UC San Diego and the College of Maryland researchers have reported findings exhibiting that roughly half of GEO satellite tv for pc downlinks carry information with out encryption.
Additional, information interception might be reproduced with simply $800 of shopper {hardware}.
Per WIRED, the workforce captured telco backhaul, industrial management visitors, and law-enforcement communications, and reported fixes to affected suppliers the place potential.
UCSD’s Techniques and Networking group lists the paper “Don’t Look Up” for CCS 2025 in Taipei, reinforcing that this isn’t a lab curiosity however a documented, peer-reviewed disclosure pipeline. The tactic targets legacy satellite tv for pc backhaul quite than any single utility layer.
Furthermore, the study coated solely a slice of seen satellites from San Diego, which suggests a wider international floor.
Bitcoin in area – new dangers from low-cost {hardware}
For Bitcoin miners and swimming pools working from distant websites, the publicity maps cleanly to at least one operational selection: transport safety on the trail that carries Stratum.
Stratum is the protocol that connects miners to swimming pools, distributes work templates, collects shares and block candidates, directs hashpower, and determines how rewards are accounted for.
Historic deployments of Stratum V1 usually run over plaintext TCP until operators explicitly allow TLS, which suggests pool endpoints, miner identifiers, and job templates can traverse radio hyperlinks within the clear when satcom backhaul is in play.
The Stratum V2 specification ships with authenticated encryption by default, utilizing a Noise handshake and AEAD ciphers, which closes the passive interception angle and hardens integrity in opposition to share hijack makes an attempt that rely upon manipulation of upstream visitors.
Based on the Stratum V2 security spec, operators can bridge older rigs via a translation proxy, so firmware swaps on ASICs should not required to start out encrypting periods.
This satellite tv for pc discovering doesn’t implicate each “Bitcoin over area” system.
Blockstream Satellite tv for pc broadcasts public Bitcoin block information as a one-way downlink, and its Satellite tv for pc API helps encrypted messages from senders, which locations it in a unique class than GEO backhaul, which transports non-public management visitors.
Per Blockstream, the service exists to enhance community resilience for receiving blocks in areas with poor web entry and to not carry pool credentials or miner management periods. Blockstream’s May network update confirms ongoing operations and frequency adjustments, and doesn’t change the risk mannequin for Stratum hyperlinks that miners management.
Funds stress issues for safety rollouts. Hashrate is hovering close to 1.22 ZH/s, and up to date miner economics put hashprice round $51 per PH per day in late September, with the forward curve within the high-forties to low-fifties into the primary half of 2026.
Based on Hashrate Index, the up to date This fall 2025 heatmap particulars nation shares, which helps infer the place satellite tv for pc backhaul is extra widespread attributable to terrestrial constraints. Current income situations imply operators watch working prices carefully, but the first expense for transport encryption is engineering time, not new {hardware}, which lowers friction for near-term hardening.
A easy sensitivity mannequin frames the draw back if community parts nonetheless ship Stratum V1 over unencrypted satellite tv for pc hyperlinks.
Safety modeling
Let H denote whole hashrate close to 1,223 EH/s, and outline p_sat because the share utilizing satellite tv for pc backhaul, p_geo because the share of these on GEO quite than encrypted LEO or terrestrial, and p_v1 because the share nonetheless operating Stratum V1 with out TLS.
At-risk hashrate equals H × p_sat × p_geo × p_v1. The ranges under illustrate order-of-magnitude publicity and the worth of migration to TLS or Stratum V2.
| State of affairs | Assumptions (p_sat / p_geo / p_v1) | EH/s at confidentiality threat |
|---|---|---|
| Low | 0.5% / 30% / 20% | 0.37 |
| Base | 1% / 50% / 40% | 2.45 |
| Excessive | 3% / 60% / 50% | 11.01 |
| Worst-case | 5% / 60% / 60% | 22.01 |
The operational steerage follows instantly from the protocol stack.
First, implement TLS throughout all Stratum V1 endpoints and on the routers in entrance of them. Then, favor Stratum V2 for brand new hyperlinks and add an SV1→SV2 translation proxy the place {hardware} constraints exist.
TLS 1.3 handshakes are full in a single spherical journey, and manufacturing measurements present low CPU and community overhead on trendy techniques.
The efficiency value is limited in most deployments, which clears a typical objection for distant websites that watch latency and utilization. Based on the Stratum V2 spec, authenticated encryption protects each confidentiality and integrity of channel messages, which removes the simple win for passive eavesdroppers documented by the satellite tv for pc examine.
Backhaul selections matter past header encryption.
The place operators can keep away from legacy GEO, an encrypted LEO service or terrestrial path reduces interception threat, though no transport selection replaces endpoint hygiene.
When GEO stays crucial, implement encryption at each hop, disable insecure administration interfaces on satellite tv for pc modems, and monitor for anomalies in share patterns and endpoint drift that would reveal interference.
The UCSD and UMD work reveals that downlink interception is reasonable and scalable with commodity {hardware}, which weakens any assumption that radio hyperlinks escape consideration attributable to bodily distance from the adversary.
Suppliers, together with T-Cell, addressed particular findings after disclosure, which reveals that remediation is sensible as soon as visibility exists.
Can this be patched?
The subsequent yr will decide how shortly swimming pools and miners normalize encrypted transport. One path is safe by default, the place swimming pools settle for V1 solely over TLS and promote V2 broadly. Translation proxies clean the transition for older fleets, compressing the window for interception.
A slower path leaves a protracted tail of unencrypted or partially encrypted websites, creating opportunistic publicity for actors with uplink interference capabilities.
A 3rd path resists change and banks on obscurity, which turns into more durable to justify as instruments from the examine percolate and proof-of-concepts transfer from academia to hobbyist communities.
None of those trajectories requires protocol invention, solely deployment selections that align with well-understood primitives.
Confusion round Blockstream Satellite tv for pc can distract from the actionable repair. Pool credentials don’t stay within the broadcast of public block information, and its API helps encrypted payloads for consumer messages, which separates resilience from control-plane privateness.
The service strengthens receive-side redundancy for the Bitcoin community in areas with weak connectivity, and doesn’t exchange transport safety on miner-to-pool hyperlinks.
The examine makes one level clear for operators who run from the sting on radio backhaul: plaintext management visitors is now trivial to watch, and encrypting Stratum is an easy, low-overhead repair.
The operational path is TLS for V1 at present, then Stratum V2.
Noderunner threat
Node operators, or “noderunners,” face a unique threat profile than miners as a result of Bitcoin nodes sometimes obtain and relay public blockchain information quite than non-public credentials or cost directions.
Operating a full node doesn’t require transmitting delicate authentication materials over a satellite tv for pc hyperlink; the information exchanged, blocks, and transactions are already public by design.
Nonetheless, if a node depends on GEO satellite tv for pc backhaul for bidirectional web entry, the identical publicity that impacts any unencrypted TCP visitors applies: friends, IPs, and message metadata might be noticed or spoofed if transport encryption is absent.
Utilizing Tor, VPNs, or encrypted overlay networks like I2P minimizes this footprint.
In distinction to miners utilizing Stratum V1, node operators should not leaking value-bearing management visitors however ought to nonetheless encrypt administration interfaces and community tunnels to stop deanonymization or routing interference.

