you crying n-nerd?"
                Rope holds all the answers you require Anon.
                (I doubt you own a gun.)

                Yeah

              • 2 weeks ago
                Anonymous

                >show off an uninformed cretin opinion online
                >get made fun of by people who know shit
                >"a-are you crying n-nerd?"
                Rope holds all the answers you require Anon.
                (I doubt you own a gun.)

              • 2 weeks ago
                Anonymous

                I cri evrytim i talk to vatmorons like you

              • 2 weeks ago
                Anonymous

                Everything in your post is wrong as fuck. Ciphers matter, not just their key size. Ciphers (encryption methods) also don't generate keys at all, they just use them. RUSI said they broke 256 bit encryption in real time, not that they broke AES-256. The overwhelmingly most likely explanation is either that the Ukrainians were using the RC4 based stream cipher mode on their radios with a 256 bit key, and the Russians were breaking that in real time or that the Russians had access to the Ukrainian keys.

                Also AES is symmetric and the models in use only hold something like 16. Having even a single live key would let you read fuckloads, and if you had one you'd most likely have all of the ones in local use.

          • 2 weeks ago
            Anonymous

            >apparently
            Apparently means the opposite of "something we've heard". It means "it is apparent that", ie this explanation fits what has been observed.

            People who are educated don't use the colloquial meaning of words in academic or professional writing. They use the real meaning of the words.

          • 2 weeks ago
            Anonymous

            Apparently means "it would appear so"
            The word you're looking for is "reportedly"

      • 2 weeks ago
        Anonymous

        You said it you fuck

  3. 2 weeks ago
    Anonymous

    per month
    Also
    >9000+ ukrainian tanks destroyed
    >1000+ Bayraktars
    >68 HIMARS
    and other vatmoron cope

    • 2 weeks ago
      Anonymous

      this pic doesnt say 9000 tanks its tanks and amoured vehicles

      • 2 weeks ago
        Anonymous

        same thing

      • 2 weeks ago
        Anonymous

        which is still way more than ukraine has

      • 2 weeks ago
        Anonymous

        Initially, they wrote it as "tanks", but when the numbers turned out to be just idiotic, they shamefully removed both pages and drew these numbers. However, now it looks even dumber

    • 2 weeks ago
      Anonymous

      >RUSI are vatmorons
      shut the fuck up retard

      • 2 weeks ago
        Anonymous

        >Ria novosti
        You're complexly retarded.

    • 2 weeks ago
      Anonymous

      10000 per month is absolutely believable. Cheap and disposable anon

  4. 2 weeks ago
    Anonymous

    >deconflict
    Well, I learned a new word today

  5. 2 weeks ago
    Anonymous

    You do realize that if they had the technology to break live AES-256 crypto TX that the capability would 1: be everywhere or 2: be the most desired Russian export

    • 2 weeks ago
      Anonymous

      They don't know shit about fuck. They live in a fantasy world, not understanding what cryptography is, beyond thinking that it's some magic that Russian wizards can overcome.

    • 2 weeks ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      >Oh shit sorry guys we were actually using a 256-bit WEP implementation from 2003.
      that'd be really funny

      • 2 weeks ago
        Anonymous

        >https://www.motorolasolutions.com/en_us/products/two-way-radios/project-25-radios/portable-radios/srx2200.html
        >Wi-Fi enabled
        Christ this would be the funniest shit.
        >The fuck is a WPA3? Set that shit to WEP it's uncrackable.

        • 2 weeks ago
          Anonymous

          Nyet, we're going to WPA. Untraceable by Kismet, uncrackable by hashcat

      • 2 weeks ago
        Anonymous

        >Ukrainian UAV losses remain at approximately 10,000 per month
        Am I misunderstanding this or is this a typo? I'd have a hard time believing they're losing even 1,000 a month. Do they realize how many fucking drones 10,000 a month is?

        lmao

        • 2 weeks ago
          Anonymous

          10,000 drones per month = $20,000,000, really not that unbelievable if they are mainly consuming DIY kits and cheap consumer drones

        • 2 weeks ago
          Anonymous

          Watch Perun's video about drones, and read the interview with that ukie commander. The typical consumer-grade quadcopter lifespan is about 3-5 sorties in frontline duty. They are expendable, like ammunition.

