If there was Internet during the Second World War, we would have the Enigma machine captors, posting selfies on Twitter 10 min after...get a grip guys.
Actually, you had the Chicago Tribune revealing that the US had cracked the Japanese naval code before Midway. Fortunately, the Japanese took this for mere boasting.
Can someone explain, how can this be used over unsecure networks. You still have metadata leak. Right?
Operator knows exactly who is talking to whom(?) An sees that it is encrypted, then just prevents communication or sends someone to location.
Right. Block and stream
Ciphers themselves can only protect message content. The leak the message length and any peer metadata during the exchange. A perfect cipher produces a message that is indistinguishable from randomness, and can encode all possible messages. This is an intrinsic problem, when we want to hide the cipher texts existence, we usually call that steganography which is a different class of problem. Likewise, hiding the communication graph or message length is more akin to mixnets and anonymity networks/routing.
It’s three classes of problems, of which encryption is the base layer, but we need more constructions to achieve the other layers.
If the idea is to transmit a planned time to initiate an offensive, or some other orders that will not be carried out immediately, then it certainly makes sense.
One could hand off the messages to a Morse operator (or what have you) on just about any network, to include some set up after major EMP events, survivors of the events, or some immune to their effects — e.g. print the message out and send it by carrier pigeon or runner, use a heliograph [0], etc. The important thing is that your encryptor still works.
On 10 March 2022, photographs of an M-427 unit surfaced on the internet, allegedly confiscated by Ukraine from a seized Russian command post near Kiev (Ukraine) [1][2]. It is currently unclear whether this is indeed the case, or whether this is misinformation.
True! With a general purpose appliance, one needs to define what outdated means. Is it fit for purpose (is the crypto strong enough against resourced adversaries), is it serviceable and reliable as hardware.
In both cases, this would be yes. Nobody says their toaster is outdated beyond aesthetics. Does it toast? Is it repairable?