On 28 July 2015 at 13:46, Martin <dcmk1mr2(a)gmail.com> wrote:
Ok I just actually read it. Quote:
"An applicant must describe the overall security measures and systems that
ensure that:
1. only properly authenticated software is loaded and operating the
device; and
2. the device is not easily modified to operate with RF parameters
outside of the authorization."
# 1 is insane for the FCC to have any purview over - not their turf.
Given the fact that these are Part 15 devices operating in the ISM bands #2
isn't to bad to certify.
I would ask the FCC for a rules change to reflect that. The FCC regulates
the public spectrum not software.
This is because there are some vendors that .. haven't been playing by
the rules. This didn't come out of nowhere.
They've been asking for a while for vendors to play ball, and there
are a couple of CPE vendors that haven't been, and.. this is what
happens.
So if you disagree with this, you should get together with a group,
formulate a /constructive/ reply to the FCC, and file it with them.
-adrian