    • 2 weeks ago
      Anonymous

      I would neither trust nor discredit their capabilities. The only way to answer an encryption threat is with better encryption.

    • 2 weeks ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      [...]
      >Oh shit sorry guys we were actually using a 256-bit WEP implementation from 2003.
      that'd be really funny

      >https://www.motorolasolutions.com/en_us/products/two-way-radios/project-25-radios/portable-radios/srx2200.html
      >Wi-Fi enabled
      Christ this would be the funniest shit.
      >The fuck is a WPA3? Set that shit to WEP it's uncrackable.

      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

    • 2 weeks ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      >defeat 256 bit crypto
      >via bruteforce attack
      >in real time
      >when the key is going to change on a set interval making the bruteforce window absolutely minuscule
      >when the message isn't even plaintext and is likely split
      most attacks on crypto involve circumventing the crypto entirely
      in fact the radio firmware is often
      >accidentally
      left with these vulnerabilities to interception at key points and never fixed even though the manufacturer is aware of them.

      guess that's what happens when you insist on leaving a backdoor open for your own snooping but forget it's a universal backdoor now used by russia and china

      • 2 weeks ago
        Anonymous

        Should throw some programmers at it and flash tge software

      • 2 weeks ago
        Anonymous

        >guess that's what happens when you insist on leaving a backdoor open for your own snooping
        The NSA insisting on adding backdoors to shit that absolutely shouldn't have them is one of the bigger self-owns of the burger intel community.

    • 2 weeks ago
      Anonymous

      Are you retarded? If Russians could break encryption like that it would have more impact on the world than this whole war.

      > break
      Wrong. Article does never mention breaking of encryption. What it mentions is decryption, which would assume a key management issue.

      Keys could be leaked, stolen or simply mismanaged - sent over unencrypted channels.

  6. 2 weeks ago
    Anonymous

    On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

    • 2 weeks ago
      Anonymous

      [...]
      [...]
      [...]
      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

      AES-256 is quantum secure anyway, so your scifi portable quantum computers won't help.
      RUSI simply don't know what they're talking about

  7. 2 weeks ago
    Anonymous

    If you're a Russian scientist who can break encryption in linear time, you just broke the whole class of NP-hard problems wide open
    RIP all cryptography

  8. 2 weeks ago
    Anonymous

    I'm not sure about the real-time decryption of Motorolas, but when we operate we assume our comms are intercepted and will be decrypted eventually. Even when we use Harris radios. Harris also has a much better range of transmission (motorolas are usually useless past 1-1.5km), but it is bulky and inconvenient

  9. 2 weeks ago
    Anonymous

    >10k UAVs a month
    There would be no UAVs left with such attrition rate. Absolutely preposterous.

    • 2 weeks ago
      Anonymous

      Even if they count mavics and fpv drones it's not even close to be realistic

  10. 2 weeks ago
    Anonymous

    Russians were world leaders in hacking until recently when China poached all their top talent.

    • 2 weeks ago
      Anonymous

      NSA Equation Group have been top dog hackers for a while
      Dictator memehackers literally eat their scraps (eternalblue exploit) to pull shit off

  11. 2 weeks ago
    Anonymous

    I think they're talking about radios with the P25 encryption standard, which is mandated to be AES 256.

    https://www.dhs.gov/sites/default/files/publications/P25-CAB-ENC_REQ-508_0.pdf

    • 2 weeks ago
      Anonymous

      P25 mandates that AES-256 is included, not that it's the only available encryption mode. See

      [...]
      [...]
      [...]
      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

      for the modes the radios support.

