Haven't seen this mentioned much on the forums outside of the bit where Motorola accidentally bricked radios with the feature release... but I thought it deserved to have some additional attention drawn to it given a previous thread about TRBO subscriber security. The link below describes the feature in EMEA R2.6, but I believe this was pushed with R2.5.x in NA firmware (R2.6 for "e" series radios, apparently).
http://cwh050.blogspot.com/2016/05/new-in-r26-authenticated-radio-disable.html
It looks like Motorola has gotten around to "fixing" the radio inhibit security vulnerability that Mars and company had reported back to the company back in 2014, by way of the Authenticated Radio Disable feature. It seems that with ARD, when an inhibit command is sent to a subscriber, either knowledge of the device's EP / AES key, or a user passphrase is required to assert the inhibit function, which would keep unauthorized parties from disabling the radio as Mars originally reported.
Of course, "fixed" is in quotes here, because it looks like the ARD option may be a paid EID. Anyone know if ARD comes for free with the new firmware, or is this a paid option?
http://cwh050.blogspot.com/2016/05/new-in-r26-authenticated-radio-disable.html
It looks like Motorola has gotten around to "fixing" the radio inhibit security vulnerability that Mars and company had reported back to the company back in 2014, by way of the Authenticated Radio Disable feature. It seems that with ARD, when an inhibit command is sent to a subscriber, either knowledge of the device's EP / AES key, or a user passphrase is required to assert the inhibit function, which would keep unauthorized parties from disabling the radio as Mars originally reported.
Of course, "fixed" is in quotes here, because it looks like the ARD option may be a paid EID. Anyone know if ARD comes for free with the new firmware, or is this a paid option?