Amateur Radio – Occurative https://blog.occurative.com Robert Hollingshead's Blog Mon, 02 Sep 2024 03:04:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://i0.wp.com/blog.occurative.com/wp-content/uploads/2023/11/cropped-dd9899d2-8d88-4866-b6ea-503bdd099be8.png?fit=32%2C32&ssl=1 Amateur Radio – Occurative https://blog.occurative.com 32 32 226310737 The Fine Business Operators of 7.200 MHz: Labor Day Weekend 2024 https://blog.occurative.com/2024/09/02/fines-business-operators-labor-day-weekend-2024/ Mon, 02 Sep 2024 03:02:45 +0000 https://blog.occurative.com/?p=249 Continue reading The Fine Business Operators of 7.200 MHz: Labor Day Weekend 2024 ]]> WARNING: These recordings contain profanity, racism, sexism, fascism, and noise machines. I don’t agree with or condone anything done or said in these recordings and I do not particpate in or operate on 7.200 MHz LSB. Do not listen if you find the contents I have listed triggering.

I like to listen to 7.200 MHz LSB on the weekends while drinking a glass of wine. These files are presented as recorded directly to SD card on my Icom ic-7100. No further processing or compression occurse after the fact.

Please note that I am limited to verticals and dipoles presently at my location (EL29) so some FBO’s may be quieter than the noise floor. I am working on improving the reception with creative ways to install better antennas.

Part 1. Recorded 2024-08-31 @ 03:38:10 UTC.

Part 2. Recorded 2024-09-01 @ 02:55:13 UTC.

]]>
standard 249
Computers, Ham Radio, and Trusted Computing https://blog.occurative.com/2024/03/11/computers-ham-radio-and-trusted-computing/ Mon, 11 Mar 2024 18:08:18 +0000 https://blog.occurative.com/?p=177 Continue reading Computers, Ham Radio, and Trusted Computing ]]> I recently acquired my Technicians license and discovered an opportunity I had not known about, but now that I know about it I look forward to exploiting it. .

The FCC stipulates as part of the rules around being a licensed amateur, I am unable to encrypt or obscure the the content of any message. I may encode (not encrypt) as long as the ability to decode is part of the public record. The only exception to this is remote control of things like space stations (AMSAT) where the control point needs to be authorized.

This got me to thinking about how such regulations would apply to trusted computing. And now I want to take that to the next level. As an academic exercise, just how far can I take an “air gapped” (as in unplugged from the internet) computer network and still ensure that there is trust. What does trust look like in this scenario? What needs to be trusted?

I intend to find out!

TTFN!

]]>
standard 177