  12. 2 weeks ago
    Anonymous

    > break 256 bit encryption in real-time

    Instantly discarded

    • 2 weeks ago
      Anonymous

      But the 80 year old professor leading the think tank said so, surely he would know.

  13. 2 weeks ago
    Anonymous

    Russians obviously do not have a general purpose 256-bit AES crack on hand, but there's any number of implementation or procedural mistakes that may allow them to be decoded. Recording some 25kHz bandwidth VHF/UHF signals is completely trivial and it can then be sent off for offline cryptanalysis.
    The UAV loss figure I'm curious about, there's some hundreds of thousands of ukie troops deployed, 10k UAV losses would be 1 UAV lost per month per 10-30 soldiers? It could very well be in the ballpark, but it depends on how ubiquitous drones are within the ukie army structure, if every 10 man squad has a quadcopter then they are obviously losing them as well.

    • 2 weeks ago
      Anonymous

      I think most squad sized elements operate with a UAV and I read a figure that the life expectancy of a UAV is a couple of weeks max

    • 2 weeks ago
      Anonymous

      anon, you're retarded, either kys or get on some gov support program
      they imply russian have means to crack one in > 1.1579209e+77
      > fucking
      > keys
      it's eternity on modern cpus

      • 2 weeks ago
        Anonymous

        > implementation or procedural mistakes that may allow them to be decoded
        That anon means mistakes like:
        > key generation is flawed and don't actually provide 256 bits of entropy
        > key distribution is flawed so the key gets stolen through a sidechannel
        > protocol implementation is flawed, so falls back to an insecure algorithm
        > AES was correctly implemented, but some other part of the scheme like block chaining has a bug

        AES256 is an impenetrable door for now. But in a flawed system, you can attack the hinges or dig under it.

        • 2 weeks ago
          Anonymous

          Thank you anon. There are also general RF fuckups, albeit I don't expect these from a Motorola product, ditto for some chinese wares though, e.g., microphone incidentally modulates transmission, summing AM voice over encrypted data comms. Then there's the concerns whether the key exchange is safe and that keys are utilized correctly seeing that Russians definitely capture 'hot' radios every now and then.
          We will not know about the EW effectiveness until after the war, if even then, and it will likely be in the form of testimonies and the like.

    • 2 weeks ago
      Anonymous

      Anon you're genuinely retarded on both points.

  14. 2 weeks ago
    Anonymous

    >On more than one occasion Ukrainian soldiers report that disposable infantry have been shot from Russian positions when attempting to retreat
    never change, pidors

  15. 2 weeks ago
    Anonymous

    >The patterns of fire are being described as

    >‘Nomadic Cannon’
    >harassing fire, delivered from mobile firing points, often to draw counterbattery fire or conduct artillery raids

    >‘Fiery Carousel’
    >a means of maintaining survivability while sustaining barrage

    >‘Roaming Platoon’
    >manoeuvring guns maximising the weight of
    salvo deliverable against a target

    >‘Umbrella Cover’
    >essentially a means of suppression
    kino names

    >Gun positions are no longer dug. Instead, a battery will conceal itself in a woodblock and move to a firing position where ammunition will have been placed for a defined salvo. It will then move to the next. If fixed by counterbattery fire, operators tend to leave their guns and seek cover, only returning to them when it is safe to do so.
    they're learning

  16. 2 weeks ago
    Anonymous

    >Along with the successful interception of most high-speed anti-radiation missiles (HARMs) fired by Ukrainian aircraft, the Russian air defence network is now assessed to be achieving a significant number of intercepts against GMLRS munitions
    oh no HIMARSbros

    >The longest-known shoot-down against Ukrainian aircraft was at 150 km when the aircraft was flying lower than 50 feet. This appears to have been cued by a 48Ya6 ‘Podlet-K1’ all-altitude radar with the air defence missile achieving a post-apex lock on the target
    okay that's actually pretty impressive

