Link to home
Create AccountLog in
Encryption

Encryption

--

Questions

--

Followers

Top Experts

Avatar of john rease
john rease🇺🇸

open source p25 radio

hi:

is there an open source version of a p25 radio?

i've been considering meshtastic or beartooth

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Avatar of nocinoci

does this help:? https://osmocom.org/projects/op25/wiki

Not a lot of traffic on their mailing lists though.

Some stuff only links to the wayback machine.. (internet archive).

 

You may find more here:
https://osmocom.org/projects/tetra/wiki/OsmocomTETRA

(TETRA is  kind-a look alike of P25).

 

Noticing the use case for these not a lot of OSS will be available i guess.

Maybe you can check through the following links?

https://github.com/FreeTAKTeam/openTAKpickList

 


Avatar of john reasejohn rease🇺🇸

ASKER

yeah but I mean for things like tactical communications, when people use P25 radios.

 

 

this seams to only be for scanning, and not transmitting…


ASKER CERTIFIED SOLUTION
Avatar of nocinoci

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.
Create Account

Avatar of john reasejohn rease🇺🇸

ASKER

o ok then. thank you, in that case


Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.

Encryption

Encryption

--

Questions

--

Followers

Top Experts

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.