7 comments

  • thatcherc4 hours ago
    Link to the paper: <a href="https:&#x2F;&#x2F;www.nature.com&#x2F;articles&#x2F;s41377-025-02119-y" rel="nofollow">https:&#x2F;&#x2F;www.nature.com&#x2F;articles&#x2F;s41377-025-02119-y</a><p>From the abstract:<p>&gt; Here, we demonstrate a covert communications method in which photon emission is rapidly electrically modulated both above and below the level of a passive blackbody at the emitter temperature. The time-averaged emission can be designed to be identical to the thermal background, realizing communications with zero optical signature for detectors with bandwidth lower than the modulation frequency<p>It sounds like maybe they&#x27;re modulating the emissivity of a diode up and down so that over time, its IR spectrum looks like black body radiation. Only someone looking at the intensity of the thermal radiation coming from the diode at really fast timescales (kilohertz or megahertz) would notice that there was a signal being transmitted.
  • Retr0id2 hours ago
    &gt; We do have encryption methods, but at the same time we’re always having to create new encryption methodologies when bad actors find new decryption strategies.<p>&gt; But if someone doesn’t even know the data is being transferred, then it’s really very hard for them to hack into it. If you can send information secretly then it definitely helps to prevent it being acquired by people you don’t want to access it.<p>Very strange framing. Symmetric cryptography has been &quot;unhackable&quot; for a while now, for all intents and purposes. The real advantage is surely that nobody notices you&#x27;re transmitting data at all?
    • beloch1 hour ago
      It adds a layer of obscurity, but not real security. If somebody <i>is</i> looking, neither sender or receiver can detect it or know if their ciphertext was intercepted. Depending on the methods used, the cipertext might not be immediately crackable with currently known algorithms and resources. However, it can be archived and broken at a later date, or by an actor who has access to algorithms&#x2F;resources that aren&#x27;t currently public.
      • Retr0id55 minutes ago
        harvest-now-decrypt-later attacks aren&#x27;t much of a concern for modern symmetric cryptography. heck, even known-broken ciphers like rc4 aren&#x27;t easy to break in a non-interactive setting with modest ciphertext sizes and no key reuse.
        • beloch50 minutes ago
          It all depends on who the message needs to be secure from, and for how long.
          • Retr0id38 minutes ago
            Sure, but for symmetric ciphers it&#x27;s not hard to hit the &quot;by anyone, for my lifetime&quot; threshold. NIST does not define a sunset date for AES-256, for example.
    • nine_k2 hours ago
      The cypher may be prefectly impenetrable, but the software running on the transmitter or receiver may be more brittle. You cannot attack what you don&#x27;t even know exists nearby.
      • Retr0id2 hours ago
        A secure cipher is indistinguishable from random data, you can&#x27;t infer what software is on either end just by eavesdropping.
        • andrewflnr49 minutes ago
          In practice you can infer a lot. The payload of a TLS stream is formally indistinguishable from random data, but you can still tell on the wire that it&#x27;s TLS. There aren&#x27;t a lot of widely-used TLS implementations. It&#x27;s been a while since I looked at the specifics, but I bet there&#x27;s a lot of more specific signature data in the plain-text parts of the protocol like supported ciphers. You can make some good guesses from the metadata.<p>In the case of a physical interception, you can probably infer more. If you, after reading this article, spot an enemy drone that doesn&#x27;t have any obvious emissions, then, well, there might only be one option for the software running on that drone, namely The Software that your enemy uses on their drones.<p>Anyway, it&#x27;s not clear to me from the article whether the source object from the signal will necessarily be invisible. I think every transmitter still at least looks like a point source of blackbody radiation. The <i>signal</i> may not be detectable from thermal background radiation, but if the background itself is coming from a big obvious drone, well, you know it &quot;exists nearby&quot;.
          • Retr0id33 minutes ago
            Only because TLS never tried to be metadata-resistant in that way.<p>For example, Noise protocol + Elligator + constant bandwidth, is indistinguishable.
        • nine_k2 hours ago
          But once you&#x27;ve located the device, you can use a number of electronic warfare approaches to crack into it, not necessarily through its main radio interface. For instance, electromagnetic interference, heating, etc, all can inject a subtle hardware failure that the software is not ready to handle.
          • Retr0id2 hours ago
            Hence, &quot;the real advantage is surely that nobody notices you&#x27;re transmitting data at all?&quot;
            • nine_k3 minutes ago
              Not just that you are transmitting any data, but that there&#x27;s some &quot;you&quot;, or your device. &quot;All clear, nothing to see here&quot;.
      • g-b-r1 hour ago
        You really need to look up the Kirchoff principle
  • TheOtherHobbes4 hours ago
    Maybe I&#x27;m missing something, but this reads like a complicated way to say &quot;We made an IR diode that gets cold as well as hot.&quot;
    • TeMPOraL1 hour ago
      Or you can call it encryption along different axis. Much like extracting GPS signals from below thermal floor level - you can do it if you 1) know it&#x27;s there, and 2) know exactly how to key in. It&#x27;s impressive as heck, but you can always rephrase it in terms of information theory in ways that makes it sound like slightly different shade of mundane.
