@M0YNG Also keep in mind that I've got no background in security. It would be fun if people could tell me what would be the problem with such solution, given APRS limitations - ability to be used in the field, and no transmission encryption.
@M0YNG (2/2) That's why each user would have to provide a password as the first word in the message, that would be discarded. But this password would be openly visible in APRS network, so it would have to be able to be used only once. That's why each user should be able to define multiple APRS passwords in its profile - all known only to that user, and each discarded after first use. List of passwords could be, for example, printed out on paper. What do you think? Overcomplicated? 😀
@M0YNG (1/2) I think I've got an idea about how to do mastodon over #aprs in a way that would be slightly more secure than the APRS-IS Passcode.
Each user would have to register first and claim its own callsign. Messages from all callsigns which are not claimed are automatically ignored. Different SSIDs appended to callsigns would have to be handled. But this would not solve the issue of someone looking at used callsigns and using them to post.
Hey #cccamp19, you know everything you buy from Decathlon has a long-range UHF RFID tag on it, and I have a reader with 10m range?
145 unique tags scanned from a quick walk around the Milliways area.
First radio lost to the "wilderness" (well, suburbs tbh) - check. It was nice knowing you, Baofeng 1801! #dmr
Converting BrandMeister contact list and przemienniki.net repeater list to CSV expected by Baofeng 1801:
Baofeng 1801 should be delivered today. #DMR here I come!
HAM from Lower Silesia, Poland
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!