    >The strength of the air defence network is bolstered by persistent combat air patrols at medium altitude by Russian Su-35Ss
    >According to the Ukrainian Air Force, the longest-range recorded kill by a Russian R-37 was at 177 km
    Mig31s BTFO

    >There are believed to be eight Russian
    Mi-17s with EW suites operating in southern Ukraine. These are being utilised to some effect
    for the purposes of electronic attack against Ukrainian command and control, and through their altitude are able to do so in greater depth than is achievable by comparable systems based on the ground
    only six now

  17. 2 weeks ago
    Anonymous

    With how absolutely retarded RUSI is on encryption and number of UAVs shot down, I have to doubt everything else they said

  18. 2 weeks ago
    Anonymous

    Let him rest in peace

  19. 2 weeks ago
    Anonymous

    And Russians love to get butthurt when we call them liars, absolute retarded shit

  20. 2 weeks ago
    Anonymous

    russian flavor of the month wunderwaffe are getting boring, yawn

  21. 2 weeks ago
    Anonymous

    >ITT: retards who don't even read say the world's oldest military thinktank is retarded
    sigh

    >Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time.

    • 2 weeks ago
      Anonymous

      It is more feasible that they fluked or someone broke opsec than they decoded anything.

    • 2 weeks ago
      Anonymous

      someone forgot to turn the encryption on.

    • 2 weeks ago
      Anonymous

      no amount of coping will change the fact that realtime cracking of AES-256 is impossible at the moment.
      RUSI is flat out wrong in their statement that it was "cracked". snooped an accidental plaintext transmission, maybe. Pozzians got hold of a hot radio and Ukrainians never bothered to rotate the keys? perhaps. saying that AES-256 was "cracked" is the digital equivalent of a reputable publication saying "military-style rifle with high capacity clips". it destroys the credibility of the statement because it displays a fundamental lack of knowledge about the subject.

      • 2 weeks ago
        Anonymous

        Unless Russians use quantum computing. That would crack AES256 in real time.
        thinkingemoji.jpg

        • 2 weeks ago
          Anonymous

          AES256 is quantum safe

      • 2 weeks ago
        Anonymous

        >saying that AES-256 was "cracked"
        except they never said that, shit for brains

        The idea that they had broken encryption would imply that Russia has accelerated the development of Quantum computing to a scale not actually possible yet.
        RUSI also has not verification of that UAV number, making it suspect where they are getting their info from.

        >making it suspect where they are getting their info from
        you'd know if you'd READ THE FUCKING PAPER

        • 2 weeks ago
          Anonymous

          >bruh just believe russian propaganda ok?

    • 2 weeks ago
      Anonymous

      The idea that they had broken encryption would imply that Russia has accelerated the development of Quantum computing to a scale not actually possible yet.
      RUSI also has not verification of that UAV number, making it suspect where they are getting their info from.

  22. 2 weeks ago
    Anonymous

    Russian EW is understated. HIMARS stopped being effective once they employed EW countermeasures to throw its guidance off before impact. One of the more competent areas they have.

    • 2 weeks ago
      Anonymous

      They just lost 10 T-90S in fucking Donetsk to HIMARS

      • 2 weeks ago
        Anonymous

        According to who, Ukrainian MoD? Western rags like CNN?

        • 2 weeks ago
          Anonymous

          >quoting unnamed officer stating Russia intercepts all HARM and HIMARS rockets
          >good
          >quoting unnamed officer stating Russia lost 10 T-90 tanks to HIMARS
          >bad
          Hmmm

          • 2 weeks ago
            Anonymous

            There's actual proof of Russia reducing HIMARS effectiveness unlike your fantasy scenario of losing 10 T-90s to HIMARS

            • 2 weeks ago
              Anonymous

              May I see it?

