Motorolasisters...

https://rusi.org/explore-our-research/publications/special-resources/meatgrinder-russian-tactics-second-year-its-invasion-ukraine

250 Piece Survival Gear First Aid Kit

LifeStraw Water Filter for Hiking and Preparedness

250 Piece Survival Gear First Aid Kit

  1. 10 months ago
    Anonymous

    Russians killed Motorola?

    • 10 months ago
      Anonymous

      i think we'll know on monday when the stock market opens wtf happened with the motorolla radios.

      if motorolla stock tanks, then smart hedge fund israelites know that motorolla radios actually got cracked

  2. 10 months ago
    Anonymous

    >believing that Russians have functioning technology
    kek, you have been absolutely mindbroken by vatnik psyops

    • 10 months ago
      Anonymous

      You do realize that if they had the technology to break live AES-256 crypto TX that the capability would 1: be everywhere or 2: be the most desired Russian export

      They don't know shit about frick. They live in a fantasy world, not understanding what cryptography is, beyond thinking that it's some magic that Russian wizards can overcome.

      Can you read? It's not me saying but this britbong think tank

      • 10 months ago
        Anonymous

        Are you moronic? If Russians could break encryption like that it would have more impact on the world than this whole war.

        • 10 months ago
          Anonymous

          first of all we dont know the details of the mainframe behind their EW systems
          second of all there are 10.000 combinations if its a 4 digit 80.000 combinations if its 8 and 120.000 combinations if its 9(max input for srx) and since they do not have letters or special types/slx the job is relatively easy
          plus we know for a fact that nsa had a backdoor on drgb and this means that most surely a backdoor exist in aes too
          do the russians know about it? for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released

          • 10 months ago
            Anonymous

            you're certifiably moronic

          • 10 months ago
            Anonymous

            The best known attack with available plaintext only reduces the keyspace to 254.3. The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department. The idea that the Russians have the backdoor because they can crack Denuvo, and don't use the capability to compromise half the world's IT systems, is pretty wild stuff.

            • 10 months ago
              Anonymous

              >The idea that there's a NSA backdoor is pretty whack given that it was invented in Belgium and approved by the Canadians and a non-NSA department.

              yes remind us again about truecrypt?
              not even gonna mention prism
              or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
              nevermind the fact that we do know about the backdoor because of this
              https://seclists.org/oss-sec/2016/q3/600
              thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key

              • 10 months ago
                Anonymous

                >yes remind us again about truecrypt?
                About what to do with Truecrypt? The fricking conspiracy theory based on schizo reading between lines and bad latin translation?
                >not even gonna mention prism
                Good, because it has absolutely zero to do with encryption.
                >or the fact that we know now that every cpu has a backdoor through tpm/intelME/psp/arm64
                The last three are a solid maybe, the first is a solid no unless you're on ARM and even then it's a solid maybe. The maybe hinges on what you mean by backdoor. If by backdoor you mean something that can read and influence state that isn't the CPU and which you can't audit or directly control then sure, but also your BIOS, the subcomponents of your CPU, all your firmware and any devices with DMA fit that description as well, but all of them require physical access to exploit most of the time, which would be gg no re for your CPU and RAM anyway.
                >nevermind the fact that we do know about the backdoor because of this
                >https://seclists.org/oss-sec/2016/q3/600
                That's not a backdoor you dumb frick, it's detectable in the blob, limited to a single compiler toolchain that's rare as frick and the result of a clearly honest mistake using a function that's prohibited in a single compiler that most devs have never touched. It was also closed within a few months of a private report of it - protip, read the actual related PR.
                >thats a very well placed bug on the deciphering process dont you think?being able to crash the encryption process by obfuscating a random key
                I think that you don't understand what that bug did, because it isn't what you described.

              • 10 months ago
                Anonymous

                >he fricking conspiracy theory based on schizo reading between lines and bad latin translation?
                he literally and publicly said do not use it because they have a backdoor
                i think the ceo knows a bit better dont you think?
                >because it has absolutely zero to do with encryption.
                yes it does when you have backdoors at ring 0
                >solid
                no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
                > limited to a single compiler toolchain that's rare as frick and the result of a clearly honest mistake
                honest mistake from a bug on the only part of the crypto++that can break the encryption?
                riiiiiiight
                >because it isn't what you described.
                check the github

              • 10 months ago
                Anonymous

                >he literally and publicly said do not use it because they have a backdoor
                >i think the ceo knows a bit better dont you think?
                The CEO never did that moron.
                >yes it does when you have backdoors at ring 0
                You're not getting closer to proving anything by giving yourself more things to prove.
                >no black box can be called "solid" when their purpose is to launch ring 0 with literal audit on a webpage
                You literally don't know what security rings are and are throwing around terms that out you as ignorant over and over again. The systems you're talking about are ring -3 (EL2 on ARM). They are not ring zero you fricking pleb.
                >honest mistake from a bug on the only part of the crypto++that can break the encryption?
                Read the CVE and read the github you pleb. The CVSS has ZERO ratings for confidentiality and integrity, and has a low availability rating. It doesn't create ANY risks of breaking crypto. Under an unlucky configuration you get a bluescreen that can't even be externally triggered. Under most configurations you get zero effect.
                >riiiiiiight
                You dumb frick, your idea of a NSA backdoor is a fricking pointer mistake that can't leak plaintext, can't leak keys, can't cause an availability loss on demand but might cause a bluescreen if you're really unlucky. Congrats bro, you're moronic.
                >check the github
                You need to learn to fricking read git you dumb c**t. The change was committed to master on 10 Feb 16. Master became Release 5.6.4 on 12 Sep 16. The PR (306) that fixed it was merged on 25 Sep 16 and released as 5.6.5 on 11 Oct 16. The bug potentially caused a memory corruption that would lead to a BSOD if you were unlucky, and it's that luck factor that let it get through testing. Your idea of a hektik NSA backdoor that proves that AES-256 is completepy broken by both the Russians and Americans is a minor bug that only affected a program if compiled on a rare toolchain, only caused rare crashes, caused no leaks and was only released for 30 days. You are a moron.

