"Despite being widely used and relying on secret cryptography, #TETRA had never been subjected to in-depth public security research in its 20+ year history as a result of this secrecy. […] Midnight Blue managed to reverse-engineer and publicly analyze the TAA1 and TEA algorithms for the first time, and as a result discovered the TETRA:BURST vulnerabilities."