              • 2 weeks ago
                Anonymous

                https://eurasiantimes.com/us-admits-russias-on-point-jamming-has-made-life-miserable/

              • 2 weeks ago
                Anonymous

                You're literally quoting "an anonymous source told cnn" and the only official word on it is that it's a constant cat and mouse game, which is well understood even by smooth brains like yourself. Do you even read past the headline from your preferred propsource?

              • 2 weeks ago
                Anonymous

                >eurasian times
                >anonymous sources
                Yea

            • 2 weeks ago
              Anonymous

              HIMARS effectiveness can be reduced via GPS interference.

              • 2 weeks ago
                Anonymous

                It has backup inertial guidance though it would technically degrade its performance

    • 2 weeks ago
      Anonymous

      >lol nope I'm not gonna read the report

      • 2 weeks ago
        Anonymous

        Delusional

    • 2 weeks ago
      Anonymous

      >understated
      I'd say it's probably the only thing they had that wasn't overstated. Russian ew has always been taken seriously. It also happens to be one of the only areas in which it was warranted

  23. 2 weeks ago
    Anonymous

    What the fuck happened to RUSI? I thought they were good and enjoyed reading their previous take on Russian intelligence operations but now I have to take all their prior materials with a MASSIVE dose of salt. All their ""evidence"" of their wild claims that Ukraine is losing 10000 drones a month and Russia has managed to crack AES 256bit with magical Banan technology comes soleley from interviews with no actual solid evidence whatsoever.

    • 2 weeks ago
      Anonymous

      Source: random Slav in Ukraine that did not finish high school

  24. 2 weeks ago
    Anonymous

    are those radios by chance made bya chinise owned company that is using "motorola" name? (similar as with lenovo producing IBM thinkpads and so on?

    • 2 weeks ago
      Anonymous

      Motorola is owned by a taiwanese company now and for awhile. Google bought up all of their patents before selling the name to the company in question, however

  25. 2 weeks ago
    Anonymous

    AES256 is mathematically proven, but translating proven math into real code ran on real computers, especially when doing bare metal embedded is hard and error prone. Its perfectly reasonable that Russia has found exploitable errors in implementation. Unfortunately many software and hardware vendors have a 'locks keep honest people honest' view of security and aren't really trying to verify that the implementation holds up to scrutiny.

    • 2 weeks ago
      Anonymous

      That's next level hopium

  26. 2 weeks ago
    Anonymous

    >10k UAVs a month

  27. 2 weeks ago
    Anonymous

    The source is that some Russians moved out of a position before they were going to be hit with artillery barrage.
    It could literally just be coincidence.

  28. 2 weeks ago
    implessive

    China cracked 128bit encryption years ago, 256bit is just the next step

    • 2 weeks ago
      Anonymous

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. morons know fuck about shit and then parrot dumb opinions on the internet

    • 2 weeks ago
      Anonymous

      https://i.imgur.com/Y1kMhFs.jpg

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. morons know fuck about shit and then parrot dumb opinions on the internet

      The key space is only one variable in the schema, and the Chinese haven't broken AES-128.

      You

      https://i.imgur.com/Y1kMhFs.jpg

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. morons know fuck about shit and then parrot dumb opinions on the internet

      in particular need to stop pretending that you have a technical education relevant to crypto because you clearly don't. Going from 128 to 256 AES is not a squaring of the entropy, it's a raising to the 128th power, ie squaring 128 times.

  29. 2 weeks ago
    Anonymous

    Another possibility regarding the Russians being able to bypass the AES256 encryption in real time is that they simply hacked Motorola's systems, stole the code for the firmware used on the radios and managed to find vulnerabilities within it that would enable them to listen in it Ukrainian comms without having to worry about the encryption at all.

  30. 2 weeks ago
    Anonymous

    [...]

    >butthurts ESL East Euro morons.
    Stuttering a bit there, rajesh. Try to be less obvious next time you shill for russia.

  31. 2 weeks ago
    Anonymous

    [...]

    • 2 weeks ago
      Anonymous

      >this is the guy calling you a hohol shill online
      Suddenly I don't even feel so bad being associated with cringy NAFO chuds.

