I was reading over the guide that just dropped on sharefiles about security and keys. While there were several things that puzzled me such as security policies of one subscriber unit automatically populating across entire fleet I thought I'd just ask one at a time. The section "Share System Programming without Sharing ESKs" caught my attention. As a mostly auxiliary role person, I'm not likely to be given my own Child key and at most given temporary custody of an ESK for purpose of a particular event or operation. If I get credentialed as a TRS programmer it might change but unlikely. So, the ability of being able to program without possessing the system key of course caught my attention. I applaud the effort but it does seem that the process is cumbersome especially on part of party possessing the ESK. Without dire need I don't envision that the key possessor would be inclined to use the process. Maybe some of you on this forum might experiment on using this method and report back a pro/con report.
Now here is my offbeat question: Using this method, would the subscriber unit be able to be reloaded with the system in the future? For me, I'd like the option to clear out what I'm not using at the moment but have the option to reload the system in the future when I do need it. I realize it would be specific to a particular radio (esn, ID etc). I doubt this would be an intended purpose for the non-esk method but might it be an unintended feature?
Now here is my offbeat question: Using this method, would the subscriber unit be able to be reloaded with the system in the future? For me, I'd like the option to clear out what I'm not using at the moment but have the option to reload the system in the future when I do need it. I realize it would be specific to a particular radio (esn, ID etc). I doubt this would be an intended purpose for the non-esk method but might it be an unintended feature?