Hi all, I'm new to this post list.<br><br>I have not been very worried of "pirates" using APRS IS, but today I noticed one locally on <a href="http://aprs.fi" target="_blank">aprs.fi</a> using iAPRS for Apple's IOS.<br>
As it is only on Internet I'm not that worried, however, there is a possibility that this information could go to a TX Igate which would broadcast the information, being either positon or messages, as position is always gated after a message. That'd make the operator of the TX igate responsable for illegal use of the amateur frequency. Over here this is a great concern, as connecting internet and RF is on a very gray zone, legally speaking. <br>
<br>The "pirate":<br><a href="http://aprs.fi/info/a/STEBBI-9" target="_blank">http://aprs.fi/info/a/STEBBI-9</a><br><br>Now what can be done about this?<br>I suppose doing modification on all the TX igates to do some verification of the sender of the message, but it could be quite painful.<br>
<br><br>Not very familiar with iAPRS, it seems that it's just a frontend for OpenAPRS, and it seems to me that it does not do any passcode verification. Anyone correct me if I'm wrong. Now I know that passcode verification is not really that much of a verification, but having a bad verification is the better of worse.<br>
<br>I'm quite sure that there are other countries than Iceland who are running on gray zone concerning RF to IS and vica versa traffic. Apperantly France has the same concerns, and pirates on APRS-IS is not helping.<br>
<br>So, what should I do? Try to implement blacklisting on all the TX Igates over here? (Thankfully, they are not that many at the moment) or just stop all the TX IGates? That would kind of ruin one of a very great usable feature in APRS.<br>
<br>Sorry if this post sounds abit confusing, I'm a little puzzled about this matter.<br><br><div>73 de TF2SUT - Samúel<br></div>