Is compression “encryption” under FCC regs?Signing of messages transmitted over ham radioWhy do Amateur Radio organizations in the United States oppose the relaxation of encryption prohibitions?How far from earth do FCC regulations apply?How can I know whether a radio is FCC approved?FCC tracking of unlicensed FRS/GMRS transmissionsWhy does the FCC put restrictions on symbol rates?legal - Do FCC regulations only apply in U.S.A?What are FCC/Industry Canada certification requirements for amateur radio related products?How to get professional or official clarification of FCC Part 97 rules for specific complicated situations?Is there any point to keep the CSCE after the FCC registers the upgrade?Do FCC regulations limit digital data rate?

In the quantum hamiltonian, why does kinetic energy turn into an operator while potential doesn't?

Why does liquid water form when we exhale on a mirror?

Can one live in the U.S. and not use a credit card?

Difference on montgomery curve equation between EFD and RFC7748

Database Backup for data and log files

An alternative proof of an application of Hahn-Banach

How is the wildcard * interpreted as a command?

Is it necessary to separate DC power cables and data cables?

List elements digit difference sort

Why does the negative sign arise in this thermodynamic relation?

Recommendation letter by significant other if you worked with them professionally?

PTIJ: wiping amalek’s memory?

Can Mathematica be used to create an Artistic 3D extrusion from a 2D image and wrap a line pattern around it?

How do I express some one as a black person?

Does a warlock using the Darkness/Devil's Sight combo still have advantage on ranged attacks against a target outside the Darkness?

Should I tell my boss the work he did was worthless

Why doesn't this Google Translate ad use the word "Translation" instead of "Translate"?

Do I really need to have a scientific explanation for my premise?

How can I get players to stop ignoring or overlooking the plot hooks I'm giving them?

Doesn't allowing a user mode program to access kernel space memory and execute the IN and OUT instructions defeat the purpose of having CPU modes?

Hotkey (or other quick way) to insert a keyframe for only one component of a vector-valued property?

Filtering SOQL results with optional conditionals

What's the "normal" opposite of flautando?

Intuition behind counterexample of Euler's sum of powers conjecture



Is compression “encryption” under FCC regs?


Signing of messages transmitted over ham radioWhy do Amateur Radio organizations in the United States oppose the relaxation of encryption prohibitions?How far from earth do FCC regulations apply?How can I know whether a radio is FCC approved?FCC tracking of unlicensed FRS/GMRS transmissionsWhy does the FCC put restrictions on symbol rates?legal - Do FCC regulations only apply in U.S.A?What are FCC/Industry Canada certification requirements for amateur radio related products?How to get professional or official clarification of FCC Part 97 rules for specific complicated situations?Is there any point to keep the CSCE after the FCC registers the upgrade?Do FCC regulations limit digital data rate?













3












$begingroup$


I read this question about digital signatures and FCC prohibitions on "obscuring" messages in amateur transmissions, and it cause me to think of something: the difference between encryption and compression is small.



If I send a file in compressed form via digital radio (say, a Mesh running on firmware-modified wifi routers, to support data rates that don't make this silly), the contents are easily decompressed by anyone who receives the file in error-free form (and most compression systems include redundant error correction codes to reduce the likelihood that the file will fail decompression) -- but without attempting decompression, there's no simple way to tell whether the file is encrypted within the compressed archive.



It would obviously be a no-no to send an encrypted archive by amateur radio, I think, but where is the line drawn? Does compression itself count as "obscuring" the contents?










share|improve this question











$endgroup$
















    3












    $begingroup$


    I read this question about digital signatures and FCC prohibitions on "obscuring" messages in amateur transmissions, and it cause me to think of something: the difference between encryption and compression is small.



    If I send a file in compressed form via digital radio (say, a Mesh running on firmware-modified wifi routers, to support data rates that don't make this silly), the contents are easily decompressed by anyone who receives the file in error-free form (and most compression systems include redundant error correction codes to reduce the likelihood that the file will fail decompression) -- but without attempting decompression, there's no simple way to tell whether the file is encrypted within the compressed archive.