      • g-b-r1 hour ago
        No, this has nothing whatsoever to do with encryption, and no real security, probably
        • TeMPOraL1 hour ago
          Depends on how you modulate it. Think e.g. frequency hopping &#x2F; spread spectrum: it&#x27;s encryption, just done on modulation instead of transmitted data.
    • wpollock1 hour ago
      I don&#x27;t believe you&#x27;re missing anything. This is just stegenography with a possibly new covert channel, right? Apparently the secret depends on advisaries not noticing the special hardware deployed on each end. Would using spread sprectum techniques would work just as well?
    • RobotToaster2 hours ago
      Yeah, but saying that doesn&#x27;t get the military to give you money.
      • JellyBeanThief2 hours ago
        I would much rather have been called a computerologist than a computer scientist.
    • thewanderer19832 hours ago
      Yep.
  • dustfinger3 hours ago
    &gt; Only a receiver with the right equipment can pick up the hidden message.<p>So all an eavesdropper has to do is setup the right equipment then? I guess it is only invisible until the technology becomes more widely available.
    • behehebd2 hours ago
      As invisible as radio signals then.
      • Hobadee1 hour ago
        Now now... Let&#x27;s be fair...<p>Radio broadcasts to everyone.<p>Light you can block off to a single direction.<p>Oh wait, directional radio antennas exist. Nevermind, yes. Exactly like radio waves.
        • TeMPOraL1 hour ago
          &gt; <i>Light you can block off in a single direction.</i><p>Sorta, kinda. You&#x27;re really only just attenuating things a lot. It&#x27;s tricky to actually <i>block it off fully</i>.<p>Same with radio waves, as light is literally the same phenomena as radio waves, it&#x27;s just shaking faster.
  • scottyah4 hours ago
    It&#x27;s impressive how this article made this sound like a breakthrough, didn&#x27;t even mention the entire historied field of steganography once.
    • jkhdigital4 hours ago
      The paper itself mentions steganography in the second sentence at least.
  • nyc_data_geek12 hours ago
    Makes me look at steganography in <i>slips on sunglasses</i> an entirely new light.
  • charcircuit4 hours ago
    It seems simpler to use a secure radio protocol instead of relying on security by obscurity for communication.
    • StevenWaterman4 hours ago
      A covert signal is still beneficial even if the signal is secure. The existence of the signal is valuable metadata.<p>For a contrived example, imagine I&#x27;m in a warzone:<p>- Secure = Enemies can&#x27;t read my messages. Good. But they can still triangulate my position.<p>- Covert = Enemies don&#x27;t know I exist
      • TeMPOraL1 hour ago
        Also even if they <i>know</i> you are transmitting, it may still be beneficial to prevent them from knowing <i>how much</i> you are transmitting.<p>Imagine the enemy detects some of your transmission, even knowing it&#x27;s encrypted, they can still look at the data rate (or estimate order of it):<p>- 5 bps = probably a random transmitter, maybe audio spy device, maybe remote detonated weapon<p>- 5 Mbps = probably a feed from military hardware or personnel<p>Similar inferences can be made about volume, if they can identify distinct transmissions. Etc. If tricks like these can make the enemy confuse 5 Mbps TX for a 5 bps one, it has obvious tactical utility.
      • applfanboysbgon3 hours ago
        Another example: in some regimes merely using Tor is illegal, or say in the US using it is enough to justify a search warrant for probable cause, with no evidence of any actual wrongdoing. The EU Chat Control lobby is also trying very hard to criminalize encryption. The simple act of trying to communicate privately is taken as indicative of criminal wrongdoing in the modern world. Being able to communicate without adversarial parties knowing you&#x27;re communicating is a boon.
      • pinkmuffinere4 hours ago
        +1. As another example see <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Numbers_station" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Numbers_station</a> -- people can&#x27;t decipher the messages, but they strongly suspect something spy-y is going on. If they couldn&#x27;t even detect it, there would be no suspicion.<p>Also hi StevenWaterman, I recognize you from previous comments! I think this is the first time that&#x27;s happened to me on HN
      • mvrckhckr2 hours ago
        Unless they have &quot;the right equipment&quot;. Then you are right back at the same situation.
        • TeMPOraL1 hour ago
          Nobody has &quot;the right equipment&quot; everywhere all at once, especially not with operators (human or otherwise) set to monitor it all the time.<p>In the real world, obscurity is the cornerstone of security.
    • bob10293 hours ago
      DSSS is sort of both security and obscurity at the same time. The very act of spreading your spectrum out via a secret key also has the effect of reducing the amplitude of your transmission, ideally below the noise floor. A receiver on the other side wouldn&#x27;t see anything except noise unless they had the same key.
    • jkhdigital4 hours ago
      Secure channels can still be jammed. Undetectability is a fundamentally different goal than secrecy.
    • hmmokidk3 hours ago
      I am sure you could encrypt the warmth message somehow.
    • esseph3 hours ago
      Unless your adversary is scanning for RF emissions, which is getting more and more common.