              • 10 months ago
                Anonymous

                >The CEO never did that moron.
                watch the audit
                >Read the CVE and read the github you pleb.
                and remind us again anon where it stores the exchange again?
                what happens to your ram when your pc freezes ?
                oh yeah thats right...back then intelME dumped it into their cache which by design was encrypted on the fly
                the same cache we found out it was backdoored by nsa via intelME
                WHO KNEW!
                i guess it was a honest mistake too

              • 10 months ago
                Anonymous

                This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence then the entire elaborate procedure of crashing the computer to then extract the keys that the ME encrypted would be unecessary, since the ME could simply pluck the keys out of memory with a DMA leech attack or ask the CPU for them. The entire premise is feverishly moronic and just keeps looping back to the fact that you don't seem to have a grasp on the topic. The world in your head has a compromised and all powerful ring -3, but the malicious actor instead trying to launch attacks from user space by crashing programs with code that was immediately identified and fixed. And this fever dream combines with CEOs giving speeches that don't exist and trannies cracking Denuvo to prove that the Russians and Americans have real time AES backdoors. Just fricking stop man
                See a doctor, jesus.

              • 10 months ago
                Anonymous

                >This is literally schizo ramblings. If the ME had the backdoor that you've speculated into existence
                HELLOOOOO where do you live?

              • 10 months ago
                Anonymous

                My IP is 192.168.1.1. I bet you can't DDOS me.

              • 10 months ago
                Anonymous

                i just sent you a nasty surp-

              • 10 months ago
                Anonymous

                not him but you are literally wrong

                intelME is a backdoor there is no discussion about this it even revealed to have a custom made lynx version on it

              • 10 months ago
                Anonymous

                Hi anon! Re read that other anons post you replied too! Id really appreciate if you could understand his point about userland hacky crashes being pointless due to ime having -ring access to cpu ram etc etc. Have a good day 🙂

          • 10 months ago
            Anonymous

            >for sure given that denuvo that uses aes 256 is getting assraped by the russians every single time a new game gets released
            There's literally a single person in the world capable of cracking denuvo v17 and it's a moderately insane and racist troony.

      • 10 months ago
        Anonymous

        Yes and its moronic

      • 10 months ago
        Anonymous

        Is it? Where is the source, you bloated clown?

        • 10 months ago
          Anonymous

          are you blind or moronic?

      • 10 months ago
        Anonymous

        And the britbong is fricking moronic you moron, which is surprising given cryptology has such history in the UK

        • 10 months ago
          Anonymous

          [...]
          AES-256 is quantum secure anyway, so your scifi portable quantum computers won't help.
          RUSI simply don't know what they're talking about

          With how absolutely moronic RUSI is on encryption and number of UAVs shot down, I have to doubt everything else they said

          It says
          >Rus EW is apparently
          >Apparently
          >You use apparently to indicate that the information you are giving is something that you have heard, but you are not certain that it is true.
          Settle down Internet incels...learn to read

          • 10 months ago
            Anonymous

            Maybe they should have used their brain first before making such assessments

          • 10 months ago
            Anonymous

            >ITT: morons who don't even read say the world's oldest military thinktank is moronic
            sigh

            >Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time.

            If the world's oldest military thinkthank is spreading rumors, I don't think I trust them anymore.

            • 10 months ago
              Anonymous

              >aaaaaa I'm not capable of handling shades of gray
              It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.

              • 10 months ago
                Anonymous

                >It's almost as if you should use your judgement to gauge when, what, and how good any given source is for any specific topic.

                Publishing this tells me they haven't run anything past experts in the field. How many other things are bullshit, but people don't have the insider knowledge to call out? How many other things are anecdotes that only happened once or twice?

            • 10 months ago
              Anonymous

              >AAAA I CAN'T DEAL WITH UNCERTAINTY
              that's life outside the basement
              live with it or become a shut-in

            • 10 months ago
              Anonymous

              Maybe they should have used their brain first before making such assessments

              Good job detectives, you managed to misread the article and post cope.

              • 10 months ago
                Anonymous

                >misread
                that would involve actually reading in the first place, which just about nobody ITT has

            • 10 months ago
              Anonymous

              no one cares what you think you daft little b***h

          • 10 months ago
            Anonymous

            [...]
            Good job detectives, you managed to misread the article and post cope.