    It would obviously be a no-no to send an encrypted archive by amateur radio, I think, but where is the line drawn? Does compression itself count as "obscuring" the contents?










    share|improve this question











    $endgroup$














      3












      3








      3


      1



      $begingroup$


      I read this question about digital signatures and FCC prohibitions on "obscuring" messages in amateur transmissions, and it cause me to think of something: the difference between encryption and compression is small.



      If I send a file in compressed form via digital radio (say, a Mesh running on firmware-modified wifi routers, to support data rates that don't make this silly), the contents are easily decompressed by anyone who receives the file in error-free form (and most compression systems include redundant error correction codes to reduce the likelihood that the file will fail decompression) -- but without attempting decompression, there's no simple way to tell whether the file is encrypted within the compressed archive.



      It would obviously be a no-no to send an encrypted archive by amateur radio, I think, but where is the line drawn? Does compression itself count as "obscuring" the contents?










      share|improve this question











      $endgroup$




      I read this question about digital signatures and FCC prohibitions on "obscuring" messages in amateur transmissions, and it cause me to think of something: the difference between encryption and compression is small.



      If I send a file in compressed form via digital radio (say, a Mesh running on firmware-modified wifi routers, to support data rates that don't make this silly), the contents are easily decompressed by anyone who receives the file in error-free form (and most compression systems include redundant error correction codes to reduce the likelihood that the file will fail decompression) -- but without attempting decompression, there's no simple way to tell whether the file is encrypted within the compressed archive.



      It would obviously be a no-no to send an encrypted archive by amateur radio, I think, but where is the line drawn? Does compression itself count as "obscuring" the contents?







      united-states legal digital-modes encryption






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 8 hours ago









      Kevin Reid AG6YO

      16.2k33170




      16.2k33170










      asked 8 hours ago









      Zeiss IkonZeiss Ikon

      54419




      54419




















          3 Answers
          3






          active

          oldest

          votes


















          2












          $begingroup$

          For governments around the world to continue to trust that amateur radio has no nefarious purpose, it is essential that everyone that wishes to, can "listen in" to any amateur radio communications. Anything that hints at eroding this capability will likely be struck down in time through regulation.



          To pass the FCC legal hurdle regarding obfuscation, it must first be evident that the purpose is not to obscure the message. Part of this test would likely be that the technique must accomplish some useful level of compression if that is really its purpose.



          The legal second test would likely be that can anyone readily decompress the message to return it to its clear text form. This must be very easily achievable due to broad publication or acceptance of the compression method.



          Both tests are important. For example, consider a symmetric encryption scheme using an industry standard and with the encryption key widely published on the web. This will possibly pass the second test but it would fail the first test because it doesn't actually compress the message in any real sense. It is also clear that the public standard is primarily for encryption (obscuring) and not compression (reducing).



          On the other hand, FT8 makes extensive use of compression. The standard is well published so that anyone wishing to decode the bits can do so. Even though the compression "obscures" the message - it is clear the purpose of the technique is compression. Furthermore, the software to copy FT8 transmissions is readily available for free. Everyone can "listen in". So FT8 passes both tests.



          Even Morse Code uses a form of compression by using shorter symbol lengths for the more commonly used letters. Clearly it passes both tests.






          share|improve this answer









          $endgroup$












          • $begingroup$
            "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
            $endgroup$
            – Alexander
            2 hours ago


















          0












          $begingroup$

          As long as your compression uses a standard compression method, it is legal and not considered encryption.






          share|improve this answer









          $endgroup$




















            -2












            $begingroup$

            Compression is not encryption. You don't have to use a standard compression method.



            By FCC rules, even encryption is not encryption if you publish the key (and the algorithm).



            It doesn't matter how you encode the signal if you publish the method to decode it.



            However, if you spoke plain words but used special words for special meanings in ways that is not published, that would be illegal, as it obscures the meaning.






            share|improve this answer











            $endgroup$












            • $begingroup$
              How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
              $endgroup$
              – Mike Waters
              1 hour ago











            Your Answer





            StackExchange.ifUsing("editor", function ()
            return StackExchange.using("mathjaxEditing", function ()
            StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
            StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
            );
            );
            , "mathjax-editing");

            StackExchange.ifUsing("editor", function ()
            return StackExchange.using("schematics", function ()
            StackExchange.schematics.init();
            );
            , "cicuitlab");

            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "520"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fham.stackexchange.com%2fquestions%2f13009%2fis-compression-encryption-under-fcc-regs%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            3 Answers
            3






            active

            oldest

            votes








            3 Answers
            3






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2












            $begingroup$

            For governments around the world to continue to trust that amateur radio has no nefarious purpose, it is essential that everyone that wishes to, can "listen in" to any amateur radio communications. Anything that hints at eroding this capability will likely be struck down in time through regulation.



