Posted on 01/07/2008 10:46:22 AM PST by SubGeniusX
Shouldn't we handcuff air for improperly transmitting music?
Anyways, it’s almost all done. Over. Fini.
Google is buying the old over the air TV spectrum from the FCC. Around 4.5 billion dollars.
Next five years, everything will be a data cloud, on line, networked out there, some where.
You won’t be able to tell where your phone starts and your computer ends.
Anyways, until then, lay low, move often, have others pick up your mail. Leave chalk marks on telephone poles. Avoid dark stairwells and small midgets gangs.
Bruce Schneier, one of the world’s most famous cryptographers, wrote an RC2-cracking screen saver. (The original WEP is based on RC2.)
Actually...
As a ham radio operator, I can operate WiFi at higher power levels than the normal routers come with, and I can NOT use encryption to prevent others from using the system.
(I COULD lock out all but my given MAC addresses, and there are a few other things I can do)....But I MUST ID my wifi with my callsign for connection and identification purposes.
So, theoretically, if I open mine up like that for Ham use, I can’t BLOCK it (to other hams) and I can’t encrypt it to prevent NON hams from using it (if they can get in).
That’s in the FCC regs. So, it isn’t stealing if I leave my stuff open. On the other hand if I leave my car unlocked and someone takes the car, then... it’s a stolen vehicle.
Are you the type that folds toilet paper four times before using it?
I am out of my league here, as I have never had a laptop and never used a WiFi connection, but there are many WiFi
systems set up to serve the public at large.
How is one to know which is which?
Here in Bratislava, many cafes advertise free WiFi, and in the same block, the city offers Wifi in the center square.
I see as many as 15 users on park benches with laptops.
I assume that one’s private WiFi can be secured so it should be up to the owner of the network to secure it.
If a neighbor shoots fireworks on the 4th of July, is it against the law for me to watch?
Not really..
Using commercially available encryption schemes or MAC Filtering will secure your network from the vast majority of would-be pilferers but it is no more a guarantee of security than is say, locking your car and setting a car alarm, that your car won't be stolen.
Any hacker worth his salt can break WEP or WPA encrpytion schemes within a few minutes.
You made my morning, darlin’ - thanks!
It’s really hard to know what the state of the law is, isn’t it. I’m in my car, checking Safari (no, not driving, honest) and I get router options for the WiFi. It’s confusing. I just want to check something - maps, weather, quick peek at current Freeper headlines! But, of course, I want to keep things correct - I don’t want my neighbors’ connections to suffer because my iPhone latches onto their WiFi connect.
I have no idea how that works, as a matter of fact. When it prompts it - there are some WiFi options that have what looks like a little “lock” and all ask me for a password. However, they put me through without it.
Don't ever leave your house unlocked , I might just help myself, after all, it's not really stealing, is it?
This could all be fixed with small, simple steps. The government and law-enforcement should not be wasting time and money on this.
jw
“...if you leave your front door accidentally unlocked, you should not complain when your stuff is stolen.”
I don’t think that’s an apt analogy. It’s more like - if you throw 10,000 pennies up in the air and they scatter in all directions and fall into others’ backyards, don’t complain if they get picked up.
The owner of the wireless router is transmitting. So, if anyone is trespasssing first, it’s him. But these analogies from the world of physical property and physical access just don’t work that well for the issues surrounding intellectual property, information assets, bandwidth, etc...
re:#31
ditto
Packets destined for your particular router are for all users of that router’s subnet and are addressed to the router. The packets contain your individual machine’s MAC address, though, so assuming no black hat shenanigans sorting router traffic by machine is trivial.
How about I just piggyback on your cellphone account and use your minutes instead of mine?
That works for me if you have no problem with other people hi-jacking your paid-for communications transmission services.
Thanks, What’s your number?
Great point. Some people seem to assume two things.
1. The wifi hotspot owner doesn’t want you to use it.
2. Using it has caused the owner some harm.
These two conditions are by no means universal. It’s ISPs that really have an interest in creating this new ‘crime’ and then cracking down on it.
WPA encryption weaknesses rest in weak passwords, not in the inherent security of WPA.
A person actually owns the house, but no one owns the medium that wi-fi travels through.
It would seem to me it is covered under the 1930’s laws that the airways are free and belong to the people on receive mode only. When you broadcast out it might be different.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.