            >Apparently

            I don't care how apparently they think it is, trying to decrypt AES 256-bit in real-time is an absolutely horseshit speculation unless they actually got the crystal skull from the 4th Indy movie to do the work. That or the Ukrainians need to work on those issues in their implementation

            >misread
            that would involve actually reading in the first place, which just about nobody ITT has

            I don't need to read the whole article to spot a shit-take already telling me everything I need to know.

            t. comp. e gay

            • 10 months ago
              Anonymous

              It's obviously the Ukrainians not using the Motorolla correctly.
              >Ukie gets AES 256
              >Uses it wrong, gets artyd
              >Explains to west Russia decrypted it in real time to save face
              >West has to take what they say at face value because we are the good guys

              If the rest of the homosexuals in the thread actually read the report or at least searched the PDF, they would see the other paragraph on the matter.

              >Another function of Russian EW troops is interception and decryption of Ukrainian military
              communications. The Russian military is proving highly capable in this area. Ukrainian officers
              recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
              of an artillery strike based on Ukrainian troops calling in a fire mission.56 The Ukrainian troops
              were communicating with Motorola radios with 256-bit encryption, but it appeared that the
              Russians were able to capture and decrypt these transmissions in near real time. The most likely
              system for such functions is the Torn-MDM.57 When the Russians are not intercepting traffic,
              Ukrainian units note that they are reliably able to suppress the receivers on Motorola radios out
              to approximately 10 km beyond the FLET.58
              >Appeared
              >Apparently
              Notice the language RUSI is using to distance itself from the claim? Because they know either the claim is total bullshit but don't want to flat out call the Ukies liars or they suspect the radio was used incorrectly.

              • 10 months ago
                Anonymous

                The source for that claim wasn't Ukrainian though

              • 10 months ago
                Anonymous

                >Ukrainian officers
                recalled one incident in which the Russian headquarters gave pre-emptive warning to its units
                of an artillery strike based on Ukrainian troops calling in a fire mission
                >Ukrainian officers
                recalled
                You're moronic

              • 10 months ago
                Anonymous

                They didn't say they decrypted it, they said "it seems like they figured us out". This is not the abject admission of cracking decryption, nor is it t"the US having to take it at face value". The "decryption was cracked" claim was from a Russian source in the same section

              • 10 months ago
                Anonymous

                >The "decryption was cracked" claim was from a Russian source in the same section
                what Russian source?!
                this is where NOT READING THE PAPER gets you: making shit up to justify your shit take

              • 10 months ago
                Anonymous

                I read it. They're interviews from ????

              • 10 months ago
                Anonymous

                Yeah. Not
                >a Russian source in the same section

                Way to totally make shit up, bro

              • 10 months ago
                Anonymous

                If you hear something you think is bullshit you're not obligated to actually post the questionable content. They're not a news organization reporting what's said they're a think tank supposed to actually judge the content for believability not couch their report on "hey I don't believe this crap I just read the news buddy"

              • 10 months ago
                Anonymous

                The fact thAT RUSI published these claims without checking with anybody that knows anything about encryption standards and how encryption keys are generated, stored and transmitted shows that they did not do due diligence. EW and general computer networks are really not well understood so the fact that a bunch of wargaming nerds do not have any idea of how they work is semi-understood but hiding behind "apparently" is completely unacceptable for a reputable source such as RUSI and brings all their previous works into doubt.
                The strength of an encryption standard does not rely on the standard itself but in the "keys" it generates. These keys are regularly changed and unless some sort of workaround to shorten the amount of bits that need to be cracked to crack the standard can be found, (WEP, DES) then the standard remains robust. There is no "enigma machine" to be found or broken that would crack the whole standard open. Every single key in use needs to be cracked individually to gain access to the encrypted data.
                Is it possible that Motorolla made some sort of mistake on their end? Yes. Is it possible that the Russians got their hands on a "hot" radio? Yes.
                The fact that RUSI jumped to the least possible answer and then published it is completely unacceptable. If Russians could crack 256 bit encryption in real time in the field then they could easily gain access to ALL the US classified information.

              • 10 months ago
                Anonymous

                If you hear something you think is bullshit you're not obligated to actually post the questionable content. They're not a news organization reporting what's said they're a think tank supposed to actually judge the content for believability not couch their report on "hey I don't believe this crap I just read the news buddy"

                Are you guys crying?

              • 10 months ago
                Anonymous

                >-t. non technical
                Social studies majors should be silent.

              • 10 months ago
                Anonymous

                Are you crying though? Seems like you typed your little heart out and no one cared lol

              • 10 months ago
                Anonymous

                NTA but you deserve to be shoved into a locker for this post

              • 10 months ago
                Anonymous

                >show off an uninformed cretin opinion online
                >get made fun of by people who know shit
                >"a-are you crying n-nerd?"
                Rope holds all the answers you require Anon.
                (I doubt you own a gun.)

                Yeah

              • 10 months ago
                Anonymous

                >show off an uninformed cretin opinion online
                >get made fun of by people who know shit
                >"a-are you crying n-nerd?"
                Rope holds all the answers you require Anon.
                (I doubt you own a gun.)

              • 10 months ago
                Anonymous

                I cri evrytim i talk to vatBlack folk like you

              • 10 months ago
                Anonymous

                Everything in your post is wrong as frick. Ciphers matter, not just their key size. Ciphers (encryption methods) also don't generate keys at all, they just use them. RUSI said they broke 256 bit encryption in real time, not that they broke AES-256. The overwhelmingly most likely explanation is either that the Ukrainians were using the RC4 based stream cipher mode on their radios with a 256 bit key, and the Russians were breaking that in real time or that the Russians had access to the Ukrainian keys.

