The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure.
The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure.
It’s in a radio standard that’s used in Europe, and the backdoor apparently exists in multiple radios from different vendors which use the standard. Here is direct link to the article, which seems to work for me https://www.wired.com/story/tetra-radio-encryption-backdoor/
https://12ft.io/proxy?q=https%3A%2F%2Fwww.wired.com%2Fstory%2Ftetra-radio-encryption-backdoor%2F