Realisticaly how much damage could an entity that had taken control of enemy comms do?Like say ukraine managed to hack a majority of russian C&C for example
Bump
>>64370944I don't know
>>64370944I have absolutely no idea
>>64370944It would depend on if real command knew there were false orders going around, if they knew they could revert to message runners / paper orders on drones / signal lights ect. If they didn't know you could order advances into ambushes, get arty to blue on blue and cause a bit of trouble before everyone realized what was going on.
>blurts out an order to do something different they're doing>confusion at the high command in a few hours when units starts asking abut information and what to do next>find out some contradictorary order came out>start using some other way of communication>order everyone to return to previous positionsAnd even this assumes that everyone at the command level you are highjacking have magically fallen asleep when you blurt out your order. The only really useful thing would be to ask for direct coordinates of stuff like command posts / staging areas and supply depos that you can quickly strike before they can fully pack up and gtfo.
>>64370944just like cyber mumbo jumbo it doesn't do anything on its own, it must be a part of a large operation
It depends on the wider planning you do. If you can take over comms AND public broadcasting along then you have the first stages of a coup but despite centuries of trying the military has yet to completely stamp out common sense so it only gives you a brief window.
>>64371158>>64373075if they have to go back to couriers wouldnt that limit their reaction time so much you get 10x the flexibility they have?Like a radio on tanks is taunted as almost as important as thermals, same for infantry and such
>>64373234But bike couriers move at the speed of light, what are you talking about?
>>64370944You wouldn't want to tip your hand if you had penetrated enemy coms. Just being able to listen to their orders and sitreps would be invaluable. The second they know they're compromised you lose that, so using it to plant misinformation is a one-shot deal that should only be used as part of a carefully thought out operation.
>>64374564>You wouldn't want to tip your hand if you had penetrated enemy coms.Anon orders non-stop suicidal meatwaves trying to get as many Russians killed as he can.>absolutely nothing changesHe's only discovered when the Russian brass go looking for this highly competent young officer in order to give him a commendation for exemplary work.
>>64374564I managed to listen in on an enemy radio net as OPFOR one time. Didn't transmit at all out of fear of tipping them off, but every time they dropped a 5 digit grid I passed it up the chain. There were a lot of suspiciously accurate fire missions for the next couple days. Even made it through their COMSEC compromised drill when they began to suspect something because they didn't use prowords and were too lazy to cycle their keys.t. laziest 25U
Realistically what is the funniest thing an entity that had taken control of enemy comms do?
>>64378793Bait the Japanese into the battle of Midway
>>64370944So long as you’re able to avoid tipping them off it’s invaluable. Knowing where every single major or even minor offensive operation is going to happen before the enemy starts moving their own units and material into position is basically cheating. There would likely be tense debates internally among the Ukrainians in such a scenario, as acting too suspiciously might alert the Russians to a communications breach. It’s not an enviable position, you essentially have to decide whether or not it’s worth it to sacrifice some more soldiers and material than is strictly necessary just to protect the secret that you’re able to listen in on the enemy.
Even though interception equipment has become simpler, it seems that a huge organization like the Enigma Decryption Team would still be needed to create a database of the information obtained and make use of it.
You can't crack a 256 bit key and nobody alive today ever will. Ultra mega ten billion core pooper computer of the future could be 100,000,000,000,000,000,000,000x faster than the best one today and you still won't crack a 256bit AES code. God forbid a 512 bit is implemented.And by then you'd see anti-quantum cyphers if qbit computing even turns out to not be a useless meme.
>>64379142Encryption itself is pretty much a solved problem yeah but the reason stuff still gets breached anyway is poor implementation. Most software developers educated in the US don’t even know about more esoteric methods like ROP, and I find it hard to believe it’s much better over there. Also I’d be surprised if they use AES given the NSA’s involvement in its development and approval. The chance there’s some secret backdoor is essentially zero but it seems like an easy internal politics thing to get someone with in ziggerland.
>>64379142Ok>PFC dickbeaters leaves a laptop open/codebook laying around/etc when he lets some tinder slut he hooked up with come suck his dick>Oops she was opfor
>>64379142So basicaly a single human brain can crack that in less than a second as it can do 10^17 operations a second.
>>64379233You need on the order of 2^256 operations to crack a 256 bit encryption via brute force.Good news, if you could somehow (lol) fully utilize the power of the human brain, then it would only take a casual 2^(256-17) seconds, or a leisurely 3*10^60 years.Obviously, this doesn't matter if you do things like >>64379214, but brute forcing modern encryption is a fool's errand. You either find a vulnerability in the encryption or the software using it, or compromise the human wetware, or you just give up.
>>64379233A thousand 10^17 operations makes a 10^18 operation. That's ten seconds for every 10^18 generated. A hundred seconds for 10^19 computations. A thousand for 10^20. Three years and two months for 10^25 computations.Hypothetically, with all the reduction tricks and a 50% chance of getting the right key by the time you've processed half the combinations, you require something like 10^72 computations for aes-256. Dont quote me specifics because I know that number isn't accurate.You can't brute force encryption in any useful amount of time unless you get luckier than the multiplied odds of all lottery jackpot winners in all of history.The lifetime chance of being struck by lightning is 1/15300. For the global pop that means, for everyone currently alive, only 530,000 will be struck by lightning. Going back from people born in the 1960s to people born yesterday. Only 530,000. That's what a 1/15300 chance is.We're talking a 1/1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 chance.And that's just for a 256-bit encryption that has some known flaws.>>64379214I wasn't talking about how codes get found. I was talking about how they do not get found.
>>64380441>a thousandA ten. Hut!Fucking typo man i swear.