The #NSA with the help of #philips #backdoored (again!) a european military messaging #device in the 80ies, a few years ago the fine people of the #cryptomuseum published everything they knew about it - including a #firmware dump:
https://www.cryptomuseum.com/crypto/philips/ua8295/

back then i #reverseEngineered this, and last week finally cleaned it up, and publish it today:

https://rad.ctrlc.hu/nodes/rad.ctrlc.hu/rad:z46AkAERuXAzqZcDRKvE7byRbkga1

also on the bad site: https://github.com/stef/UA-8295-NSA

update: it's a thread: 1/n

UA-8295

Wow, this has taken a lot of staring at 3D scans to understand, but we're ready to look at the full mechanism on the SG-41 to get the key pressed lined up with the paper! I hope you're enjoying following along with me on this project. #tnmoc #bletchleypark #cryptomuseum
A couple of new components added to #VirtualM209 this week which connect some of the other parts together. Here's a quick explanation of how they work. Need to start thinking about how to do the print mechanism soon! #tnmoc #bletchleypark #cryptomuseum

> LE SPHINX 1 was a pocket cryptographic device, developed around 1930 by Société des Codes Télégraphiques Georges Lugagne in Paris (France). The device consists of 10 sliding bars with two scrambled alphabets each, and should therefore be classed as an alphabet transposition cipher. At the time, it was advertised as a method for secret writing when sending (radio) telegrams.

https://www.cryptomuseum.com/crypto/lugagne/sphinx/index.htm

#crypto #history #france #cryptomuseum

Le Sphinx