this post was submitted on 20 Dec 2024
71 points (100.0% liked)

No Stupid Questions

36147 readers
1460 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 2 years ago
MODERATORS
 

I mean the Voyager 1 probe which is currently the human-made object the farthest away from earth. The space program people operating the mission seem to have great control options, they even "moved software from one chip to another" (link) Apart from the probably gigantic and expensive installation needed to receive and/or send messages from/to that far away from home (23 hours of delay?), are there any safety measures to prevent a potentially malicous actor from sending commands to the probe?

top 24 comments
sorted by: hot top controversial new old
[–] expatriado 76 points 1 day ago (1 children)

NASA use parabolic antennas that are 35+ meters in diameter and consume 20KW to generate the 0.01 degree beamwidth signal, that alone will demotivate hackers

[–] [email protected] 7 points 1 day ago (1 children)

My brain makes some dumb connections. This is basically Dom Joly with his enormous mobile phone, shouting INCREDIBLY LOUDLY into it.

[–] [email protected] 2 points 19 hours ago

Do not trust this man

[–] EleventhHour 32 points 1 day ago* (last edited 1 day ago) (2 children)

Yeah, obscurity. The code sent back-and-forth is proprietary to NASA in the 70s. I’d be shocked if anyone else has any idea how it interpret it other than NASA themselves. it’s not impossible, of course, but it doesn’t use any common protocols or software that anyone outside of NASA would be familiar with. Whatever data got intercepted would likely come out as gibberish.

To get anything useful out of the data, they would have to have a replica of NASA’s Voyager ground computer. And its software package. The plans for those are not exactly on the Internet.

[–] sanguinepar 15 points 1 day ago

it doesn’t use any common protocols or software that anyone outside of NASA would be familiar with.

Suddenly Lemmy hates Voyager because it's not FOSS...

[–] foggy 9 points 1 day ago

China:

Haha! We're gonna publish this miniscule finding first! Suckers!

[–] Treczoks 21 points 1 day ago (2 children)

There are several problems if you want to interfere that communication.

First, you need to reverse engineer the protocol. For that you need to be able to log what nasa is sending and what they are receiving. Both has quite some problems, as the sending signal is tightly focused towards the spacecraft, so you probably have to find the actual dish and install a bug to read what they are sending. The NASA might object to that.

Second, you would need the hardware. Which is beyond the normal hobbyists budget.

And finally, you would have to be 100% spot on in your reverse engineering of the protocol or you'll probably just brick that thing.

[–] [email protected] 16 points 1 day ago (2 children)

A state actor could definitely do those things. The question is why though. There's not really anything to gain from that, they'd just lose money on it.

[–] [email protected] 1 points 19 hours ago

Some people just like to watch the world burn

[–] [email protected] 2 points 1 day ago

This is probably the biggest problem with that idea. If you hack an ancient space probe, you’ll definitely get the appropriate bragging rights, but that’s about it.

Lots of hobby hackers would love to do it, but they don’t have the hardware for it. Some governments might have the hardware, but they just don’t care about bragging that much.

[–] batmaniam 3 points 1 day ago

I imagine it's classified, but NASA being NASA, you know a full risk assessment along these lines exists, probably with dutiful updates as it's still an active program. It would be fascinating read especially with the updates, with how much the world has changed while the probe remained the same.

[–] [email protected] 10 points 1 day ago* (last edited 1 day ago) (1 children)

You might enjoy this read: https://destevez.net/2021/09/decoding-voyager-1/

It talks about decoding the signals sent back by Voyager 1

[–] VegOwOtenks 2 points 15 hours ago

Thanks a lot for the recommendation, I did enjoy the read!

[–] spankmonkey 12 points 1 day ago

The physical security is plenty at this point in time. Only another state actor could possibly have the resources to even handle the communication process in the first place, and it would be expensive with zero incentive to act.

Past that, the custom software would have to be both obtained from NASA via espionage and reverse engineered.

If those to impossible hurdles were somehow overcome, the international blowback would be enormous.

[–] [email protected] 9 points 1 day ago

Naw, go for it

[–] Deestan 3 points 1 day ago (2 children)

Consider why a very strong passkey is protective: It is expensive to crack it. Either you spend a ton of expensive computing power to crack it, or you arrange bribes or kidnapping. At some point, the cost is beyond "lol" budget and needs to be worth it for a lot of powerful people.

So basically it's protected by an extremely strong password. :)

[–] yoevli 2 points 1 day ago (2 children)

I mean, you can't exactly just throw computing power at modern cryptography and expect to get results. I don't know the exact numbers off the top of my head, but I believe all the computing power on Earth right now would take on the order of at least thousands of years to brute force a good password hash (assuming a strong password), and that's assuming the attacker already has the salt. This makes it less of a budgetary constraint and much more of a practical one.

[–] Deestan 3 points 1 day ago

Correct. But also https://xkcd.com/538/ . Hence why I said "or bribes and kidnappings".

[–] [email protected] 2 points 1 day ago (1 children)

Quantum computers could feasibly do it. However, even Google's project willow at 105 qubits is not enough. Because if it were, we would have much bigger problems like, oh, I don't know, the encryption that protects your bank account and HTTPS connections.

[–] [email protected] 1 points 1 day ago (1 children)

Post-quantum encryption is a thing.

[–] [email protected] 1 points 1 day ago

That's true. I just don't know of a lot of mainstream things that have deployed it quite yet. Like I do not think HTTPS is post quantum secure, or at least not that I'm aware of.

[–] VegOwOtenks 2 points 1 day ago (1 children)

I was wondering about encryption (is this what you're talking about?) because these algorithms change so frequently I'd be surprised if they had anything back then considered 'secure' by now.

[–] Deestan 4 points 1 day ago* (last edited 1 day ago) (1 children)

Well, sorta. I ruled it out because hardware of that era, limited by Voyager's power supply, could not do encrypted communication beyond wet paper bag levels. And like you said, anything more than 20 years old is not in use anymore because people have poked holes in it.

But encrypted communication is all based on same as a passkey in the end (a sequence of secret bytes), whether we are talking encryption based off public/private keys, symmetric keys, elliptic curve, passphrases etc, so it's comparable enough for the point I was aiming for. :)

[–] [email protected] 3 points 1 day ago

I don't see why they would encrypt it at all. I assume everything is setup to keep power usage to a minimum. I would assume some sort of compacting might be done. Its that type of thing which I would assume would kinda secure it. They don't use bog standard stuff and if they can use some unique protocol that saves just a bit of energy they are likely to do it. Keep in mind that since like the 90's a lot of tech stuff has been muscled through rather than maximizing its efficiency. We tend to do efficiency has afterthoughts that effect large swatches like with using video hardware and such.