* wireless geo stuff (was Re: wireless-2.6 status (25 January 2006))
[not found] <C86180A8C204554D8A3323D8F6B0A29FEB471D@dhost002-46.dex002.intermedia.net>
@ 2006-01-27 2:15 ` Jeff Garzik
0 siblings, 0 replies; only message in thread
From: Jeff Garzik @ 2006-01-27 2:15 UTC (permalink / raw)
To: Simon Barber
Cc: Michael Buesch, Ben Greear, David Hollis, John W. Linville,
Samuel Ortiz, netdev, Linux Kernel, Alan Cox
Simon Barber wrote:
> In order to get FCC certification the manufacturer must ensure there is
> no easy way for the user to tune to illegal frequencies. Broadcom has
> done their job - it was not easy to reverse engineer their driver. Now
> the cat is out of the bag. The open source driver is not illegal -
> although it may be illegal to use it - since the chipset and driver were
> likely certified together. I'm no expert in FCC regulation, so take all
> of this with a pinch of salt.
First, kernel developers should do the best they can to provide
facilities to limit the frequencies, including sane and safe defaults
for the softmac cases. It just makes sense to do that, from a "friendly
neighbor" and "don't operate out of spec" perspective, if nothing else.
It's damned _rude_ to use channels other than the ones selected by the
Responsible Authority. Some ham radio operator -- like me -- might be
using that frequency to carry on a pleasant Morse code conversation with
someone else halfway across the world. Linux software shalt not be
rude. :)
Second, if someone takes steps to disable these safeguards we build in,
that's akin to putting illegal crystals into a radio, or tuning a
transmitter to police/emergency bands.
Finally, binary-only software is clearly _not_ a barrier to this sort of
circumvention. Reverse engineering x86 software is a skill that's very
widespread, relative to other sorts of reverse engineering. Reverse
engineering tools for the x86 are very mature these days, having had two
decades to grow and flourish. If the _hardware_ can be programmed
maliciously, there's not a whole lot you can do about it... particularly
when the hardware manufacturer chooses a method of obfuscation (x86
code) practically designed for easy analysis.
Jeff
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2006-01-27 2:16 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <C86180A8C204554D8A3323D8F6B0A29FEB471D@dhost002-46.dex002.intermedia.net>
2006-01-27 2:15 ` wireless geo stuff (was Re: wireless-2.6 status (25 January 2006)) Jeff Garzik
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).