7 Comments

Commenting has been turned off for this post
Steve, KB9MWR's avatar

This matter was explained in an issue of CQ or CQ-VHF in the early 2000's before HSMM started using Mesh technology to restrict the connections to hams. There was a pre-defined key on the ARRL website. So the Canadian thing is the same sort of thing. As N8GNJ points out there really is no need to use encryption and using the ARES angle to allow it is pathetic since there are now so many ways to handle that kind of traffic outside of ham radio. It's important to remember the rules we have in the USA were crafted before digital was a thing. "Intentionally obscuring the meaning" was likely referring to mostly the use of coded lingo on voice. Even analog scrambing and like wasn't much of a thought at the time. And yes civilian encryption was prohibited within my life time. (I believe that changed during the Clinton administration)

Expand full comment
Louis Mamakos  (WA3YMH)'s avatar

Regarding encryption and publishing keys in a public location.. this makes me nervous and twitchy. I'm old enough to have lived through the "Clipper Chip" thing years ago, and various attempts by government to implement encrypted communication systems and methods which incorporate some "key escrow" element. The theory being that, in exchange for the government "allowing" you to use encryption systems in communications, the key available in the escrow mechanism would only be used by the government for "legitimate" purposes only.

All of this was with respect to proposed regulatory restrictions on encrypted content in the US on the Internet and in other communication systems, which is a little removed from the amateur radio service. My concern here is that some accomodation in the amateur radio service with "escrowed" or published keys might get pointed to as precedent or demonstration in an out of context way and used to shape policies for trusted communications across the Internet.

So I think if this is something that's adopted in the amateur radio service, it would be good to carefully consider the optics, labeling and description of such a system that conveys the narrow purpose and applicability. And not inadvertently be the camel's nose in the tent as far as encryption policy advocacy.

Expand full comment
5 more comments...

No posts