shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

262
active users

#telecommunications

0 posts0 participants0 posts today

This is your periodic reminder (how periodic? I am forbidden from saying) that ISO-8601 (the standard for formatting times and dates) states that if you’re using a character set derived from the International Telegraphic Alphabet, you SHALL NOT use date and time representations.

Don’t do it. It’s not allowed.

Continued thread

There's definitely going to be a blog post about this, with some more backstory on ADPCM and the VOX format

I've been reading windytan's blog (windytan.com/2012/11/the-sound) lately and really enjoying the deep dives into how specific audio things work, and I think I want to do some of that.

absorptionsThe sound of the dialup, picturedIf you ever connected to the Internet before the 2000s, you probably remember how it sounded. But what do these sounds mean?
Continued thread

I found the original VOX ADPCM specification (multimedia.cx/mirror/dialogic-), and when that didn't sound quite like Audacity's implementation, I looked at the FFMPEG source (ffmpeg.org/doxygen/7.0/adpcm_8)

For some reason, FFMPEG seems to do it a bit differently than the specification. I'll have to look into that more and see what's going on, but for the time being, it works!

I implemented my own VOX ADPCM decoder!

I had mentioned (reillyspitzfaden.com/posts/202) wanting to use that format to interpret raw data as audio, and the Rust Symphonia crate (crates.io/crates/symphonia/0.3) didn't have the VOX variant and assumed the incoming data was properly formatted as an ADPCM file, rather than random data, so it was actually easier to do myself.

Here's how it sounds:

It appears that Russia has figured out a secondary function for their grey fleet: Hybrid warfare.

They create a "shipping company" to some country outside of the sanctions. The company likely has only a single asset: the vessel itself. The vessels are very old and in poor condition and have no insurance. A crew is hired to operate the vessel.

Normally these vessel are used to circumvent the sanctions in place, for example to sell Russian oil.

As a recent new development it appears that these vessels are also used to perform hybrid operations that target undersea cables. Prime example is the Baltic sea that is relatively shallow, and the cable locations are well documented. There has been multiple recent incidents involving ships that "accidentally" drag their anchors and cause damage.

The operation likely also involves finding crew members willing to take a compensation for performing the malicious task of dragging the anchor on the seabed. This is made easier by the fact that the crew can claim ignorance or bad seamanship. The threat to these persons is very limited, as the Nordic countries have very lenient legal systems. It is unlikely that they would be incarcerated for a significant amount of time, even if found guilty of sabotage.

The payout vs the investment is significant. The damage caused by the disruption of the undersea #telecommunications and electricity cables likely far exceeds the value of the ship or the cargo combined. The involved ship can just ignore any requests to stop or allow for inspections, as long as they are in international waters.

Considering there is a really high barrier in disrupting international shipping, anyone willing to abuse the system can continue to do so until significant changes will be made.

"#China #Russia #Iran & #Israel are spying on Americans using telecom weaknesses.
-DHS

All US carriers vulnerable to some extent.

We know this thanks to Sen
Wyden's tireless work to expose #SS7 & #Diameter vulnerabilities.

Global NET for routing calls:

Requests are trusted by default. Whatever operator they come from!

Since requests can let you do things like intercept calls, texts & track phones locations..."
-J Scott-Railton

#Telecommunications #Surveillance

404media.co/dhs-says-china-rus