Let me know if there is a better community for this type of question. I am still learning my way around.

  • @[email protected]
    link
    fedilink
    601 year ago

    Why do you assume, they had no such concern? There were seals to ensure authenticity and avoid man in the middle attacks. There were encoded messages, smoke, flags, light and sound signals. Trusted couriers, pigeons, etc …

    • @JackcooperOP
      link
      141 year ago

      Apologies for unclear language. I meant more like how did they safeguard these.

  • @Fisk400
    link
    321 year ago

    I am not an expert on this and it’s just my understanding from general history things.

    I think wax seals were a big part of it. If you have a ring you can make a bunch of wax seals but it’s really hard to make a copy of the ring from a wax seal. Give each general a document with the royal seal on it and the next time they get an order with the royal seal you can compare it with the seal you already have. If you use the wax seal to close the letter so that you need to break the wax to open the letter you can be fairly certain that the one with the ring that wrote it and that nobody else has opened it.

    I also think chains of commands is important. King gives letter to messenger Steve. Steve then gives it to Dave and Dave knows who Steve is so he trust the message. Dave then gives it to Rodney and Rodney gives it to a Lord. Each person knows who the person they are getting a message from is so the chain is trusted. Should Ivan kill Dave and try to give a fake message to Rodney they Rodney would just go “where the fuck is dave” and not deliver the message.

  • @[email protected]
    link
    fedilink
    28
    edit-2
    1 year ago

    They used end-to-end encryption where the sender stuffed the message into one end of a pigeon and the receiver would pull it out of the other end. The opposing forces didn’t have the time to check every single pigeon for intel so it did the trick until some genius decided to standardize putting an “Intel Inside” sticker on the fastest carrier pigeons.

  • @cynar
    link
    26
    edit-2
    1 year ago

    In battle terms, messengers and flags were key. The messenger core often included the children of officers etc. This meant it wasn’t a random person delivering the orders, but a trusted person.

    Flags etc could also be used for simple transmission. It was often limited to predefined messages, but that was generally enough to send units around.

    These 2 methods were why knowing where the commander was in a battle was so important. A big, showy banner could make them an arrow magnet. It also let everyone know where orders were coming from, and where to send reports.

    The fog of war was ever present however. Messages could get lost, or misunderstood. The best commanders had highly competent underlings. A sub-commander sending in the reserves, without orders, could win or lose a battle.

    As for longer ranges. There were several ways. Chains of trust were the most common. Knights etc would travel regularly. They got to know each other and so could vouch for each other’s identity. This is part of where knightly honor comes from. You faked messages and both you and your family would suffer for it. The unique armour designs also helped with identification. It’s hard to fake a suit of armour quickly, and taking one by force was difficult.

    This also formalised into messenger cores. Various chains of trust were formed to identify imposters. Pomp and ceremony, along with expensive indicators made faking difficult, dangerous and expensive.

    Another option was message relay towers. The Romans used timed lights to send messages along walls. Simple messages could be sent long distances without much risk of corruption. Semaphore towers served a similar purpose, with the ability to send complex messages. They were expensive to build and operate however, so tended to be for critical lines of communication only.

    Combined with all this was a continuous arms race of message validation Vs forgeries, encryption Vs code breaking. Many cyphers were developed and broken. Things like signet rings were a classic. It’s easy to seal a message with one (pressed into hot wax), and relatively hard to fake. Your seal also lived on your finger, so very difficult to steal.

  • @Delphia
    link
    211 year ago

    Nobody else has mentioned deliberate obfuscation techniques.

    For example, if you’re sending field commanders instructions in writing, you brief them in advance that if you use certain codewords, modify certain data. I.e if you use the word “glorious” to describe reinforcement troops, double the number. If you describe them as “experienced” halve the number.

    So if the letter does fall into enemy hands, the data will be wrong.

  • @ghariksforge
    link
    191 year ago

    Forgery and interception happened all the time. So did just pure confusion and chaos. Here is a lovely example from the legendary Battle of Karánsebes:

      • @[email protected]
        link
        fedilink
        251 year ago

        Battle of Karánsebes

        https://en.wikipedia.org/wiki/Battle_of_Karánsebes

        Immediately, the hussars and infantry engaged in combat with one another. During the conflict, some Romanian infantry began shouting, “Turcii! Turcii!” (“Turks! Turks!”). The hussars fled the scene, thinking that the Ottoman army’s attack was imminent. Most of the infantry also ran away; the army comprised Austrians, Romanians, Serbs from the military frontier, Croats, and Italians from Lombardy, as well as other minorities, many of whom could not understand one another. While it is not clear which one of these groups did so, they gave the false warning without telling the others, who promptly fled. The situation was made worse when officers, in an attempt to restore order, shouted, “Halt! Halt!” which was misheard by soldiers with no knowledge of German as “Allah! Allah!”.[5][6]

  • @[email protected]
    link
    fedilink
    181 year ago

    They used messengers, forgery was prevented by use of wax seals or similar, interception is down to the luck and skill of your messengers. Dressing like a civilian helps avoid detection, but they could be executed as spies.

  • HobbitFoot
    link
    fedilink
    161 year ago

    They worried all the time about it; systems weren’t perfect.

    Interception was usually the bigger issue. Messengers would have orders to destroy their messages if caught, but that didn’t always happen. You might even have just a failure to transmit a message; a lot of the theory for modern Internet packet switching came from military communication.

    Forgery could happen. This was usually counteracted by knowing the sender’s handwriting or applying a seal or stamp to the communication. It wasn’t perfect, but it did ok.

    • @ramble81
      link
      31 year ago

      I did that as a kid in school passing notes!

  • @zerbey
    link
    91 year ago

    Encryption has been around since Roman times, and probably long before that. Even if not, bear in mind most military leaders then had people from their own lands in their ranks so it would be easy to find a trusted person to deliver the message.

    • Chaotic Entropy
      link
      fedilink
      21 year ago

      Surely the first person to obscure their meaning in any way engaged in the first form of encryption? Regardless even of whether someone could decrypt their meaning.

  • kersploosh
    link
    fedilink
    61 year ago

    In addition to other comments, Julius Caesar even has a simple encryption technique, the Caesar cypher, named for him because he regularly used it.

  • bluGill
    link
    fedilink
    61 year ago

    They often didn’t. Sure the other responses.said how they did when they did, but realistically communication was too slow to be useful for a lot of messages we would send today. Your general made plans before the battle and then watched helplessly as it happened ,unable to adjust anything in time.

  • Bady
    link
    fedilink
    51 year ago

    Asymmetric cryptography was a game changer, before that communicating parties had to exchange the secret keys used for encryption which was very risky.