[TrunkCom] can we decode encryption?

Jeff Kenyon at649 at tcnet.org
Mon Nov 6 11:38:04 EST 2006


Right, but for an agency who wants some people outside to monitor but not
all it would come in handy.  What I am saying is that they could authorize
ham operators of the area to monitor yet still encrypt and not have to
hunt for other radios.
	What is being done in areas with ProVoice that is in regard to ham
operators and news media then?  I know that just a few EDACS systems today
have that ESK on them, but all the rest you can program up a radio that is
capable of ProVoice and monitor all you want.





On Mon, 6 Nov 2006, Brian J Cathcart wrote:

> On Fri, 3 Nov 2006 06:18:13 -0800 (PST) JERRY NONE
> <thepolishdude at yahoo.com> writes:
> > Jeff, could you please explain the following:
> > "This is where it would come in handy for a scanner
> > that can be keyloaded..."
>
> The keyloader is a device that loads the encryption key into the radio.
> It plugs into the same port used for programming the radio itself but
> only loads the encryption key.  Jeff was saying it would be nice to
> include keyloading capability into a scanner, but that would also require
> having the encryption circuitry in the scanner (either built-in or an
> add-on module) and that would add significant cost to the scanner.
>
> --
>
> The Scanner Dude
> Brian J. Cathcart - KE4PMJ
> South Florida Frequency & Trunking Guide 10th Edition
> Available in both Printed and CD-ROM format
> http://www.scannerdude.com
> ______________________________________________________________
> TrunkCom mailing list
> Home: http://mailman.qth.net/mailman/listinfo/trunkcom
> Help: http://mailman.qth.net/mmfaq.html
> Post: mailto:TrunkCom at mailman.qth.net
>


More information about the TrunkCom mailing list