    • 2 weeks ago
      Anonymous

      >Me before the internet: How the hell did 1600 British civil servants manage to control the whole of India?
      >Me after the internet: Why did it take as many as 1600 British civil servants to control India?

  32. 2 weeks ago
    Anonymous

    crypto is hard bros

  33. 2 weeks ago
    Anonymous

    I thought Motorolas use AES-256?
    Or is this some NSA export gimped AES-256?

    • 2 weeks ago
      Anonymous

      the fact that everyone ITT thinks bruteforcing 256 is is the ONLY way to decrypt signals is precisely why side-channel attacks are so successful

  34. 2 weeks ago
    Anonymous

    Both the authors of this piece have backgrounds in the arts and humanities. In the report the claim is unsupported.

    It appears to come from "Ukrainian field notes", which I find somewhat unreliable particularly in this area. Soldiers are very understandably not necessarily the most reliable people when they say shit like "they knew we were coming" or "how did they know". I suspect the most likely way decrypting this in real time is to have a spy who fucking texts you the information. If not just a few coincidences or misunderstandings.

  35. 2 weeks ago
    Anonymous

    >rusi
    >when they keep being wrong about things that are verifiable with OSINT
    >when they claimed that russia hasn't used s300 in ground attack
    >claimed Ukraine wasnt using harms at all and was stockpiling them

    Being in a think tank is the easiest fucking job. I'd love to have a high paying gig where I can be even more inaccurate than snopes and get 6 figures.

    • 2 weeks ago
      Anonymous

      Don’t forget when they dismissed the ability for Ukraine to regain Kherson in 2022.
      People need to understand that Think tanks are not impervious to making mistakes, no matter how “old” they are. They are information aggregates that make best-guess opinions based off what they’ve seen.

      • 2 weeks ago
        Anonymous

        Yeah, but we're allowed to notice when they're wrong and ask for some accountability, right?

        • 2 weeks ago
          Anonymous

          what more accountability do you want, when they have already stated their methodology and reasoning? in fact they are the most conscientious in this regard; most other OSINT commentators and analysts don't dwell much on the sources of their data

          >rusi
          >when they keep being wrong about things that are verifiable with OSINT
          >when they claimed that russia hasn't used s300 in ground attack
          >claimed Ukraine wasnt using harms at all and was stockpiling them

          Being in a think tank is the easiest fucking job. I'd love to have a high paying gig where I can be even more inaccurate than snopes and get 6 figures.

          >when they claimed that russia hasn't used s300 in ground attack
          >claimed Ukraine wasnt using harms at all and was stockpiling them
          when did they say that

          • 2 weeks ago
            Anonymous

            >Russia can crack 256 bit encryption
            They never said that, but every 4chud wanted to show off they grok encryption
            >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
            They never said that either, just that T55s are dangerous enough when used as SPGs and IFVs
            which is not wrong since the Ukrainians are doing the same with the M55s
            >Russia is destroying 10k drones per month!
            They did say this, but probably this refers to handheld drones of the DJI type, which they previously reported do have high attrition rates

            Tryhard vatnick esl. How boring.

  36. 2 weeks ago
    Anonymous

    Ok, what the hell is happening with RUSI now? In a short timeframe we had:
    >Russia can crack 256 bit encryption
    >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
    >Russia is destroying 10k drones per month!

    • 2 weeks ago
      Anonymous

      >Russia can crack 256 bit encryption
      They never said that, but every 4chud wanted to show off they grok encryption
      >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
      They never said that either, just that T55s are dangerous enough when used as SPGs and IFVs
      which is not wrong since the Ukrainians are doing the same with the M55s
      >Russia is destroying 10k drones per month!
      They did say this, but probably this refers to handheld drones of the DJI type, which they previously reported do have high attrition rates

  37. 2 weeks ago
    Anonymous

    Just curious, why doesn't Ukraine actively target the UAV jammers? I don't think it would even be hard -- set up a recon drone with a couple of antennas on a wide beam strapped under the UAV, and use differential signal strength through a couple of op amps to guide it straight to the jammer antenna. Take video the whole way. UAV then flies back using inertial and magnetic guidance, and calls in the artillery.

