WARNING: These recordings contain profanity, racism, sexism, fascism, and noise machines. I don’t agree with or condone anything done or said in these recordings and I do not particpate in or operate on 7.200 MHz LSB. Do not listen if you find the contents I have listed triggering.
I like to listen to 7.200 MHz LSB on the weekends while drinking a glass of wine. These files are presented as recorded directly to SD card on my Icom ic-7100. No further processing or compression occurse after the fact.
Please note that I am limited to verticals and dipoles presently at my location (EL29) so some FBO’s may be quieter than the noise floor. I am working on improving the reception with creative ways to install better antennas.
The FCC stipulates as part of the rules around being a licensed amateur, I am unable to encrypt or obscure the the content of any message. I may encode (not encrypt) as long as the ability to decode is part of the public record. The only exception to this is remote control of things like space stations (AMSAT) where the control point needs to be authorized.
This got me to thinking about how such regulations would apply to trusted computing. And now I want to take that to the next level. As an academic exercise, just how far can I take an “air gapped” (as in unplugged from the internet) computer network and still ensure that there is trust. What does trust look like in this scenario? What needs to be trusted?