From: karn@qualcomm.com (Phil Karn)
To: clark@metal.psu.edu
Message Hash: c64147de688fc8a3fe65bdb30fc2bae6d12ecb5f77dc8c4cf76ca24da4bf3a90
Message ID: <9309080637.AA12050@servo>
Reply To: <9309080603.AA04729@metal.psu.edu>
UTC Datetime: 1993-09-08 06:42:47 UTC
Raw Date: Tue, 7 Sep 93 23:42:47 PDT
From: karn@qualcomm.com (Phil Karn)
Date: Tue, 7 Sep 93 23:42:47 PDT
To: clark@metal.psu.edu
Subject: Super Phones?
In-Reply-To: <9309080603.AA04729@metal.psu.edu>
Message-ID: <9309080637.AA12050@servo>
MIME-Version: 1.0
Content-Type: text/plain
"Spread spectrum" does *not* imply "encrypted". The spreading
sequences are quite often just simple linear feedback shift registers,
which anyone with basic knowledge of cryptanalysis knows how to crack.
Anyone with knowledge of the signal format and the right hardware
could easily intercept such a signal. This *definitely* includes the
government.
The fact that spread spectrum usually thwarts the average scanner
enthusiast is actually rather unfortunate in my opinion, because that
lessens the demand for truely secure cryptography.
Phil
Return to September 1993
Return to “pat@tstc.edu (Patrick E. Hykkonen)”