                Also AES is symmetric and the models in use only hold something like 16. Having even a single live key would let you read frickloads, and if you had one you'd most likely have all of the ones in local use.

          • 10 months ago
            Anonymous

            >apparently
            Apparently means the opposite of "something we've heard". It means "it is apparent that", ie this explanation fits what has been observed.

            People who are educated don't use the colloquial meaning of words in academic or professional writing. They use the real meaning of the words.

          • 10 months ago
            Anonymous

            Apparently means "it would appear so"
            The word you're looking for is "reportedly"

      • 10 months ago
        Anonymous

        You said it you frick

  3. 10 months ago
    Anonymous

    per month
    Also
    >9000+ ukrainian tanks destroyed
    >1000+ Bayraktars
    >68 HIMARS
    and other vatBlack person cope

    • 10 months ago
      Anonymous

      this pic doesnt say 9000 tanks its tanks and amoured vehicles

      • 10 months ago
        Anonymous

        same thing

      • 10 months ago
        Anonymous

        which is still way more than ukraine has

      • 10 months ago
        Anonymous

        Initially, they wrote it as "tanks", but when the numbers turned out to be just idiotic, they shamefully removed both pages and drew these numbers. However, now it looks even dumber

    • 10 months ago
      Anonymous

      >RUSI are vatBlack folk
      shut the frick up moron

      • 10 months ago
        Anonymous

        >Ria novosti
        You're complexly moronic.

    • 10 months ago
      Anonymous

      10000 per month is absolutely believable. Cheap and disposable anon

  4. 10 months ago
    Anonymous

    >deconflict
    Well, I learned a new word today

  5. 10 months ago
    Anonymous

    You do realize that if they had the technology to break live AES-256 crypto TX that the capability would 1: be everywhere or 2: be the most desired Russian export

    • 10 months ago
      Anonymous

      They don't know shit about frick. They live in a fantasy world, not understanding what cryptography is, beyond thinking that it's some magic that Russian wizards can overcome.

    • 10 months ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      >Oh shit sorry guys we were actually using a 256-bit WEP implementation from 2003.
      that'd be really funny

      • 10 months ago
        Anonymous

        >https://www.motorolasolutions.com/en_us/products/two-way-radios/project-25-radios/portable-radios/srx2200.html
        >Wi-Fi enabled
        Christ this would be the funniest shit.
        >The frick is a WPA3? Set that shit to WEP it's uncrackable.

        • 10 months ago
          Anonymous

          Nyet, we're going to WPA. Untraceable by Kismet, uncrackable by hashcat

      • 10 months ago
        Anonymous

        >Ukrainian UAV losses remain at approximately 10,000 per month
        Am I misunderstanding this or is this a typo? I'd have a hard time believing they're losing even 1,000 a month. Do they realize how many fricking drones 10,000 a month is?

        lmao

        • 10 months ago
          Anonymous

          10,000 drones per month = $20,000,000, really not that unbelievable if they are mainly consuming DIY kits and cheap consumer drones

        • 10 months ago
          Anonymous

          Watch Perun's video about drones, and read the interview with that ukie commander. The typical consumer-grade quadcopter lifespan is about 3-5 sorties in frontline duty. They are expendable, like ammunition.

    • 10 months ago
      Anonymous

      I would neither trust nor discredit their capabilities. The only way to answer an encryption threat is with better encryption.

    • 10 months ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      [...]
      >Oh shit sorry guys we were actually using a 256-bit WEP implementation from 2003.
      that'd be really funny

      >https://www.motorolasolutions.com/en_us/products/two-way-radios/project-25-radios/portable-radios/srx2200.html
      >Wi-Fi enabled
      Christ this would be the funniest shit.
      >The frick is a WPA3? Set that shit to WEP it's uncrackable.

      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

    • 10 months ago
      Anonymous

      On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

      >defeat 256 bit crypto
      >via bruteforce attack
      >in real time
      >when the key is going to change on a set interval making the bruteforce window absolutely minuscule
      >when the message isn't even plaintext and is likely split
      most attacks on crypto involve circumventing the crypto entirely
      in fact the radio firmware is often
      >accidentally
      left with these vulnerabilities to interception at key points and never fixed even though the manufacturer is aware of them.

      guess that's what happens when you insist on leaving a backdoor open for your own snooping but forget it's a universal backdoor now used by russia and china

      • 10 months ago
        Anonymous

        Should throw some programmers at it and flash tge software

      • 10 months ago
        Anonymous

        >guess that's what happens when you insist on leaving a backdoor open for your own snooping
        The NSA insisting on adding backdoors to shit that absolutely shouldn't have them is one of the bigger self-owns of the burger intel community.

    • 10 months ago
      Anonymous

      Are you moronic? If Russians could break encryption like that it would have more impact on the world than this whole war.

      > break
      Wrong. Article does never mention breaking of encryption. What it mentions is decryption, which would assume a key management issue.

      Keys could be leaked, stolen or simply mismanaged - sent over unencrypted channels.

  6. 10 months ago
    Anonymous

    On the fly decryption of 256-bit keys? That's quantum radar level implessive unless there's some really painful implementation flaws... or they're using something absolutely ancient.

