UC San Diego and the College of Maryland researchers have reported findings exhibiting that roughly half of GEO satellite tv for pc downlinks carry knowledge with out encryption.
Additional, knowledge interception might be reproduced with simply $800 of shopper {hardware}.
Per WIRED, the workforce captured telco backhaul, industrial management site visitors, and law-enforcement communications, and reported fixes to affected suppliers the place potential.
UCSD’s Programs and Networking group lists the paper “Don’t Look Up” for CCS 2025 in Taipei, reinforcing that this isn’t a lab curiosity however a documented, peer-reviewed disclosure pipeline. The tactic targets legacy satellite tv for pc backhaul moderately than any single software layer.
Furthermore, the study lined solely a slice of seen satellites from San Diego, which means a wider world floor.
Bitcoin in house – new dangers from low-cost {hardware}
For Bitcoin miners and swimming pools working from distant websites, the publicity maps cleanly to 1 operational selection: transport safety on the trail that carries Stratum.
Stratum is the protocol that connects miners to swimming pools, distributes work templates, collects shares and block candidates, directs hashpower, and determines how rewards are accounted for.
Historic deployments of Stratum V1 typically run over plaintext TCP except operators explicitly allow TLS, which suggests pool endpoints, miner identifiers, and job templates can traverse radio hyperlinks within the clear when satcom backhaul is in play.
The Stratum V2 specification ships with authenticated encryption by default, utilizing a Noise handshake and AEAD ciphers, which closes the passive interception angle and hardens integrity towards share hijack makes an attempt that rely on manipulation of upstream site visitors.
In line with the Stratum V2 security spec, operators can bridge older rigs via a translation proxy, so firmware swaps on ASICs usually are not required to begin encrypting periods.
This satellite tv for pc discovering doesn’t implicate each “Bitcoin over house” system.
Blockstream Satellite tv for pc broadcasts public Bitcoin block knowledge as a one-way downlink, and its Satellite tv for pc API helps encrypted messages from senders, which locations it in a special class than GEO backhaul, which transports personal management site visitors.
Per Blockstream, the service exists to enhance community resilience for receiving blocks in areas with poor web entry and to not carry pool credentials or miner management periods. Blockstream’s May network update confirms ongoing operations and frequency modifications, and doesn’t change the risk mannequin for Stratum hyperlinks that miners management.
Funds strain issues for safety rollouts. Hashrate is hovering close to 1.22 ZH/s, and up to date miner economics put hashprice round $51 per PH per day in late September, with the forward curve within the high-forties to low-fifties into the primary half of 2026.
In line with Hashrate Index, the up to date This fall 2025 heatmap particulars nation shares, which helps infer the place satellite tv for pc backhaul is extra widespread as a result of terrestrial constraints. Current income situations imply operators watch working prices intently, but the first expense for transport encryption is engineering time, not new {hardware}, which lowers friction for near-term hardening.
A easy sensitivity mannequin frames the draw back if community parts nonetheless ship Stratum V1 over unencrypted satellite tv for pc hyperlinks.
Safety modeling
Let H denote whole hashrate close to 1,223 EH/s, and outline p_sat because the share utilizing satellite tv for pc backhaul, p_geo because the share of these on GEO moderately than encrypted LEO or terrestrial, and p_v1 because the share nonetheless working Stratum V1 with out TLS.
At-risk hashrate equals H × p_sat × p_geo × p_v1. The ranges beneath illustrate order-of-magnitude publicity and the worth of migration to TLS or Stratum V2.
| State of affairs | Assumptions (p_sat / p_geo / p_v1) | EH/s at confidentiality threat |
|---|---|---|
| Low | 0.5% / 30% / 20% | 0.37 |
| Base | 1% / 50% / 40% | 2.45 |
| Excessive | 3% / 60% / 50% | 11.01 |
| Worst-case | 5% / 60% / 60% | 22.01 |
The operational steerage follows instantly from the protocol stack.
First, implement TLS throughout all Stratum V1 endpoints and on the routers in entrance of them. Then, choose Stratum V2 for brand new hyperlinks and add an SV1→SV2 translation proxy the place {hardware} constraints exist.
TLS 1.3 handshakes are full in a single spherical journey, and manufacturing measurements present low CPU and community overhead on trendy methods.
The efficiency value is limited in most deployments, which clears a standard objection for distant websites that watch latency and utilization. In line with the Stratum V2 spec, authenticated encryption protects each confidentiality and integrity of channel messages, which removes the straightforward win for passive eavesdroppers documented by the satellite tv for pc examine.
Backhaul selections matter past header encryption.
The place operators can keep away from legacy GEO, an encrypted LEO service or terrestrial path reduces interception threat, though no transport selection replaces endpoint hygiene.
When GEO stays needed, implement encryption at each hop, disable insecure administration interfaces on satellite tv for pc modems, and monitor for anomalies in share patterns and endpoint drift that would reveal interference.
The UCSD and UMD work exhibits that downlink interception is reasonable and scalable with commodity {hardware}, which weakens any assumption that radio hyperlinks escape consideration as a result of bodily distance from the adversary.
Suppliers, together with T-Cellular, addressed particular findings after disclosure, which exhibits that remediation is sensible as soon as visibility exists.
Can this be patched?
The subsequent yr will decide how shortly swimming pools and miners normalize encrypted transport. One path is safe by default, the place swimming pools settle for V1 solely over TLS and promote V2 broadly. Translation proxies easy the transition for older fleets, compressing the window for interception.
A slower path leaves an extended tail of unencrypted or partially encrypted websites, creating opportunistic publicity for actors with uplink interference capabilities.
A 3rd path resists change and banks on obscurity, which turns into tougher to justify as instruments from the examine percolate and proof-of-concepts transfer from academia to hobbyist communities.
None of those trajectories requires protocol invention, solely deployment selections that align with well-understood primitives.
Confusion round Blockstream Satellite tv for pc can distract from the actionable repair. Pool credentials don’t dwell within the broadcast of public block knowledge, and its API helps encrypted payloads for consumer messages, which separates resilience from control-plane privateness.
The service strengthens receive-side redundancy for the Bitcoin community in areas with weak connectivity, and doesn’t substitute transport safety on miner-to-pool hyperlinks.
The examine makes one level clear for operators who run from the sting on radio backhaul: plaintext management site visitors is now trivial to look at, and encrypting Stratum is a simple, low-overhead repair.
The operational path is TLS for V1 at present, then Stratum V2.
Noderunner threat
Node operators, or “noderunners,” face a special threat profile than miners as a result of Bitcoin nodes sometimes obtain and relay public blockchain knowledge moderately than personal credentials or cost directions.
Operating a full node doesn’t require transmitting delicate authentication materials over a satellite tv for pc hyperlink; the info exchanged, blocks, and transactions are already public by design.
Nevertheless, if a node depends on GEO satellite tv for pc backhaul for bidirectional web entry, the identical publicity that impacts any unencrypted TCP site visitors applies: friends, IPs, and message metadata could possibly be noticed or spoofed if transport encryption is absent.
Utilizing Tor, VPNs, or encrypted overlay networks like I2P minimizes this footprint.
In distinction to miners utilizing Stratum V1, node operators usually are not leaking value-bearing management site visitors however ought to nonetheless encrypt administration interfaces and community tunnels to forestall deanonymization or routing interference.

