Polish researchers suspect that GPS jamming in the Baltic Sea, affecting maritime and air navigation, is being deliberately caused by ships, possibly linked to the ongoing war in Ukraine. The Centre for Eastern Studies (OSW) report highlights numerous incidents of interference, particularly near Russian naval exercises and around strategic areas like the Bornholm Basin, suggesting a potential Russian military strategy to disrupt navigation and create uncertainty. While technical malfunctions are possible, the patterns of interference strongly point toward intentional jamming, impacting both civilian and military operations in the region.
Google's Threat Analysis Group (TAG) observed multiple Russia-aligned threat actors, including APT29 (Cozy Bear) and Sandworm, actively targeting Signal users. These campaigns primarily focused on stealing authentication material from Signal servers, likely to bypass Signal's robust encryption and gain access to user communications. Although Signal's server-side infrastructure was targeted, the attackers needed physical access to the device to complete the compromise, significantly limiting the attack's effectiveness. While Signal's encryption remains unbroken, the targeting underscores the lengths to which nation-state actors will go to compromise secure communications.
HN commenters express skepticism about the Google blog post, questioning its timing and motivations. Some suggest it's a PR move by Google, designed to distract from their own security issues or promote their own messaging platforms. Others point out the lack of technical details in the post, making it difficult to assess the credibility of the claims. A few commenters discuss the inherent difficulties of securing any messaging platform against determined state-sponsored actors and the importance of robust security practices regardless of the provider. The possibility of phishing campaigns, rather than Signal vulnerabilities, being the attack vector is also raised. Finally, some commenters highlight the broader context of the ongoing conflict and the increased targeting of communication platforms.
During the 900-day siege of Leningrad in World War II, the Vavilov Institute, home to a vast collection of seeds and plant material, became a poignant symbol of resistance and sacrifice. Facing starvation, the scientists working there protected the invaluable collection, even choosing to die of hunger rather than consume the edible seeds and tubers under their care. This act of extraordinary dedication preserved crucial biodiversity for future generations, highlighting the enduring power of scientific commitment amidst unimaginable hardship. The article explores this story, emphasizing the difficult ethical decisions faced by the scientists and the lasting legacy of Nikolai Vavilov, the Institute's founder who perished in a Stalinist prison.
HN commenters largely focused on the astounding dedication of Vavilov and his team of scientists. Several highlighted the irony of researchers starving to death amidst a seed bank containing the potential to alleviate global hunger. Some debated the practicality of seed saving in a besieged city, questioning if distributing the food would have been a better short-term solution. Others drew parallels to contemporary seed banks like the Svalbard Global Seed Vault, emphasizing the importance of preserving biodiversity. A few comments offered additional historical context about Lysenko and his detrimental impact on Soviet agriculture, or about other sieges where similar acts of sacrifice occurred. Several commenters expressed gratitude for the article, finding it both informative and moving.
KrebsOnSecurity reports on a scheme where sanctioned Russian banks are using cryptocurrency to access the international financial system. These banks partner with over-the-counter (OTC) cryptocurrency desks, which facilitate large transactions outside of traditional exchanges. Russian businesses deposit rubles into the sanctioned banks, which are then used to purchase cryptocurrency from the OTC desks. These desks, often operating in countries with lax regulations, then sell the cryptocurrency on international exchanges for foreign currencies like dollars and euros. Finally, the foreign currency is transferred back to accounts controlled by the Russian businesses, effectively circumventing sanctions. The process involves layers of obfuscation and shell companies to hide the true beneficiaries.
HN commenters discuss the complexities of Russia's relationship with cryptocurrency, particularly given sanctions. Some highlight the irony of Russia seemingly embracing crypto after initially condemning it, attributing this shift to the need to circumvent sanctions. Others delve into the technicalities of moving money through crypto, emphasizing the role of over-the-counter (OTC) desks and the difficulty of truly anonymizing transactions. Several express skepticism about the article's claims of widespread crypto usage in Russia, citing the limited liquidity of ruble-crypto pairs and suggesting alternative methods, like hawala networks, might be more prevalent. There's debate about the effectiveness of sanctions and the extent to which crypto actually helps Russia evade them. Finally, some comments point out the inherent risks for individuals using crypto in such a volatile and heavily monitored environment.
Summary of Comments ( 10 )
https://news.ycombinator.com/item?id=43266494
Several Hacker News commenters discuss the plausibility and implications of GPS jamming in the Baltic Sea. Some express skepticism, suggesting the observed disruptions could be caused by unintentional interference or even solar flares. Others point out the increasing availability and use of GPS jammers, highlighting their potential use in smuggling or other illicit activities. The prevalence of spoofing is also raised, with one commenter mentioning the known use of GPS spoofing by Russia around airports and other strategic locations. Another commenter questions the motivation behind such jamming, speculating that it could be related to the ongoing war in Ukraine, possibly to mask ship movements or disrupt navigation. A few comments also touch on the broader implications for maritime safety and the potential for escalating tensions in the region.
The Hacker News post titled "Jamming: Polish researchers suspect GPS jammers on ships in the Baltic Sea" has generated a moderate number of comments discussing various aspects of GPS jamming and its implications.
Several commenters delve into the technicalities of GPS jamming, explaining that it's relatively easy and inexpensive to accomplish. One commenter highlights the prevalence of cheap GPS jammers on platforms like AliExpress and notes their potential use by truck drivers seeking to avoid tracking or manipulate electronic logging devices. This comment sparks further discussion about the legality and ethical implications of such devices.
The conversation also touches upon the difficulty of pinpointing the source of GPS jamming. Commenters explain how the nature of radio waves makes it challenging to trace the origin, especially in maritime environments. One commenter proposes using a network of receivers and multilateration techniques to improve detection and localization of jamming sources. Another points out the possibility of sophisticated jamming techniques that could further complicate attribution.
Some commenters speculate about the potential motives behind the suspected jamming incidents in the Baltic Sea. While some suggest the possibility of Russian involvement given the ongoing geopolitical tensions, others caution against jumping to conclusions without concrete evidence. The discussion acknowledges the strategic importance of the Baltic Sea and the potential for various actors to utilize GPS jamming for different purposes.
A few commenters also discuss the broader implications of GPS jamming for critical infrastructure and national security. They highlight the reliance of various systems, including aviation, maritime navigation, and financial transactions, on accurate GPS signals. The comments emphasize the potential for widespread disruption and the need for robust countermeasures against GPS jamming.
Finally, some comments focus on the legal and regulatory aspects of GPS jamming. They mention existing regulations that prohibit the use of such devices and discuss the challenges of enforcing these regulations. The conversation also touches on the need for international cooperation to address the growing threat of GPS jamming.