Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
Old April 22nd 16, 07:47 PM posted to rec.radio.amateur.moderated,rec.radio.amateur.misc
external usenet poster
 
First recorded activity by RadioBanter: May 2015
Posts: 71
Default [N6PSE] Cluster abuse..


n6pse

///////////////////////////////////////////
Cluster abuse..

Posted: 22 Apr 2016 09:03 AM PDT
https://n6pse.wordpress.com/2016/04/22/cluster-abuse/




Todays topic is about why I strongly dislike DX Summit.

DX Summit was recently overhauled and much improved. Unfortunately it is
still a rather simple process to spoof or fake a submitters call sign.
While there is technology to prevent this, the owners of DX Summit have not
implemented it.

Today, my own call sign is being abused on DX Summit as it is being spoofed
to initiate fake P5 DX spots. I call upon the owners/operators of DX Summit
to fix your cluster to prevent this abuse!

What do you think?



  #2   Report Post  
Old April 22nd 16, 08:59 PM posted to rec.radio.amateur.moderated,rec.radio.amateur.misc
external usenet poster
 
First recorded activity by RadioBanter: Nov 2012
Posts: 989
Default [N6PSE] Cluster abuse..

On 4/22/2016 2:47 PM, N6PSE via rec.radio.amateur.moderated Admin wrote:

n6pse

///////////////////////////////////////////
Cluster abuse..

Posted: 22 Apr 2016 09:03 AM PDT
https://n6pse.wordpress.com/2016/04/22/cluster-abuse/




Todays topic is about why I strongly dislike DX Summit.

DX Summit was recently overhauled and much improved. Unfortunately it is
still a rather simple process to spoof or fake a submitters call sign.
While there is technology to prevent this, the owners of DX Summit have
not implemented it.

Today, my own call sign is being abused on DX Summit as it is being
spoofed to initiate fake P5 DX spots. I call upon the owners/operators
of DX Summit to fix your cluster to prevent this abuse!

What do you think?


Is there really technology to prevent this? Normally it requires
substantial cryptography or validation through some key info that can be
verified.

--

Rick

  #3   Report Post  
Old April 23rd 16, 06:43 PM posted to rec.radio.amateur.moderated,rec.radio.amateur.misc
external usenet poster
 
First recorded activity by RadioBanter: Oct 2012
Posts: 1,067
Default [N6PSE] Cluster abuse..

On 4/22/2016 3:59 PM, rickman wrote:
On 4/22/2016 2:47 PM, N6PSE via rec.radio.amateur.moderated Admin wrote:

n6pse

///////////////////////////////////////////
Cluster abuse..

Posted: 22 Apr 2016 09:03 AM PDT
https://n6pse.wordpress.com/2016/04/22/cluster-abuse/




Todays topic is about why I strongly dislike DX Summit.

DX Summit was recently overhauled and much improved. Unfortunately it is
still a rather simple process to spoof or fake a submitters call sign.
While there is technology to prevent this, the owners of DX Summit have
not implemented it.

Today, my own call sign is being abused on DX Summit as it is being
spoofed to initiate fake P5 DX spots. I call upon the owners/operators
of DX Summit to fix your cluster to prevent this abuse!

What do you think?


Is there really technology to prevent this? Normally it requires
substantial cryptography or validation through some key info that can be
verified.


I agree, rickman. I wonder what technology he's referring to. Does he
mean someone has to mail/fax a copy of his/her ham license (which could
still easily be forged, nowadays)? Or something else?

--
==================
Remove the "x" from my email address
Jerry, AI0K

==================

  #4   Report Post  
Old April 23rd 16, 06:44 PM posted to rec.radio.amateur.moderated,rec.radio.amateur.misc
external usenet poster
 
First recorded activity by RadioBanter: Nov 2012
Posts: 989
Default [N6PSE] Cluster abuse..

On 4/22/2016 3:59 PM, rickman wrote:
On 4/22/2016 2:47 PM, N6PSE via rec.radio.amateur.moderated Admin wrote:

n6pse

///////////////////////////////////////////
Cluster abuse..

Posted: 22 Apr 2016 09:03 AM PDT
https://n6pse.wordpress.com/2016/04/22/cluster-abuse/




Todays topic is about why I strongly dislike DX Summit.

DX Summit was recently overhauled and much improved. Unfortunately it is
still a rather simple process to spoof or fake a submitters call sign.
While there is technology to prevent this, the owners of DX Summit have
not implemented it.

Today, my own call sign is being abused on DX Summit as it is being
spoofed to initiate fake P5 DX spots. I call upon the owners/operators
of DX Summit to fix your cluster to prevent this abuse!

What do you think?


Is there really technology to prevent this? Normally it requires
substantial cryptography or validation through some key info that can be
verified.


So no one knows anything about the ease with which this can be spoofed?
I would have thought it would be of interest. What is the method for
establishing this connection?

--

Rick

  #5   Report Post  
Old April 23rd 16, 06:44 PM posted to rec.radio.amateur.moderated,rec.radio.amateur.misc
external usenet poster
 
First recorded activity by RadioBanter: Jan 2008
Posts: 85
Default [N6PSE] Cluster abuse..


In article , rickman wrote:
On 4/22/2016 2:47 PM, N6PSE via rec.radio.amateur.moderated Admin wrote:

Today, my own call sign is being abused on DX Summit as it is being
spoofed to initiate fake P5 DX spots. I call upon the owners/operators
of DX Summit to fix your cluster to prevent this abuse!


Is there really technology to prevent this? Normally it requires
substantial cryptography or validation through some key info that can be
verified.


I don't use clusters much, but I was playing around on a few the other
day to find NPOTA stations, and all I had to do when I connected was enter
a callsign. I used my own calsign, of course, but none of the systems I
used (all of them using one of three telnet-accessible software platforms)
required me to verify that I was the true owner of that callsign. And how
could they, unless, as you say, they go through some sort of validation
process? (For example, like the one ARRL uses for LOTW.) And given the
distributed nature of the clusters, what governing body would implement
the authentication system?

The best I can think of in Paul's case is for the cluster website to
identify the IP address of the spoofer and block them--or at least,
block them from using Paul's callsign.


Patty N6BIS



Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
DX Cluster Available Len Umina Dx 0 November 5th 05 05:15 PM
Question About DX Cluster Pat Whelton Dx 10 April 28th 04 01:23 PM
Question About DX Cluster Pat Whelton Dx 0 April 27th 04 02:23 AM
DX Cluster Ahmad - 9K2DB Dx 2 April 12th 04 10:33 PM
DX Cluster Ahmad - 9K2DB Dx 0 April 12th 04 09:50 PM


All times are GMT +1. The time now is 09:00 PM.

Powered by vBulletin® Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.
Copyright 2004-2019 RadioBanter.
The comments are property of their posters.
 

About Us

"It's about Radio"

 

Copyright © 2017