            To pass the FCC legal hurdle regarding obfuscation, it must first be evident that the purpose is not to obscure the message. Part of this test would likely be that the technique must accomplish some useful level of compression if that is really its purpose.



            The legal second test would likely be that can anyone readily decompress the message to return it to its clear text form. This must be very easily achievable due to broad publication or acceptance of the compression method.



            Both tests are important. For example, consider a symmetric encryption scheme using an industry standard and with the encryption key widely published on the web. This will possibly pass the second test but it would fail the first test because it doesn't actually compress the message in any real sense. It is also clear that the public standard is primarily for encryption (obscuring) and not compression (reducing).



            On the other hand, FT8 makes extensive use of compression. The standard is well published so that anyone wishing to decode the bits can do so. Even though the compression "obscures" the message - it is clear the purpose of the technique is compression. Furthermore, the software to copy FT8 transmissions is readily available for free. Everyone can "listen in". So FT8 passes both tests.



            Even Morse Code uses a form of compression by using shorter symbol lengths for the more commonly used letters. Clearly it passes both tests.






            share|improve this answer









            $endgroup$












            • $begingroup$
              "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
              $endgroup$
              – Alexander
              2 hours ago















            2












            $begingroup$

            For governments around the world to continue to trust that amateur radio has no nefarious purpose, it is essential that everyone that wishes to, can "listen in" to any amateur radio communications. Anything that hints at eroding this capability will likely be struck down in time through regulation.



            To pass the FCC legal hurdle regarding obfuscation, it must first be evident that the purpose is not to obscure the message. Part of this test would likely be that the technique must accomplish some useful level of compression if that is really its purpose.



            The legal second test would likely be that can anyone readily decompress the message to return it to its clear text form. This must be very easily achievable due to broad publication or acceptance of the compression method.



            Both tests are important. For example, consider a symmetric encryption scheme using an industry standard and with the encryption key widely published on the web. This will possibly pass the second test but it would fail the first test because it doesn't actually compress the message in any real sense. It is also clear that the public standard is primarily for encryption (obscuring) and not compression (reducing).



            On the other hand, FT8 makes extensive use of compression. The standard is well published so that anyone wishing to decode the bits can do so. Even though the compression "obscures" the message - it is clear the purpose of the technique is compression. Furthermore, the software to copy FT8 transmissions is readily available for free. Everyone can "listen in". So FT8 passes both tests.



            Even Morse Code uses a form of compression by using shorter symbol lengths for the more commonly used letters. Clearly it passes both tests.






            share|improve this answer









            $endgroup$












            • $begingroup$
              "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
              $endgroup$
              – Alexander
              2 hours ago













            2












            2








            2





            $begingroup$

            For governments around the world to continue to trust that amateur radio has no nefarious purpose, it is essential that everyone that wishes to, can "listen in" to any amateur radio communications. Anything that hints at eroding this capability will likely be struck down in time through regulation.



            To pass the FCC legal hurdle regarding obfuscation, it must first be evident that the purpose is not to obscure the message. Part of this test would likely be that the technique must accomplish some useful level of compression if that is really its purpose.



            The legal second test would likely be that can anyone readily decompress the message to return it to its clear text form. This must be very easily achievable due to broad publication or acceptance of the compression method.



            Both tests are important. For example, consider a symmetric encryption scheme using an industry standard and with the encryption key widely published on the web. This will possibly pass the second test but it would fail the first test because it doesn't actually compress the message in any real sense. It is also clear that the public standard is primarily for encryption (obscuring) and not compression (reducing).



            On the other hand, FT8 makes extensive use of compression. The standard is well published so that anyone wishing to decode the bits can do so. Even though the compression "obscures" the message - it is clear the purpose of the technique is compression. Furthermore, the software to copy FT8 transmissions is readily available for free. Everyone can "listen in". So FT8 passes both tests.



