Read the article yourself.
What they did -
- First they cut off communications links (Basically jammed the comm. using high-powered jammers).
- Then reconfigured the drone’s GPS coordinates to make it land at what the drone thought was its actual home base – but instead was in Iran. (Basically GPS jamming + spoofing the GPS signals to seem like the home base was Iran).
Something similar must have happened here as well. Again, I will maintain this is
NOT hacking but jamming, and leveraging drone's RTB behaviour for its advantage.
From IdeaForge SWITCH's brouchure -
View attachment 24224
So basically if comm. failure happens it will automatically try to return to base. But how it will figure out where is the base ? Using GPS coordinates, which, again can be spoofed just as mentioned above.
Nothing to do with Chinese components.
Drone Tx/Rx comm. don't use TCP/IP protocol just an FYI. Also this -
View attachment 24227
What the para and the underlined red means, is that regardless of whatever Tx/Rx backdoors Chinese can create, the original comm. & commands are securely encrypted and cannot be intercepted or spoofed.
Its like, lets say you are sending a postcard to your friend, and your mailman is Chinese. So you write the postcard in your own secret code which only you and your friend know. So no matter how hard the postman tries to read or decipher it, he can't.