    • 10 months ago
      Anonymous

      [...]
      [...]
      [...]
      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

      AES-256 is quantum secure anyway, so your scifi portable quantum computers won't help.
      RUSI simply don't know what they're talking about

  7. 10 months ago
    Anonymous

    If you're a Russian scientist who can break encryption in linear time, you just broke the whole class of NP-hard problems wide open
    RIP all cryptography

  8. 10 months ago
    Anonymous

    I'm not sure about the real-time decryption of Motorolas, but when we operate we assume our comms are intercepted and will be decrypted eventually. Even when we use Harris radios. Harris also has a much better range of transmission (motorolas are usually useless past 1-1.5km), but it is bulky and inconvenient

  9. 10 months ago
    Anonymous

    >10k UAVs a month
    There would be no UAVs left with such attrition rate. Absolutely preposterous.

    • 10 months ago
      Anonymous

      Even if they count mavics and fpv drones it's not even close to be realistic

  10. 10 months ago
    Anonymous

    Russians were world leaders in hacking until recently when China poached all their top talent.

    • 10 months ago
      Anonymous

      NSA Equation Group have been top dog hackers for a while
      Dictator memehackers literally eat their scraps (eternalblue exploit) to pull shit off

  11. 10 months ago
    Anonymous

    I think they're talking about radios with the P25 encryption standard, which is mandated to be AES 256.

    https://www.dhs.gov/sites/default/files/publications/P25-CAB-ENC_REQ-508_0.pdf

    • 10 months ago
      Anonymous

      P25 mandates that AES-256 is included, not that it's the only available encryption mode. See

      [...]
      [...]
      [...]
      The radios only use WIFI for updates during servicing according to the documentation on the website.

      The best known AES attack reduces AES-256 complexity to AES-254.3 and requires full plaintext and ciphertext, and more storage capacity than the human race will likely produce in the next 100 years. If Russia really can break AES-256 in real time then I guess it means they have portable quantum computers at company level. More likely they can extract keys from captured devices and Ukraine has some kind of bad process for changing fills that results in it being hard to seal a leak, or AES-256 isn't in use (why not?).

      According to the spec sheet, the radios support:
      ADP (Motorola's name for RC4, ie WEP), 256-bit AES, DES, DES-XL, DES-OFB, DVP-X

      AFAIK none of the DES based ciphers support 256 bit keys. RC4 can use a 256 bit key and that would be a convenient explanation.

      for the modes the radios support.

  12. 10 months ago
    Anonymous

    > break 256 bit encryption in real-time

    Instantly discarded

    • 10 months ago
      Anonymous

      But the 80 year old professor leading the think tank said so, surely he would know.

  13. 10 months ago
    Anonymous

    Russians obviously do not have a general purpose 256-bit AES crack on hand, but there's any number of implementation or procedural mistakes that may allow them to be decoded. Recording some 25kHz bandwidth VHF/UHF signals is completely trivial and it can then be sent off for offline cryptanalysis.
    The UAV loss figure I'm curious about, there's some hundreds of thousands of ukie troops deployed, 10k UAV losses would be 1 UAV lost per month per 10-30 soldiers? It could very well be in the ballpark, but it depends on how ubiquitous drones are within the ukie army structure, if every 10 man squad has a quadcopter then they are obviously losing them as well.

    • 10 months ago
      Anonymous

      I think most squad sized elements operate with a UAV and I read a figure that the life expectancy of a UAV is a couple of weeks max

    • 10 months ago
      Anonymous

      anon, you're moronic, either kys or get on some gov support program
      they imply russian have means to crack one in > 1.1579209e+77
      > fricking
      > keys
      it's eternity on modern cpus

      • 10 months ago
        Anonymous

        > implementation or procedural mistakes that may allow them to be decoded
        That anon means mistakes like:
        > key generation is flawed and don't actually provide 256 bits of entropy
        > key distribution is flawed so the key gets stolen through a sidechannel
        > protocol implementation is flawed, so falls back to an insecure algorithm
        > AES was correctly implemented, but some other part of the scheme like block chaining has a bug

        AES256 is an impenetrable door for now. But in a flawed system, you can attack the hinges or dig under it.

        • 10 months ago
          Anonymous

          Thank you anon. There are also general RF frickups, albeit I don't expect these from a Motorola product, ditto for some chinese wares though, e.g., microphone incidentally modulates transmission, summing AM voice over encrypted data comms. Then there's the concerns whether the key exchange is safe and that keys are utilized correctly seeing that Russians definitely capture 'hot' radios every now and then.
          We will not know about the EW effectiveness until after the war, if even then, and it will likely be in the form of testimonies and the like.

    • 10 months ago
      Anonymous

      Anon you're genuinely moronic on both points.

  14. 10 months ago
    Anonymous

    >On more than one occasion Ukrainian soldiers report that disposable infantry have been shot from Russian positions when attempting to retreat
    never change, pidors

  15. 10 months ago
    Anonymous

    >The patterns of fire are being described as

    >‘Nomadic Cannon’
    >harassing fire, delivered from mobile firing points, often to draw counterbattery fire or conduct artillery raids

    >‘Fiery Carousel’
    >a means of maintaining survivability while sustaining barrage

    >‘Roaming Platoon’
    >manoeuvring guns maximising the weight of
    salvo deliverable against a target

    >‘Umbrella Cover’
    >essentially a means of suppression
    kino names

    >Gun positions are no longer dug. Instead, a battery will conceal itself in a woodblock and move to a firing position where ammunition will have been placed for a defined salvo. It will then move to the next. If fixed by counterbattery fire, operators tend to leave their guns and seek cover, only returning to them when it is safe to do so.
    they're learning

