Comment by m4rtink
3 hours ago
AFAIK they used GPS spoofing which confuses the Starlink terminals - they need to know where they are to properly connect to the satellites above.
This can be overriden to use "Starlink positioning" where the terminal ignores GPS signals and dtermines its position based on Starlink satellite signals. I think this is what is used in Ukraine where GPS is mostly jammed/spoofed to hell even far from the front.
The GPS positioning is the default as it is likely more user friendly/has quicker lock in normal circumstances.
Another venue of attack could be the Starlink WiFi AP included in the terminals- you could track that down.
So in general:
* switch the terminal to Starlink positioning
* disable the Starkink terminal WiFi AP and conect by ethernet or connect an AP via ethernet with a new SSID and different MAC address
And it should be good to go.
No comments yet
Contribute on Hacker News ↗