United State's NGAD & F/A-XX Fighter Programs : Updates and Discussions

So basically what you're suggesting is this e virus like Stuxnet that sweetie's harping about is very difficult to introduce into a Chinese IADS & that it's something which can be done for less sophisticated IADS .

Please note sweetie . Learn something constructive from the above write up or come up with an informed rebuttal instead of making a nuisance of yourself out here. Ja ? @Innominate

Let's leave nationality, it makes things emotional, defensive, egoistic, arrogant.

All of us want our offence & defence both to succeed, right? So does the enemy.

From purely tech PoV, for successfull hack, the H/w & S/w aspects of target should be known otherwise how to start in 1st place also is not known.
Secret custom communication protocol.
Secret custom multiple security protocols.
Secret, changing frequency hopping pattern.
Secret, changing passocdes & encryption keys.
Secret H/w architecture.

All wrong pattern of 0s & 1s will be detected & rejected, initially.
So the 1st step of handshake & synchronisation will fail.
Then, spoofing, copying & masquerading like imposter can get us in BUT very limitedly.

The encryption keys alone makes things impossible bcoz they can be 128/256/512 bit leading to billions of combinations.
1747584487484.png

A Super-computer with AI & brute force attack focussing all its power on breaking the key can also take years.

1747585082402.png

This is not guessing our lost email, FB account password with unlimited attempts.
In military, just 1 wrong attempt is enough for suspicion. It can be relaxed to 2, 3 or fw more attempts, may be, IDK exactly, considering jamming, poor signal strength, cross-talk, etc.

An entire industry is dedictaed to cyber-security.

REAL LIFE has spies, BUT is NOT like MISSION IMPOSSIBLE, SWORDFISH or any other spy/hack movie.
 
  • Like
Reactions: _Anonymous_
They think they are stronger than the Chinese in cyber warfare, but the opposite will be true.
One day China may be better than the US. The only thing I'm sure of. They won't have France in the conversation of better EW.

You aren't even up to Australian standards
 
Let's leave nationality, it makes things emotional, defensive, egoistic, arrogant.

All of us want our offence & defence both to succeed, right? So does the enemy.

From purely tech PoV, for successfull hack, the H/w & S/w aspects of target should be known otherwise how to start in 1st place also is not known.
Secret custom communication protocol.
Secret custom multiple security protocols.
Secret, changing frequency hopping pattern.
Secret, changing passocdes & encryption keys.
Secret H/w architecture.

All wrong pattern of 0s & 1s will be detected & rejected, initially.
So the 1st step of handshake & synchronisation will fail.
Then, spoofing, copying & masquerading like imposter can get us in BUT very limitedly.

The encryption keys alone makes things impossible bcoz they can be 128/256/512 bit leading to billions of combinations.
View attachment 43474

A Super-computer with AI & brute force attack focussing all its power on breaking the key can also take years.

View attachment 43478

This is not guessing our lost email, FB account password with unlimited attempts.
In military, just 1 wrong attempt is enough for suspicion. It can be relaxed to 2, 3 or fw more attempts, may be, IDK exactly, considering jamming, poor signal strength, cross-talk, etc.

An entire industry is dedictaed to cyber-security.

REAL LIFE has spies, BUT is NOT like MISSION IMPOSSIBLE, SWORDFISH or any other spy/hack movie.
Well there we go . A proper technical answer to the reasons E virus like Stuxnet is a non starter as far as the Chinese go or even any other country with a sophisticated IADS unless of course it's some rag tag group in Libya we're talking about .

We can't even say that about the Houthis can we now sweetie ?

Please note @Rajput Lion

Yet another instance where sweetie avoids a technical discussion for it's completely out of syllabi. Also the fact that sweetie's studying intersectionalism in university doesn't help sweetie's case at all , Ja ? @Innominate
 
Well there we go . A proper technical answer to the reasons E virus like Stuxnet is a non starter as far as the Chinese go or even any other country with a sophisticated IADS unless of course it's some rag tag group in Libya we're talking about .

We can't even say that about the Houthis can we now sweetie ?

Please note @Rajput Lion

Yet another instance where sweetie avoids a technical discussion for it's completely out of syllabi. Also the fact that sweetie's studying intersectionalism in university doesn't help sweetie's case at all , Ja ? @Innominate

In conflicts, psychological & intimidation tactics are also used.👻:LOL:
Every military, even the small ones say "We're ready to defend & die", so the bigger ones will obviously boast about their capabilities & intimidate others, espeically if they invented something, that's all. That's very expected regular thing.🤷‍♂️

Non-Western people if educated & capable, don't need ISOC, IETF, IANA, TCP/IP, ISO standards, etc for their Military & govt. infrastructure. They should develop their own. MIL-STD or Military Standards, unkown to public, are actually developed by educated nations.
GoI & our DoD have already raised concerns on using foreign things like MS Windows, apps, database, anti-virus, etc for example in govt. & military offices, thermal/hydel/nuclear power plants, etc.

USA wants to sell F-35 but afraid to share even the basic code for customization. They think giving it to Israel was mistake. So further if they wanna export downgraded NGAD then they'll have to discuss & share some CW aspects also.

I think we should open a new thread to discuss Cyber-warfare.
 
Here is the V2 with wing lengthened, leading edge angle increased.
The canard had to be shortened, maintaining planform design. With TVC nozzles, big canards may not be required.
I made the nose narrower, triangular to lessen drag & RCS.
Comparison with V1 is also shown.
The day i'll get a light weight, old, stable version of some 3D CAD S/w for my old laptop, i'll start translating these into 3D.
Feedbacks are welcome, i'm making a V3 also.

View attachment 42307

Version 3a & 3b with Lambda wing getting popular & nose triangular & double delta.

1748285895269.png
 
I should have posted this before F-47 announcement when advertisements about the preliminary NGAD design speculations of delta, cropped diamond wings were floating. So Versions 4, 5 related to that.
And then V6c like SR-72, Darkstar. :cool:;)🥁

1748790715363.png
1748790728319.png
1748790736707.png