If you are going to tell me that an MRAP or L-ATV is not built to much, much higher durability, survivability and capability standards than a consumer grade vehicle, you’re off your rocker.
Yes. Military Grade ‘stuff’ is often done by lowest bidders. Whoah, so are nearly all consumer products!
The difference in this case is fundamentally different approaches to design. Hugely different kinds of suspension systems and body design, etc.
No, its obviously not a literal indestructibility modifier.
But it sure goes a long way further toward it in many cases.
Ya,know. You have done the “unthinkable” and actually changed my mind about military grade stuff when you put it that way! This is not sarcasm, I’m for real
Hooray! I’m glad to have done the unthinkable then, aha.
Yeah, as much as there often is merit to criticizing aspects of many elements of military gear… a lot of those criticisms get overblown and recontextualized to seemingly comparable other kinds of goods or equipment in a way that kind of misses certain crucial aspects.
Maybe an actual good example of ‘Military Grade’ actually meaning ‘crap’ would be the kind of gunpowder used in the earlier production of 5.56 rounds for the first generation of M16s in Vietnam.
That is an actual case where going to the lowest bidder for what turned out to be gunpowder that burned too dirty for early M16s, combined with a lot of hype around the M16 being ‘self-cleaning’ leading to initially no or very few cleaning kits being issued… yeah that led to a whole lot of the guns jamming up.
But this doesnt mean you can just blanket point to all military grade stuff and say its garbage.
There are legitimate military-grade designations. Military-grade encryption is one. It entails a mandatory physical component. Quite expensive without even considering the logistics behind securing such a device. Not cheap by any means, and yet it really bothers me that you can buy “military-grade” encryption without the hardware for consumer products. That’s…just regular encryption guys…
For stuff that legitimately has such designations on the consumer side, it’s not just cheap - it’s incorrect, incompatible, or illegal.
What specifically gives the physical component better encryption than a pure software solution? It’s just a stream of data, anything hardware can do to it can also be done by software. Purpose-built hardware is generally faster than general-purpose hardware, but if you don’t mind the speed difference, the encrypted data should be just as secure whether a physical component was involved or its role was played by software.
From a birdeye view, nothing. And that’s not what the designation attempts to address. It’s not even about how fast the hardware is, as encryption doesn’t require lots of processing power and key delivery systems are relatively simple devices.
It’s about control. Encryption in general is robust and nobody directly tries to break the algorithm. Most breaches are done by bypassing the encryption entirely. By adding a hardware component, it makes it very difficult to do so. It also creates a one-way bridge for key delivery - once you put keys into the device you cannot remove it. The only option is to delete it. Most of the devices are also hardened - they emit no signals, resist interference, and have various preventions that will dump keys and software in the event the device is tampered with. Add to the fact that because it’s physical in nature and not some boogeyman subsystem buried deep in a server, you can point to it, tell someone to guard it, and put it in a vault. Most also have an accessible wipe button, which makes it easy to prioritize what gets destroyed if the need calls for it. There are many more things, but I think I made my point.
It’s still hard for the consumer market to have a physical component for encryption. Even for those that do, it’s still not robust enough. You can get legitimate military-grade encryption, with all its bells and whistles, but it’s incredibly expensive and requires specific requirements by the NSA. But afaik, there is no cheap alternative, and most of what you see being advertised is just marketing gibberish.
I believe they are talking about systems that require the input of a … haha ‘closed source’ (meaning classified) physical hardware/software system that is completely non networked that requires a human being to be physically using /at least/ one entirely, totally sandboxxed device to complete the authentication process of accessing information on a networked device.
Kind of like an extremely more advanced version of the enigma machine + codebook system.
I may be wrong here though about specifically what they are referring to, I don’t actually have any actual experience with real milgrade cybersecurity stuff.
The sort of cheapo way to do something like this is something I’ve seen at various points in my tech industry career, basically a yubikey or similar devices.
Perhaps another example somewhat along these lines would be ‘military grade’ laptops.
No, not (usually) the stuff marketed as milgrade, actual military grade laptops that are nearly bullet proof suitcases that can survive a bomb going off near them or being dropped out of a moving vehicle.
They also have other comms capabilities and such, but I think the main point here is … heres a thing thats /actually/ physically durable and tough, faaaar more so than basically any consumer grade laptop.
Is this a practical level of protection needed by most consumers? Probably not. But, it might be handy in an apocalypse scenario.
To clear up some confusion. “Military Grade” just means the cheapest bid. It’s not some magic Indestructible Modifier.
