[Dxspider-support] VarAC Beacon spots
Laurie, VK3AMA
hamapps.support at vkdxer.com
Tue Dec 6 22:27:59 GMT 2022
On 07/12/2022 7:37 am, Dirk Koopman via Dxspider-support wrote:
>
> But I see it is a development by the ROSMODEM chap. When that first
> appeared it caused quite a few problems on the network as it was using
> a lot of cluster node bandwidth
A brief history lesson on ROSMODEM and its developer.
* The ROS software would post spots to DXSpider nodes pretending to be
a human using a number of different inbuilt message types to give
the impression the spots were human originating. The volume of spots
and the repeated spot formats gave that away.
* While running the software, monitoring activity only, no QSOs, the
software would be posting spots giving the impression that the spot
was for an actual QSO when there was no QSO.
* As nodes started to implement registration to block this behavior
the ROS software would be updated with differing lists of unsecured
nodes to auto-spot to.
* When the ROS author was called out about the auto-spotting he
started to include hard-coded list of the callsigns reporting this
behavior, a blacklist of callsigns that were prevented from running
the software. I know because I ended up on the blacklist because of
calling him out about his software activity. It was easy to see the
hard-coded blacklist, DXSpider nodes and auto-spot message formats
by simply doing a hex-dump of the ROS executable.
Just a warning.
de Laurie VK3AMA
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20221207/0670f793/attachment.htm>
More information about the Dxspider-support
mailing list