            Even Morse Code uses a form of compression by using shorter symbol lengths for the more commonly used letters. Clearly it passes both tests.






            share|improve this answer









            $endgroup$



            For governments around the world to continue to trust that amateur radio has no nefarious purpose, it is essential that everyone that wishes to, can "listen in" to any amateur radio communications. Anything that hints at eroding this capability will likely be struck down in time through regulation.



            To pass the FCC legal hurdle regarding obfuscation, it must first be evident that the purpose is not to obscure the message. Part of this test would likely be that the technique must accomplish some useful level of compression if that is really its purpose.



            The legal second test would likely be that can anyone readily decompress the message to return it to its clear text form. This must be very easily achievable due to broad publication or acceptance of the compression method.



            Both tests are important. For example, consider a symmetric encryption scheme using an industry standard and with the encryption key widely published on the web. This will possibly pass the second test but it would fail the first test because it doesn't actually compress the message in any real sense. It is also clear that the public standard is primarily for encryption (obscuring) and not compression (reducing).



            On the other hand, FT8 makes extensive use of compression. The standard is well published so that anyone wishing to decode the bits can do so. Even though the compression "obscures" the message - it is clear the purpose of the technique is compression. Furthermore, the software to copy FT8 transmissions is readily available for free. Everyone can "listen in". So FT8 passes both tests.



            Even Morse Code uses a form of compression by using shorter symbol lengths for the more commonly used letters. Clearly it passes both tests.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 6 hours ago









            Glenn W9IQGlenn W9IQ

            16.5k11146




            16.5k11146











            • $begingroup$
              "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
              $endgroup$
              – Alexander
              2 hours ago
















            • $begingroup$
              "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
              $endgroup$
              – Alexander
              2 hours ago















            $begingroup$
            "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
            $endgroup$
            – Alexander
            2 hours ago




            $begingroup$
            "Why does this rule exist at all?" Why does this rule exist at all? The same sort of rule doesn't apply to phone lines, internet, WiFi, bluetooth, or a slew of other systems.
            $endgroup$
            – Alexander
            2 hours ago











            0












            $begingroup$

            As long as your compression uses a standard compression method, it is legal and not considered encryption.






            share|improve this answer









            $endgroup$

















              0












              $begingroup$

              As long as your compression uses a standard compression method, it is legal and not considered encryption.






              share|improve this answer









              $endgroup$















                0












                0








                0





                $begingroup$

                As long as your compression uses a standard compression method, it is legal and not considered encryption.






                share|improve this answer









                $endgroup$



                As long as your compression uses a standard compression method, it is legal and not considered encryption.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 8 hours ago









                Mike WatersMike Waters

                3,4242635




                3,4242635





















                    -2












                    $begingroup$

                    Compression is not encryption. You don't have to use a standard compression method.



                    By FCC rules, even encryption is not encryption if you publish the key (and the algorithm).



                    It doesn't matter how you encode the signal if you publish the method to decode it.



                    However, if you spoke plain words but used special words for special meanings in ways that is not published, that would be illegal, as it obscures the meaning.






                    share|improve this answer











                    $endgroup$












                    • $begingroup$
                      How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                      $endgroup$
                      – Mike Waters
                      1 hour ago
















                    -2












                    $begingroup$

                    Compression is not encryption. You don't have to use a standard compression method.



                    By FCC rules, even encryption is not encryption if you publish the key (and the algorithm).



                    It doesn't matter how you encode the signal if you publish the method to decode it.



                    However, if you spoke plain words but used special words for special meanings in ways that is not published, that would be illegal, as it obscures the meaning.






                    share|improve this answer











                    $endgroup$












                    • $begingroup$
                      How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                      $endgroup$
                      – Mike Waters
                      1 hour ago














                    -2












                    -2








                    -2





                    $begingroup$

                    Compression is not encryption. You don't have to use a standard compression method.



                    By FCC rules, even encryption is not encryption if you publish the key (and the algorithm).



                    It doesn't matter how you encode the signal if you publish the method to decode it.



