Yes. Thus mandatory hotspot security. Well, not everywhere yet (on every master).
Also, if anyone abuses someone else's ID over repeater(s), one can use AirSecurity.
Yes. Thus mandatory hotspot security. Well, not everywhere yet (on every master).
I believe that for example my DMR ID cannot be abused, as I turned the "Hotspot Security" On and entered my own, non-trivial password. Of course it's the repsonsibility of ham operators to protect themselves against abusing their DMR ID and causing them troubles...
InterestingKI5GZK wrote: ↑Fri Feb 12, 2021 8:44 pmAccording to their website, BrandMeister is requiring hotspot security passwords when connecting to US master servers.
https://news.brandmeister.network/hotsp ... s-masters/
*1 This was true until 2021. Now is different. Seen data on Telegram BM group.VK3KYY wrote: ↑Fri Feb 12, 2021 8:23 pmI think the majority of BM users don't even have an account. *1
Neither BM or DMR MARC enforce requiring an account or setting hotspot security. *2
I think if they did that, the number of hotspot users would decrease a lot *3
Many people struggle just to setup the hotspot even without the complications of passwords. *4
I don't know if setting hotspot security, prevents you using any other repeaters when your hotspot is turned on. *5
Unless BM enforce such a strategy, anyone could transmit using your ID into any repeater or hotspot that allows public access. *6
Be sure that HS securityt does work. I have tried myself. Wrong password and you don't connect to BM.VK3KYY wrote: ↑Fri Feb 12, 2021 10:01 pmInterestingKI5GZK wrote: ↑Fri Feb 12, 2021 8:44 pmAccording to their website, BrandMeister is requiring hotspot security passwords when connecting to US master servers.
https://news.brandmeister.network/hotsp ... s-masters/
I'm not sure what this means in practice, because when I checked PiStar, and it seems to have put something into the hotspot security password which isn't my password, and it seems to still work OK.
Same, but it wasn't an intentional test.. rebuilt PIStar and forgot to put my hotspot password in and pounded on it for 30 minutes before I figured it out. I forget if it was in a log file or what, but it wasn't immediately obvious what was going on but it just never would "go green".
Did I say my was intentional...?kt4lh wrote: ↑Sat Feb 13, 2021 7:17 pmSame, but it wasn't an intentional test.. rebuilt PIStar and forgot to put my hotspot password in and pounded on it for 30 minutes before I figured it out. I forget if it was in a log file or what, but it wasn't immediately obvious what was going on but it just never would "go green".
I'm not sure if BM will do anything to prevent access by this App, but they say that Apps should identify themselves as being an App.Programs such as DROID-Star, DUDE-Star and the like are currently widely used in order to be able to transmit without a radio device. On the other hand, there is little objection to this if these are used as an occasional emergency nail.
Hence our request - encourage programmers to use the correct protocol. Clear announcement, we do not provide any support for such applications, if something does not work, then that's the way it is.
Furthermore, these programs log on to the network under a false name, the DVMega identifier is popular. This, too, is an absolute no-go, it undermines any troubleshooting if the applications do not even transmit a correct version string.