  16. 10 months ago
    Anonymous

    >Along with the successful interception of most high-speed anti-radiation missiles (HARMs) fired by Ukrainian aircraft, the Russian air defence network is now assessed to be achieving a significant number of intercepts against GMLRS munitions
    oh no HIMARSbros

    >The longest-known shoot-down against Ukrainian aircraft was at 150 km when the aircraft was flying lower than 50 feet. This appears to have been cued by a 48Ya6 ‘Podlet-K1’ all-altitude radar with the air defence missile achieving a post-apex lock on the target
    okay that's actually pretty impressive

    >The strength of the air defence network is bolstered by persistent combat air patrols at medium altitude by Russian Su-35Ss
    >According to the Ukrainian Air Force, the longest-range recorded kill by a Russian R-37 was at 177 km
    Mig31s BTFO

    >There are believed to be eight Russian
    Mi-17s with EW suites operating in southern Ukraine. These are being utilised to some effect
    for the purposes of electronic attack against Ukrainian command and control, and through their altitude are able to do so in greater depth than is achievable by comparable systems based on the ground
    only six now

  17. 10 months ago
    Anonymous

    With how absolutely moronic RUSI is on encryption and number of UAVs shot down, I have to doubt everything else they said

  18. 10 months ago
    Anonymous

    Let him rest in peace

  19. 10 months ago
    Anonymous

    And Russians love to get butthurt when we call them liars, absolute moronic shit

  20. 10 months ago
    Anonymous

    russian flavor of the month wunderwaffe are getting boring, yawn

  21. 10 months ago
    Anonymous

    >ITT: morons who don't even read say the world's oldest military thinktank is moronic
    sigh

    >Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time.

    • 10 months ago
      Anonymous

      It is more feasible that they fluked or someone broke opsec than they decoded anything.

    • 10 months ago
      Anonymous

      someone forgot to turn the encryption on.

    • 10 months ago
      Anonymous

      no amount of coping will change the fact that realtime cracking of AES-256 is impossible at the moment.
      RUSI is flat out wrong in their statement that it was "cracked". snooped an accidental plaintext transmission, maybe. Pozzians got hold of a hot radio and Ukrainians never bothered to rotate the keys? perhaps. saying that AES-256 was "cracked" is the digital equivalent of a reputable publication saying "military-style rifle with high capacity clips". it destroys the credibility of the statement because it displays a fundamental lack of knowledge about the subject.

      • 10 months ago
        Anonymous

        Unless Russians use quantum computing. That would crack AES256 in real time.
        thinkingemoji.jpg

        • 10 months ago
          Anonymous

          AES256 is quantum safe

      • 10 months ago
        Anonymous

        >saying that AES-256 was "cracked"
        except they never said that, shit for brains

        The idea that they had broken encryption would imply that Russia has accelerated the development of Quantum computing to a scale not actually possible yet.
        RUSI also has not verification of that UAV number, making it suspect where they are getting their info from.

        >making it suspect where they are getting their info from
        you'd know if you'd READ THE FRICKING PAPER

        • 10 months ago
          Anonymous

          >bruh just believe russian propaganda ok?

    • 10 months ago
      Anonymous

      The idea that they had broken encryption would imply that Russia has accelerated the development of Quantum computing to a scale not actually possible yet.
      RUSI also has not verification of that UAV number, making it suspect where they are getting their info from.

  22. 10 months ago
    Anonymous

    Russian EW is understated. HIMARS stopped being effective once they employed EW countermeasures to throw its guidance off before impact. One of the more competent areas they have.

    • 10 months ago
      Anonymous

      They just lost 10 T-90S in fricking Donetsk to HIMARS

      • 10 months ago
        Anonymous

        According to who, Ukrainian MoD? Western rags like CNN?

        • 10 months ago
          Anonymous

          >quoting unnamed officer stating Russia intercepts all HARM and HIMARS rockets
          >good
          >quoting unnamed officer stating Russia lost 10 T-90 tanks to HIMARS
          >bad
          Hmmm

          • 10 months ago
            Anonymous

            There's actual proof of Russia reducing HIMARS effectiveness unlike your fantasy scenario of losing 10 T-90s to HIMARS

            • 10 months ago
              Anonymous

              May I see it?

              • 10 months ago
                Anonymous

                https://eurasiantimes.com/us-admits-russias-on-point-jamming-has-made-life-miserable/

              • 10 months ago
                Anonymous

                You're literally quoting "an anonymous source told cnn" and the only official word on it is that it's a constant cat and mouse game, which is well understood even by smooth brains like yourself. Do you even read past the headline from your preferred propsource?

              • 10 months ago
                Anonymous

                >eurasian times
                >anonymous sources
                Yea

            • 10 months ago
              Anonymous

              HIMARS effectiveness can be reduced via GPS interference.

              • 10 months ago
                Anonymous

                It has backup inertial guidance though it would technically degrade its performance

    • 10 months ago
      Anonymous

      >lol nope I'm not gonna read the report

      • 10 months ago
        Anonymous

        Delusional

    • 10 months ago
      Anonymous

      >understated
      I'd say it's probably the only thing they had that wasn't overstated. Russian ew has always been taken seriously. It also happens to be one of the only areas in which it was warranted

  23. 10 months ago
    Anonymous

    What the frick happened to RUSI? I thought they were good and enjoyed reading their previous take on Russian intelligence operations but now I have to take all their prior materials with a MASSIVE dose of salt. All their ""evidence"" of their wild claims that Ukraine is losing 10000 drones a month and Russia has managed to crack AES 256bit with magical Banan technology comes soleley from interviews with no actual solid evidence whatsoever.