                    However, if you spoke plain words but used special words for special meanings in ways that is not published, that would be illegal, as it obscures the meaning.






                    share|improve this answer











                    $endgroup$



                    Compression is not encryption. You don't have to use a standard compression method.



                    By FCC rules, even encryption is not encryption if you publish the key (and the algorithm).



                    It doesn't matter how you encode the signal if you publish the method to decode it.



                    However, if you spoke plain words but used special words for special meanings in ways that is not published, that would be illegal, as it obscures the meaning.







                    share|improve this answer














                    share|improve this answer



                    share|improve this answer








                    edited 2 hours ago

























                    answered 3 hours ago









                    user10489user10489

                    56516




                    56516











                    • $begingroup$
                      How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                      $endgroup$
                      – Mike Waters
                      1 hour ago

















                    • $begingroup$
                      How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                      $endgroup$
                      – Mike Waters
                      1 hour ago
















                    $begingroup$
                    How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                    $endgroup$
                    – Mike Waters
                    1 hour ago





                    $begingroup$
                    How --and where-- would one "publish the key and the algorithm" so as not to break any laws?
                    $endgroup$
                    – Mike Waters
                    1 hour ago


















                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Amateur Radio Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    Use MathJax to format equations. MathJax reference.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fham.stackexchange.com%2fquestions%2f13009%2fis-compression-encryption-under-fcc-regs%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    -digital-modes, encryption, legal, united-states

                    Popular posts from this blog

                    Mobil Contents History Mobil brands Former Mobil brands Lukoil transaction Mobil UK Mobil Australia Mobil New Zealand Mobil Greece Mobil in Japan Mobil in Canada Mobil Egypt See also References External links Navigation menuwww.mobil.com"Mobil Corporation"the original"Our Houston campus""Business & Finance: Socony-Vacuum Corp.""Popular Mechanics""Lubrite Technologies""Exxon Mobil campus 'clearly happening'""Toledo Blade - Google News Archive Search""The Lion and the Moose - How 2 Executives Pulled off the Biggest Merger Ever""ExxonMobil Press Release""Lubricants""Archived copy"the original"Mobil 1™ and Mobil Super™ motor oil and synthetic motor oil - Mobil™ Motor Oils""Mobil Delvac""Mobil Industrial website""The State of Competition in Gasoline Marketing: The Effects of Refiner Operations at Retail""Mobil Travel Guide to become Forbes Travel Guide""Hotel Rankings: Forbes Merges with Mobil"the original"Jamieson oil industry history""Mobil news""Caltex pumps for control""Watchdog blocks Caltex bid""Exxon Mobil sells service station network""Mobil Oil New Zealand Limited is New Zealand's oldest oil company, with predecessor companies having first established a presence in the country in 1896""ExxonMobil subsidiaries have a business history in New Zealand stretching back more than 120 years. We are involved in petroleum refining and distribution and the marketing of fuels, lubricants and chemical products""Archived copy"the original"Exxon Mobil to Sell Its Japanese Arm for $3.9 Billion""Gas station merger will end Esso and Mobil's long run in Japan""Esso moves to affiliate itself with PC Optimum, no longer Aeroplan, in loyalty point switch""Mobil brand of gas stations to launch in Canada after deal for 213 Loblaws-owned locations""Mobil Nears Completion of Rebranding 200 Loblaw Gas Stations""Learn about ExxonMobil's operations in Egypt""Petrol and Diesel Service Stations in Egypt - Mobil"Official websiteExxon Mobil corporate websiteMobil Industrial official websiteeeeeeeeDA04275022275790-40000 0001 0860 5061n82045453134887257134887257

                    Frič See also Navigation menuinternal link

                    Identify plant with long narrow paired leaves and reddish stems Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?What is this plant with long sharp leaves? Is it a weed?What is this 3ft high, stalky plant, with mid sized narrow leaves?What is this young shrub with opposite ovate, crenate leaves and reddish stems?What is this plant with large broad serrated leaves?Identify this upright branching weed with long leaves and reddish stemsPlease help me identify this bulbous plant with long, broad leaves and white flowersWhat is this small annual with narrow gray/green leaves and rust colored daisy-type flowers?What is this chilli plant?Does anyone know what type of chilli plant this is?Help identify this plant