top | item 45491799

(no title)

T3OU-736 | 4 months ago

It feels like we have disparate mental models for what is happening.

Mine was that the noise generation was part of the adversary's actions (as is the presence of the drones themselves).

Are you suggesting that the noise (+encrypted data) is part of the airport's standard procedures, and authorized users pick out (and decrypt) the data, and everything else (like Command & Control) of adversarial devices is overwhelmed by the overall noise?

discuss

order

pshirshov|4 months ago

Yep, pretty much that.

T3OU-736|4 months ago

Distributing (and controlling) the necessary decryption seems like a helaciously difficult challenge for general/commercial aviation. Who are the authorized recievers of the ebcrypted data? How do we revoke access as time goes on? How do we handle normal key rotation (so that the adversary can't have unlimited time to crack/bruteforce the current keys)?

(Not my core field, so this is SWAG-ish): There is also a separate but equally important problem of signal vs noise - isolating the signal for decryption. Doable, but fairly costly to implement, and far more brittle than I suspect would be acceptable.