November 3, 2025

UCSD "Eavesdropping via Unencrypted Satellites"

According to this UC San Diego paper, your cellular data may be sent completely unencrypted when flying, using VoIP services, and even just during day-to-day cellular use. The authors recommend using a VPN to cover these security gaps. Ambit Client, unlike any other VPN, can protect your data in these scenarios as well as from the HNDL threat.

For the brave, details follow from their website:

"What type of network traffic was exposed?

Cellular Backhaul

We observed unencrypted cellular backhaul data sent from the core network of multiple telecom providers and destined for specific cell towers in remote areas. This traffic included unencrypted calls, SMS, end user Internet traffic, hardware IDs (e.g. IMSI), and cellular communication encryption keys.

Military and Government

We observed unencrypted VoIP and internet traffic and encrypted internal communications from ships, unencrypted traffic for military systems with detailed tracking data for coastal vessel surveillance, and operations of a police force.

In‑flight Wi‑Fi

We observed unprotected passenger Internet traffic destined for in-flight Wi-Fi users on airplanes. Visible traffic included passenger web browsing (DNS lookups and HTTPS traffic), encrypted pilot flight‑information systems, and in‑flight entertainment.

VoIP

Multiple VoIP providers were using unencrypted satellite backhaul, exposing unencrypted call audio and metadata from end users.

Internal Commercial Networks

Retail, financial, and banking companies all used unencrypted satellite communications for their internal networks. We observed unencrypted login credentials, corporate emails, inventory records, and ATM networking information.

Critical Infrastructure

Power utility companies and oil and gas pipelines used GEO satellite links to support remotely operated SCADA infrastructure and power grid repair tickets.

Who is Affected & What Should They Do?

End Users

There is no way for end users to know if upstream providers are encrypting their traffic. Nearly all Internet browsing traffic was encrypted by end-user devices using TLS or QUIC, and cellular backhaul exposure was limited to a relatively small number of cell towers in specific remote areas. End users can encrypt network traffic they directly generate by using a VPN; for messaging and voice communications use end to end encrypted apps like Signal.”

Company

Legal

Business Codes

DUNS:
117377067
CAGE:
8HE69
UEID:
GSNWWQZH2JE4

Contact Info

11335 NE 122nd Way, Suite 105
Kirkland, WA 98034
© 2025 Americanbinary. All rights reserved.