So… I found out a way to send encrypted messages using amateur radio.

There is an app called Rattlegram that lets you convert a string of text into soundwaves that plays though your phone’s speaker. If I just use an app like Secure Space Encryptor (SSE) to encrypt a text, then copy-paste it to the Rattlegram app, then transmit that over radio, then using the same app to record the sound and reverse the process on the other end. Voila! Encrypted long(ish) range communications without a centralized server!

But I looked it up and apparantly its illegal to encrypt communications over the amateur radio bands. What are the odds of actually getting in trouble? 🤔

(To the FCC agents reading this: this is just a hypothetical, a thought experiment, I’m totally not gonna do this 😉)

  • Snot Flickerman
    link
    fedilink
    English
    arrow-up
    21
    ·
    edit-2
    2 days ago

    Actually, this idea has some merit, because it already has examples in other mediums. It’s technically referred to as “steganography.”

    A common example with computers is hiding text, files, or applications within an image file.

    https://github.com/7thSamurai/steganography

    In the example for how to use this simple Image Steganography tool, the user hides a ZIP files with the entire contents of the book Dr. Jekyll & Mr. Hyde into the example image.

    I don’t see why something similar couldn’t be achieved with audio.


    In fact, here’s an article on some basic audio steganography methods.

    https://sumit-arora.medium.com/audio-steganography-the-art-of-hiding-secrets-within-earshot-part-2-of-2-c76b1be719b3

    • AwesomeLowlander@sh.itjust.works
      link
      fedilink
      arrow-up
      6
      ·
      2 days ago

      Not an expert, but I’m not sure steganography would be compatible with analog lossy data transmission methods like ham radio. The examples you linked relate to digital lossless audio, where it’s easy to hide the data in individual bits.

      • Deestan@lemmy.world
        link
        fedilink
        arrow-up
        9
        ·
        2 days ago

        It’s fine, but you need to have an error correction layer.

        Digital-over-analog methods like QR codes or modems are some examples.

      • evasive_chimpanzee@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        2 days ago

        There’s a whole bunch of different steganographic methods. You wouldn’t necessarily have to apply them to audio signals, you could apply them to the text itself. It’s certainly trickier, so you would want to keep the plain text very short so your ciphertext doesn’t get too long or weird

          • evasive_chimpanzee@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            2 days ago

            I’m not clever enough to come up with a good example on the spot, but you could have something along the lines of a scheme where the word selection corresponds to a not-obvious code. For example, if you wanted to secretly send the word “hello”, and you’ve previously given your receiver a code word “apple”:

            Hello > 7 4 11 11 14 Apple > 0 15 15 11 4

            Adding the code word to the secret message, you’d get:

            7 19 0 22 18 > H T A W S

            Then your message could be something like:

            How are you doing? Today, I went to the store. Avocados were on sale. When do you want to meet up? Saturday looks good for me.

            There are definitely way better methods to do the encoding part, and probably also better ways of doing the concealment part.

            • AwesomeLowlander@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              1 day ago

              Yeah. At that point I think it’s no longer considered steganography. It’s really interesting though all the stuff they did during the cold war to get past surveillance.