Better article here:<p><a href="https://www.theinfographicsshow.com/musk-starship-starlink-cybersecurity/" rel="nofollow">https://www.theinfographicsshow.com/musk-starship-starlink-c...</a><p>> "Jamming attacks are common threats to wireless communications and happen when a hostile device creates radio signals that disrupt communications by decreasing the Signal-to-Inference-plus-Noise ratio (SINR)."<p>> "Possible ways that a software update can help bypass a jamming attack is if the jamming device is targeting a particular frequency. The software can implement FHSS or DSSS, Frequency Hopping / Spreading Sequences of frequencies for anti-jamming purposes. However, FHSS or DSSS, frequency distribution type of protection against jamming is flawed. It is ‘limited by a common assumption that the jammer can jam only part of the communication channels or has a limited transmit power.'"<p>That article points to this report, which discusses all kinds of novel ways to defeat such attacks, like using counter-jamming as a means of delivering bits between sender and receiver, bit synchronization schemes, and others:<p><a href="https://apps.dtic.mil/sti/pdfs/AD1051122.pdf" rel="nofollow">https://apps.dtic.mil/sti/pdfs/AD1051122.pdf</a>