autotldr@lemmings.world
on 16 Nov 2023 17:05
nextcollapse
This is the best summary I could come up with:
A set of encryption algorithms used to secure emergency radio communications will enter the public domain after an about-face by the European Telecommunications Standards Institute (ETSI).
The algorithms are used by TETRA – short for the Terrestrial Trunked Radio protocol – and they are operated by governments, law enforcement, military and emergency services organizations in Europe, the UK, and other countries.
In mid-2023, Netherlands-based security firm Midnight Blue disclosed five vulnerabilities affecting all TETRA radio networks that could allow criminals to decrypt and intercept communications in real time.
“The meeting was very well attended and had a wide spread of the TETRA community including operators, users, manufacturers and governments,” ETSI committee chairman Brian Murgatroyd is quoted as saying in a statement.
The standards org hasn’t set a date for making the algorithms accessible, ETSI spokesperson Claire Boyer told The Register.
Some of these were disclosed by the Midnight Blue research team, which found the five vulnerabilities and released technical details of the flaws at the annual Black Hat and DEF CON security conferences in August 2023.
The original article contains 408 words, the summary contains 176 words. Saved 57%. I’m a bot and I’m open source!
threaded - newest
This is the best summary I could come up with:
A set of encryption algorithms used to secure emergency radio communications will enter the public domain after an about-face by the European Telecommunications Standards Institute (ETSI).
The algorithms are used by TETRA – short for the Terrestrial Trunked Radio protocol – and they are operated by governments, law enforcement, military and emergency services organizations in Europe, the UK, and other countries.
In mid-2023, Netherlands-based security firm Midnight Blue disclosed five vulnerabilities affecting all TETRA radio networks that could allow criminals to decrypt and intercept communications in real time.
“The meeting was very well attended and had a wide spread of the TETRA community including operators, users, manufacturers and governments,” ETSI committee chairman Brian Murgatroyd is quoted as saying in a statement.
The standards org hasn’t set a date for making the algorithms accessible, ETSI spokesperson Claire Boyer told The Register.
Some of these were disclosed by the Midnight Blue research team, which found the five vulnerabilities and released technical details of the flaws at the annual Black Hat and DEF CON security conferences in August 2023.
The original article contains 408 words, the summary contains 176 words. Saved 57%. I’m a bot and I’m open source!
Were these algorithms reverse engineered and made public years ago anyway? I half remember something about that.