Tag Archives: FCC

Dispatches From The Rotting Carcass

Cover Image: “White-backed vultures eating a dead wildebeest” by Magnus Kjaergaard is licensed under CC BY 3.0 .

The FCC Will Be Gutted And You WILL REJOICE

https://arstechnica.com/tech-policy/2025/03/fcc-democrat-to-resign-cementing-republican-majority-for-chairman-carr (https://archive.is/3bAAG)

Straight from the Project 2025 playbook is the gutting of the FCC, which will take a back seat to corporate interests. I guarantee you that there are telecom companies waiting to carve up that precious radio spectrum like an expensive Christmas turkey.

The people will be asked to comment but it isn’t like we’ll be listened to:

We already know what to expect from this:

It’s a massive “deregulation initiative,” a codeword for “party over here!”

Look for the public use rights around 900 MHz to go away. Let’s also take away more of the amateur spectrum while we’re at it guys!

Computers, Ham Radio, and Trusted Computing

I recently acquired my Technicians license and discovered an opportunity I had not known about, but now that I know about it I look forward to exploiting it. .

The FCC stipulates as part of the rules around being a licensed amateur, I am unable to encrypt or obscure the the content of any message. I may encode (not encrypt) as long as the ability to decode is part of the public record. The only exception to this is remote control of things like space stations (AMSAT) where the control point needs to be authorized.

This got me to thinking about how such regulations would apply to trusted computing. And now I want to take that to the next level. As an academic exercise, just how far can I take an “air gapped” (as in unplugged from the internet) computer network and still ensure that there is trust. What does trust look like in this scenario? What needs to be trusted?

I intend to find out!

TTFN!