Post Am6hASa19cs6rclcm0 by mattblaze@federate.social
 (DIR) More posts by mattblaze@federate.social
 (DIR) Post #Am6hARhmPHUE9POJEW by spacerog@mastodon.social
       2024-09-17T15:46:04Z
       
       0 likes, 0 repeats
       
       Do not use pagers for secure comms. The POCSAG protocol has been easily intercepted for over 25 years.
       
 (DIR) Post #Am6hASa19cs6rclcm0 by mattblaze@federate.social
       2024-09-17T15:47:47Z
       
       0 likes, 0 repeats
       
       @spacerog Depends on your threat model. One-way pagers don't expose the location of the recipient, which may be more important than message confidentiality for some purposes.
       
 (DIR) Post #Am6hATBatuvgkALdLM by tomjennings@tldr.nettime.org
       2024-09-17T21:35:31Z
       
       0 likes, 0 repeats
       
       @mattblaze @spacerog Everyone's forgot, or never knew, how radio works. I used and mildly hacked pagers. Traffic is very low. Messages are grief, text only. Low or no security. Oh wait -+ that's the later text pager system. The original system just sent a very short string of digits. A 10 digit phone number. The "call me" part is implicit to the wearer when the device beeps and displays 7 or 10 digits. We had auto network monitoring code that could sms us stuff about a down interface etc. Text pagers were a tech sweet spot. I miss their fluidity in my daily work flow. They did just one thing, and wellThey were only received only. I actually loved my text pager; we had unic command line scripts... Going to s site id text myself directions or numbers etc then head out. A minute later they'd be in my pager. It had a scrolling memory. Very useful. Relatively low radio frequency, probably one or two transmitters covered downtown san Francisco
       
 (DIR) Post #Am6hAd5w3oLRTVmFua by spacerog@mastodon.social
       2024-09-17T15:54:40Z
       
       0 likes, 0 repeats
       
       To be fair I'm going to assume most people are using FLEX these days and not POCSAG, but still easily captured