    "We can blow up your fucking jammers faster than you can buy them from China."

  38. 2 weeks ago
    Anonymous

    >Rusmoron(i)
    No, thank you.

  39. 2 weeks ago
    Anonymous

    >vatniks breaking 256 AES
    somehow I doubt it

  40. 2 weeks ago
    Anonymous

    why do I keep reading EW as early warning

  41. 2 weeks ago
    Anonymous

    >russians can real-time break 256bit encryption
    yeah no, if they could do that they wouldn't need to invade ukraine - they could simply hack every bank in the world or make trillions selling their super-duper-quantum computers.

    • 2 weeks ago
      Anonymous

      The bongs have just worded that in a stupid way.

      Russians are not brute-forcing the keys, they more likely found bugs in the million lines of Pajeetware running on those radios and/or their key management system.

  42. 2 weeks ago
    Anonymous

    Lots of retards in this thread who have no idea what they are talking about so let me explain how this industry fucking works.

    So you have a cryptographic primitive designed by very smart people in Europe. This becomes the Advanced Encryption Standard (AES). This has been widely analysed for decades by the best minds in cryptography research, and is widely believed to be very secure.

    Now you take that and put it into a PRODUCT. That's where product managers, in this industry, jarheads who got a MBA degree, enter the picture. They take the very secure primitives and sell products that add TONS AND TONS AND TONS of features on top of it, because features is what you can sell to the police departments, militaries and whoever buys those things. Now those guys don't really know about that shit either, they just know that AES is the secure standard of the US government and it says it has AES inside, so they trust it.

    Now, our MBA/jarhead product manager has sold yet another version of the product with super fancy functions to upgrade the keys over the air, rotate them and what not. There is a super fancy web GUI because you need to sell a cool product. Who writes that? Pajeets. Pajeets with green cards and security clearances. Because who else is going to write that code? MIT grads? No those guys work in banks or Google, not for fucking Motorola.

    In Russia it's different. The top grads of Russian universities don't work for FAGMAN companies because outside of Yandex and a few others, this just doesn't exist. So many of their top mathematicians and coders work for defense.

    They get brought radios captured, or in fact literally just buy them from brand new from a dealer, and reverse engineer them.
    No, they can't fucking crack AES. But they will methodically analyse the millions of lines of code written by Pajeets and find a bunch of vulnerabilities. And from there the sky is the limit. Maybe the rekeying protocol is badly designed and leaks sequences... (1/)

    • 2 weeks ago
      Anonymous

      ... leaks sequences in the protocol that can be identified. You can then jam the fuck out of the packet containing the response, meaning you prevent the device from rekeying (so it keeps the same key that is on one unit you have captured).

      This is just a stupid example and it's most likely not the exact method they have used, but you get the idea.

      Cryptosystems don't get broken because of the encryption primitives (although many ones believed to be secure turned out to be completely flawed: RC4, MD5, etc.)
      They get broken because the implementation is retarded and there is a 50 IQ point differential between the people who designed the crypto primitive and the PM/coders who wrote all the shit around it.

      • 2 weeks ago
        Anonymous

        there's unironically a shit load of pajeets who work at Motorolla

        • 2 weeks ago
          Anonymous

          I wonder how many companies have to go under until Americans finally stop hiring Indians.

    • 2 weeks ago
      Anonymous

      >So many of their top mathematicians and coders work for defense.
      They don't.
      A few idealists and austists do, but the vast majority just leave the country or work for western companies from Russia.
      Because the west pays you $2-5k per month, while the Russian government pays you $300-1000 on some months.

Your email address will not be published. Required fields are marked *