3 Comments

Encryption - with computers, public key encryption systems are practical. If you aren't familiar with that tech, please give it a look. These make key exchange simple, as what is needed to *send* you a message can be completely public. There's still a question of an initial authentication, but there are several schemes for that, too. After the initial authentication, the system makes later authentication easy, it also offers non-repudiation for both encrypted and for clear-text messages by signing messages.

Expand full comment

Hey PWN Minuteman, this is an excellent, well-thought-out presentation on Comms in a non-permissive environment. And, as one of the majority who are not well acquainted with the technical aspects of radio comms, I really appreciate the time you devoted to sharing all these points for consideration. Lord willing, our nation’s many enemies - foreign and domestic - will be thwarted in every effort by those of us willing and prepared to stand the watch.

Expand full comment

Encoded HASH program... check it out.

https://www.quickhash-gui.org/downloads/

Expand full comment