I had the suspicion about that could be the case.I don’t know if this is the answer you want to hear, but locally the repeater owners do not allow private calls on their repeaters. I’d confirm with the repeater owner that it’s allowed.
Actually, it only ties up only one slot on a DMR repeater, same as using one of the TAC talk groups.Private call ties up the resources for all. Use a phone.
They'll get a busy tone just like they would if the slot was active with another groups traffic. Unless you have an RX group list set or are scanning you wouldn't know why the you are busing out without promiscuous mode to begin with. That's one of the main flaws with amateur DMR.The same as any talkgroup, actually. The only difference is that the slot is tied up and nobody will know why, unless their radio is set to promiscuous monitoring.
How is that any different than P25? A busy tone doesn't give you any details re who is using channel resources, it just tells you they aren't available. And that's the same for both P25 and DMR.Unless you have an RX group list set or are scanning you wouldn't know why the you are busing out without promiscuous mode to begin with. That's one of the main flaws with amateur DMR.
And neither is exceeding the speed limit, but both are done every day.Encryption is never allowed ham radio repeaters in the USA.
Actually, it only ties up only one slot on a DMR repeater, same as using one of the TAC talk groups.
How is that any different than P25? A busy tone doesn't give you any details re who is using channel resources, it just tells you they aren't available. And that's the same for both P25 and DMR.
Well for UK we not allowed to use Encryption at all on Amateur bands.I’m not sure about European rules on encryption. I believe in some areas it can be used but here in the US it is technically illegal but occasionally happens.
Encryption is never allowed ham radio repeaters in the USA.
And neither is exceeding the speed limit, but both are done every day.
Honestly the FCC has much bigger fish to fry. I guess as long as you aren’t using encryption on a radio to coordinate efforts at a protest they could probably care less. Not to mention simplex on low power it would be kind of difficult to get sniffed out of all the radio transmissions. I’m not saying they won’t enforce the rule - they do - it just isn’t a major priority until there is a reason to suspect a crime is being committed on top of a crime.Every single day.
Neither is an issue when done responsibly.
You haven’t experienced radio bliss until you find yourself at a hamfest and you fire up your choice of encryption algorithm. Keeps the goobers at a distance. I’m all for fellowship but I’ll pass on someone’s commentary concerning the cheeseburger at the snackshack.
My general understanding is the FCC has a pretty small number of people assigned to ANY type of enforcement for the Amateur radio servcies. HOWEVER, if I was running Encryption on a lot of ham frequencies/repeaters, I'd be much more worried about ARRL volunteers setting up impromptu surveillance vans for weeks at a time in my area...Honestly the FCC has much bigger fish to fry. I guess as long as you aren’t using encryption on a radio to coordinate efforts at a protest they could probably care less. Not to mention simplex on low power it would be kind of difficult to get sniffed out of all the radio transmissions. I’m not saying they won’t enforce the rule - they do - it just isn’t a major priority until there is a reason to suspect a crime is being committed on top of a crime.
My god, I didn’t realize there was more Natedawgs in this world other than myself and the rapper. Greetings!My general understanding is the FCC has a pretty small number of people assigned to ANY type of enforcement for the Amateur radio servcies. HOWEVER, if I was running Encryption on a lot of ham frequencies/repeaters, I'd be much more worried about ARRL volunteers setting up impromptu surveillance vans for weeks at a time in my area...