I'm have tried for some time to make sense of these, but don't really get the appeal.
If someone broadcast over a large area they get triangulated very quickly, and there are so few people broadcasting that they could be readily identified.
Commercial telecom infrastructure is at the disposal of a range of state and non-state entities- as are the personal devices of individuals.
Some asshole with an Iphone is going to pick up your broadcast and unbeknown to them they are going to relay that to service providers (see:GPS never actually off)
If you are broadcasting "peer to peer" you may be safer from triangulation, but once detected your AO becomes so small you could be identified by CCTV.
Thus I conclude if someone wants to stop you broadcasting and you didn't want to stop, you would have to have a broadcaster in a car or backpack kit- or operate peer to peer in an environment where CCTV wouldn't identify you (wear a mask).
>"Hey you, give me that radio"
>"We are here to investigate a unknown broadcast"
If you broadcast something encrypted, here's the split:
Most devices couldn't decrypt the broadcast- but they could record it and conceivably it could be "brute forced" at a later date. I suspect there are probably even apps that when paired to a plugin receiver could do this now.
And of course anyone could work out WHEN you broadcast unless you had a numbers station.
Then you have the legal issues with broadcasting an encrypted signal.
Now I would split this immediately into to categories, good faith prosecution and bad faith prosecution.
Message too long. Click
to view full text.