Post Am6hATBatuvgkALdLM by tomjennings@tldr.nettime.org
(DIR) More posts by tomjennings@tldr.nettime.org
(DIR) Post #Am6hARhmPHUE9POJEW by spacerog@mastodon.social
2024-09-17T15:46:04Z
0 likes, 0 repeats
Do not use pagers for secure comms. The POCSAG protocol has been easily intercepted for over 25 years.
(DIR) Post #Am6hASa19cs6rclcm0 by mattblaze@federate.social
2024-09-17T15:47:47Z
0 likes, 0 repeats
@spacerog Depends on your threat model. One-way pagers don't expose the location of the recipient, which may be more important than message confidentiality for some purposes.
(DIR) Post #Am6hATBatuvgkALdLM by tomjennings@tldr.nettime.org
2024-09-17T21:35:31Z
0 likes, 0 repeats
@mattblaze @spacerog Everyone's forgot, or never knew, how radio works. I used and mildly hacked pagers. Traffic is very low. Messages are grief, text only. Low or no security. Oh wait -+ that's the later text pager system. The original system just sent a very short string of digits. A 10 digit phone number. The "call me" part is implicit to the wearer when the device beeps and displays 7 or 10 digits. We had auto network monitoring code that could sms us stuff about a down interface etc. Text pagers were a tech sweet spot. I miss their fluidity in my daily work flow. They did just one thing, and wellThey were only received only. I actually loved my text pager; we had unic command line scripts... Going to s site id text myself directions or numbers etc then head out. A minute later they'd be in my pager. It had a scrolling memory. Very useful. Relatively low radio frequency, probably one or two transmitters covered downtown san Francisco
(DIR) Post #Am6hAd5w3oLRTVmFua by spacerog@mastodon.social
2024-09-17T15:54:40Z
0 likes, 0 repeats
To be fair I'm going to assume most people are using FLEX these days and not POCSAG, but still easily captured