    • 10 months ago
      Anonymous

      Source: random Slav in Ukraine that did not finish high school

  24. 10 months ago
    Anonymous

    are those radios by chance made bya chinise owned company that is using "motorola" name? (similar as with lenovo producing IBM thinkpads and so on?

    • 10 months ago
      Anonymous

      Motorola is owned by a taiwanese company now and for awhile. Google bought up all of their patents before selling the name to the company in question, however

  25. 10 months ago
    Anonymous

    AES256 is mathematically proven, but translating proven math into real code ran on real computers, especially when doing bare metal embedded is hard and error prone. Its perfectly reasonable that Russia has found exploitable errors in implementation. Unfortunately many software and hardware vendors have a 'locks keep honest people honest' view of security and aren't really trying to verify that the implementation holds up to scrutiny.

    • 10 months ago
      Anonymous

      That's next level hopium

  26. 10 months ago
    Anonymous

    >10k UAVs a month

  27. 10 months ago
    Anonymous

    The source is that some Russians moved out of a position before they were going to be hit with artillery barrage.
    It could literally just be coincidence.

  28. 10 months ago
    implessive

    China cracked 128bit encryption years ago, 256bit is just the next step

    • 10 months ago
      Anonymous

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. Black folk know frick about shit and then parrot dumb opinions on the internet

    • 10 months ago
      Anonymous

      https://i.imgur.com/Y1kMhFs.jpg

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. Black folk know frick about shit and then parrot dumb opinions on the internet

      The key space is only one variable in the schema, and the Chinese haven't broken AES-128.

      You

      https://i.imgur.com/Y1kMhFs.jpg

      > just square the amount of enthropy bro, it's just twice the bits
      this is the reason people live in their mother's basement. Black folk know frick about shit and then parrot dumb opinions on the internet

      in particular need to stop pretending that you have a technical education relevant to crypto because you clearly don't. Going from 128 to 256 AES is not a squaring of the entropy, it's a raising to the 128th power, ie squaring 128 times.

  29. 10 months ago
    Anonymous

    Another possibility regarding the Russians being able to bypass the AES256 encryption in real time is that they simply hacked Motorola's systems, stole the code for the firmware used on the radios and managed to find vulnerabilities within it that would enable them to listen in it Ukrainian comms without having to worry about the encryption at all.

  30. 10 months ago
    Anonymous

    [...]

    >butthurts ESL East Euro Black folk.
    Stuttering a bit there, rajesh. Try to be less obvious next time you shill for russia.

  31. 10 months ago
    Anonymous

    [...]

    • 10 months ago
      Anonymous

      >this is the guy calling you a hohol shill online
      Suddenly I don't even feel so bad being associated with cringy NAFO troons.

    • 10 months ago
      Anonymous

      >Me before the internet: How the hell did 1600 British civil servants manage to control the whole of India?
      >Me after the internet: Why did it take as many as 1600 British civil servants to control India?

  32. 10 months ago
    Anonymous

    crypto is hard bros

  33. 10 months ago
    Anonymous

    I thought Motorolas use AES-256?
    Or is this some NSA export gimped AES-256?

    • 10 months ago
      Anonymous

      the fact that everyone ITT thinks bruteforcing 256 is is the ONLY way to decrypt signals is precisely why side-channel attacks are so successful

  34. 10 months ago
    Anonymous

    Both the authors of this piece have backgrounds in the arts and humanities. In the report the claim is unsupported.

    It appears to come from "Ukrainian field notes", which I find somewhat unreliable particularly in this area. Soldiers are very understandably not necessarily the most reliable people when they say shit like "they knew we were coming" or "how did they know". I suspect the most likely way decrypting this in real time is to have a spy who fricking texts you the information. If not just a few coincidences or misunderstandings.

  35. 10 months ago
    Anonymous

    >rusi
    >when they keep being wrong about things that are verifiable with OSINT
    >when they claimed that russia hasn't used s300 in ground attack
    >claimed Ukraine wasnt using harms at all and was stockpiling them

    Being in a think tank is the easiest fricking job. I'd love to have a high paying gig where I can be even more inaccurate than snopes and get 6 figures.

    • 10 months ago
      Anonymous

      Don’t forget when they dismissed the ability for Ukraine to regain Kherson in 2022.
      People need to understand that Think tanks are not impervious to making mistakes, no matter how “old” they are. They are information aggregates that make best-guess opinions based off what they’ve seen.

      • 10 months ago
        Anonymous

        Yeah, but we're allowed to notice when they're wrong and ask for some accountability, right?

        • 10 months ago
          Anonymous

          what more accountability do you want, when they have already stated their methodology and reasoning? in fact they are the most conscientious in this regard; most other OSINT commentators and analysts don't dwell much on the sources of their data

          >rusi
          >when they keep being wrong about things that are verifiable with OSINT
          >when they claimed that russia hasn't used s300 in ground attack
          >claimed Ukraine wasnt using harms at all and was stockpiling them

          Being in a think tank is the easiest fricking job. I'd love to have a high paying gig where I can be even more inaccurate than snopes and get 6 figures.