If you are going to tell me that an MRAP or L-ATV is not built to much, much higher durability, survivability and capability standards than a consumer grade vehicle, you’re off your rocker.
Yes. Military Grade ‘stuff’ is often done by lowest bidders. Whoah, so are nearly all consumer products!
The difference in this case is fundamentally different approaches to design. Hugely different kinds of suspension systems and body design, etc.
No, its obviously not a literal indestructibility modifier.
But it sure goes a long way further toward it in many cases.
Ya,know. You have done the “unthinkable” and actually changed my mind about military grade stuff when you put it that way! This is not sarcasm, I’m for real
Hooray! I’m glad to have done the unthinkable then, aha.
Yeah, as much as there often is merit to criticizing aspects of many elements of military gear… a lot of those criticisms get overblown and recontextualized to seemingly comparable other kinds of goods or equipment in a way that kind of misses certain crucial aspects.
Maybe an actual good example of ‘Military Grade’ actually meaning ‘crap’ would be the kind of gunpowder used in the earlier production of 5.56 rounds for the first generation of M16s in Vietnam.
That is an actual case where going to the lowest bidder for what turned out to be gunpowder that burned too dirty for early M16s, combined with a lot of hype around the M16 being ‘self-cleaning’ leading to initially no or very few cleaning kits being issued… yeah that led to a whole lot of the guns jamming up.
But this doesnt mean you can just blanket point to all military grade stuff and say its garbage.
There are legitimate military-grade designations. Military-grade encryption is one. It entails a mandatory physical component. Quite expensive without even considering the logistics behind securing such a device. Not cheap by any means, and yet it really bothers me that you can buy “military-grade” encryption without the hardware for consumer products. That’s…just regular encryption guys…
For stuff that legitimately has such designations on the consumer side, it’s not just cheap - it’s incorrect, incompatible, or illegal.
What specifically gives the physical component better encryption than a pure software solution? It’s just a stream of data, anything hardware can do to it can also be done by software. Purpose-built hardware is generally faster than general-purpose hardware, but if you don’t mind the speed difference, the encrypted data should be just as secure whether a physical component was involved or its role was played by software.
At least that’s how I understand it.
From a birdeye view, nothing. And that’s not what the designation attempts to address. It’s not even about how fast the hardware is, as encryption doesn’t require lots of processing power and key delivery systems are relatively simple devices.
It’s about control. Encryption in general is robust and nobody directly tries to break the algorithm. Most breaches are done by bypassing the encryption entirely. By adding a hardware component, it makes it very difficult to do so. It also creates a one-way bridge for key delivery - once you put keys into the device you cannot remove it. The only option is to delete it. Most of the devices are also hardened - they emit no signals, resist interference, and have various preventions that will dump keys and software in the event the device is tampered with. Add to the fact that because it’s physical in nature and not some boogeyman subsystem buried deep in a server, you can point to it, tell someone to guard it, and put it in a vault. Most also have an accessible wipe button, which makes it easy to prioritize what gets destroyed if the need calls for it. There are many more things, but I think I made my point.
It’s still hard for the consumer market to have a physical component for encryption. Even for those that do, it’s still not robust enough. You can get legitimate military-grade encryption, with all its bells and whistles, but it’s incredibly expensive and requires specific requirements by the NSA. But afaik, there is no cheap alternative, and most of what you see being advertised is just marketing gibberish.
I believe they are talking about systems that require the input of a … haha ‘closed source’ (meaning classified) physical hardware/software system that is completely non networked that requires a human being to be physically using /at least/ one entirely, totally sandboxxed device to complete the authentication process of accessing information on a networked device.
Kind of like an extremely more advanced version of the enigma machine + codebook system.
I may be wrong here though about specifically what they are referring to, I don’t actually have any actual experience with real milgrade cybersecurity stuff.
The sort of cheapo way to do something like this is something I’ve seen at various points in my tech industry career, basically a yubikey or similar devices.
Perhaps another example somewhat along these lines would be ‘military grade’ laptops.
No, not (usually) the stuff marketed as milgrade, actual military grade laptops that are nearly bullet proof suitcases that can survive a bomb going off near them or being dropped out of a moving vehicle.
They also have other comms capabilities and such, but I think the main point here is … heres a thing thats /actually/ physically durable and tough, faaaar more so than basically any consumer grade laptop.
Is this a practical level of protection needed by most consumers? Probably not. But, it might be handy in an apocalypse scenario.