I read it took less than a week to discover how to unravel the GLONASS military signals after they were turned on... -------------- > This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.