          >when they claimed that russia hasn't used s300 in ground attack
          >claimed Ukraine wasnt using harms at all and was stockpiling them
          when did they say that

          • 10 months ago
            Anonymous

            >Russia can crack 256 bit encryption
            They never said that, but every 4chud wanted to show off they grok encryption
            >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
            They never said that either, just that T55s are dangerous enough when used as SPGs and IFVs
            which is not wrong since the Ukrainians are doing the same with the M55s
            >Russia is destroying 10k drones per month!
            They did say this, but probably this refers to handheld drones of the DJI type, which they previously reported do have high attrition rates

            Tryhard vatnick esl. How boring.

  36. 10 months ago
    Anonymous

    Ok, what the hell is happening with RUSI now? In a short timeframe we had:
    >Russia can crack 256 bit encryption
    >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
    >Russia is destroying 10k drones per month!

    • 10 months ago
      Anonymous

      >Russia can crack 256 bit encryption
      They never said that, but every 4chud wanted to show off they grok encryption
      >Russia is using early cold-war tanks but that's a good thing for Russia, they are so much better than modern SPGs and IFVs
      They never said that either, just that T55s are dangerous enough when used as SPGs and IFVs
      which is not wrong since the Ukrainians are doing the same with the M55s
      >Russia is destroying 10k drones per month!
      They did say this, but probably this refers to handheld drones of the DJI type, which they previously reported do have high attrition rates

  37. 10 months ago
    Anonymous

    Just curious, why doesn't Ukraine actively target the UAV jammers? I don't think it would even be hard -- set up a recon drone with a couple of antennas on a wide beam strapped under the UAV, and use differential signal strength through a couple of op amps to guide it straight to the jammer antenna. Take video the whole way. UAV then flies back using inertial and magnetic guidance, and calls in the artillery.

    "We can blow up your fricking jammers faster than you can buy them from China."

  38. 10 months ago
    Anonymous

    >RusBlack person(i)
    No, thank you.

  39. 10 months ago
    Anonymous

    >vatniks breaking 256 AES
    somehow I doubt it

  40. 10 months ago
    Anonymous

    why do I keep reading EW as early warning

  41. 10 months ago
    Anonymous

    >russians can real-time break 256bit encryption
    yeah no, if they could do that they wouldn't need to invade ukraine - they could simply hack every bank in the world or make trillions selling their super-duper-quantum computers.

    • 10 months ago
      Anonymous

      The bongs have just worded that in a stupid way.

      Russians are not brute-forcing the keys, they more likely found bugs in the million lines of Pajeetware running on those radios and/or their key management system.

  42. 10 months ago
    Anonymous

    Lots of morons in this thread who have no idea what they are talking about so let me explain how this industry fricking works.

    So you have a cryptographic primitive designed by very smart people in Europe. This becomes the Advanced Encryption Standard (AES). This has been widely analysed for decades by the best minds in cryptography research, and is widely believed to be very secure.

    Now you take that and put it into a PRODUCT. That's where product managers, in this industry, jarheads who got a MBA degree, enter the picture. They take the very secure primitives and sell products that add TONS AND TONS AND TONS of features on top of it, because features is what you can sell to the police departments, militaries and whoever buys those things. Now those guys don't really know about that shit either, they just know that AES is the secure standard of the US government and it says it has AES inside, so they trust it.

    Now, our MBA/jarhead product manager has sold yet another version of the product with super fancy functions to upgrade the keys over the air, rotate them and what not. There is a super fancy web GUI because you need to sell a cool product. Who writes that? Pajeets. Pajeets with green cards and security clearances. Because who else is going to write that code? MIT grads? No those guys work in banks or Google, not for fricking Motorola.

    In Russia it's different. The top grads of Russian universities don't work for gayMAN companies because outside of Yandex and a few others, this just doesn't exist. So many of their top mathematicians and coders work for defense.

    They get brought radios captured, or in fact literally just buy them from brand new from a dealer, and reverse engineer them.
    No, they can't fricking crack AES. But they will methodically analyse the millions of lines of code written by Pajeets and find a bunch of vulnerabilities. And from there the sky is the limit. Maybe the rekeying protocol is badly designed and leaks sequences... (1/)

    • 10 months ago
      Anonymous

      ... leaks sequences in the protocol that can be identified. You can then jam the frick out of the packet containing the response, meaning you prevent the device from rekeying (so it keeps the same key that is on one unit you have captured).

      This is just a stupid example and it's most likely not the exact method they have used, but you get the idea.

      Cryptosystems don't get broken because of the encryption primitives (although many ones believed to be secure turned out to be completely flawed: RC4, MD5, etc.)
      They get broken because the implementation is moronic and there is a 50 IQ point differential between the people who designed the crypto primitive and the PM/coders who wrote all the shit around it.

      • 10 months ago
        Anonymous

        there's unironically a shit load of pajeets who work at Motorolla

        • 10 months ago
          Anonymous

          I wonder how many companies have to go under until Americans finally stop hiring Indians.

    • 10 months ago
      Anonymous

      >So many of their top mathematicians and coders work for defense.
      They don't.
      A few idealists and austists do, but the vast majority just leave the country or work for western companies from Russia.
      Because the west pays you $2-5k per month, while the Russian government pays you $300-1000 on some months.

Leave a Reply to Anonymous Cancel reply

Your email address will not be published. Required fields are marked *