Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The ethics of "stealing" a WiFi connection
Ars Technica ^ | January 03, 2008 | By Eric Bangeman

Posted on 01/07/2008 10:46:22 AM PST by SubGeniusX

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 221-240241-260261-280281-283 next last
To: Myrddin

I know about the magnetron.

You mentioned that the tricky part was getting power inside the cage without creating a leak in your cage. So I was curious how a microwave gets power inside the cage without creating a leak for microwaves to get out.


261 posted on 01/13/2008 1:00:07 PM PST by mamelukesabre
[ Post Reply | Private Reply | To 260 | View Replies]

To: mamelukesabre
The outside of the magnetron cavity is solid, conducting metal. The The magnetron is bolted to the side of the cooking cavity with the antenna protruding through a hole in the side. That puts the magnetron tube and resonant cavity inside the cooking cavity of the Faraday cage without compromising the Faraday cage.

When you have people and computers inside a large Faraday cage, it requires care to maintain the integrity of the cage with a working door and proper decoupling of all power cables entering the cage.

262 posted on 01/13/2008 3:37:12 PM PST by Myrddin
[ Post Reply | Private Reply | To 261 | View Replies]

To: KoRn

I never quite understood why the WEP was claimed as easy to break. It still has a password. Please explain.


263 posted on 01/13/2008 8:12:46 PM PST by Blue Highway (The only cure for RINOvirus - Fred Thompson)
[ Post Reply | Private Reply | To 18 | View Replies]

To: wbill
The one setup that I could ID - I mentioned to the guy. HE said 'Pah' and waved his hand. Wonder if he'd do the same thing if I presented him with copies of his tax returns, CC numbers, bank PINs, etc. I haven't hacked his system because I figure that it's none of my business. Doubt that others think the same way.

You wouldn't be able to hack into his computer just by leeching his internet connection. Are you talking about special equipment and software or just by him having an open unsecured network?

264 posted on 01/13/2008 9:05:16 PM PST by Blue Highway (The only cure for RINOvirus - Fred Thompson)
[ Post Reply | Private Reply | To 158 | View Replies]

To: rabscuttle385
Now, a friend of a friend set up a trap on his wireless network so that any unauthorized nodes would be commandeered, their hard drives wiped, and Linux installed.

You hear stories like this from time to time, but I have to say it sounds more like fiction. How does one issue commands from a router to format someone elses hard drive and install Linux?

265 posted on 01/13/2008 9:16:36 PM PST by Blue Highway (The only cure for RINOvirus - Fred Thompson)
[ Post Reply | Private Reply | To 190 | View Replies]

To: Blue Highway
It is not "easy" in the sense of no effort or expertise needed at all, but it is easy in that you can download software with the functionality and once you have your attack machine(s) configured, you can expect to break WEP in 10 to 30 minutes, depending on the approach.

There a several ways to go about it: both passive and active strategies. The passive attacks are basically dictionary matches. The active approaches flood the target machine with packets and do statistic analysis. The most sophisticated attacks (that I know about) use packet injection and only work with certain cards. PI does not require the attack machine to associate to the access point being attacked.

You can watch videos on Youtube where they do all of these things.

266 posted on 01/13/2008 9:33:50 PM PST by steve86 (Acerbic by nature, not nurture™)
[ Post Reply | Private Reply | To 263 | View Replies]

To: weegee
So it is "free use for customers inside the building"? What about the patio? But the curb is off limits?

He should have bought a cup of coffee. He should have said he thought it was his network from home that he was accessing (play dumb. OK, really dumb).

267 posted on 01/13/2008 9:36:46 PM PST by BJungNan
[ Post Reply | Private Reply | To 3 | View Replies]

To: SubGeniusX

I used to “steal” my neighbor’s wireless internet for years, until I got my own wireless network set up last month. Unlike my neighbor, I secured mine with a passcode. However, his/her internet is much faster (I have DSL from SBC, and I’m pretty sure he/she has cable from Cox), so I might still use it from time to time for downloads.

If you don’t secure it, and leave your network open, it’s your own stupid fault if someone takes up all your bandwidth.


268 posted on 01/13/2008 9:38:34 PM PST by Zeon Cowboy (Pardon Ramos and Compean NOW! // Duncan Hunter '08)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jimmy Valentine's brother
All anyone or bsuness has to do is password protect the access point. Those providing access as a come on can chnage the password daily and have it printed on the reciept. It ain’t hard.

It is amazing the businesses that run open wifi. Not that I would ever tap into the real estate office, the hair salon, the picture frame store or the coffee shop.

Of course, you are correct. All they have to do is password protect it and you can not get in.

269 posted on 01/13/2008 9:39:03 PM PST by BJungNan
[ Post Reply | Private Reply | To 5 | View Replies]

To: KoRn
That password had better be encrypted, or else it would be totally useless. At home I use WPA/PSK and it seems pretty solid. The older 128 bit WEP is a joke because the key can be broken in a matter of minutes, especially using the wireless 'G' standard that has higher throughput.

Your saying the following password could be cracked in minutes? Fr$$R$pupl1c10

Or is the password usesless?

270 posted on 01/13/2008 9:41:25 PM PST by BJungNan
[ Post Reply | Private Reply | To 18 | View Replies]

To: BJungNan
It is amazing the businesses that run open wifi. Not that I would ever tap into the real estate office, the hair salon, the picture frame store or the coffee shop. Of course, you are correct. All they have to do is password protect it and you can not get in.

Not for a few minutes, anyway, about the time it takes to get a quick shave and haircut (talking about male clientele, here).

271 posted on 01/13/2008 9:45:19 PM PST by steve86 (Acerbic by nature, not nurture™)
[ Post Reply | Private Reply | To 269 | View Replies]

To: steve86

statistic=statistical


272 posted on 01/13/2008 9:48:57 PM PST by steve86 (Acerbic by nature, not nurture™)
[ Post Reply | Private Reply | To 266 | View Replies]

To: Wil H

ZZZZZZZZZZZZTTTTTTTTT. FAULTY ANALOGY ALERT!!!!

If you piggyback on someone’s cellphone, you deprive them of talk minutes.

If you piggyback off a Starbucks Wi-Fi connection, you have deprived them of nothing.

Hank


273 posted on 01/13/2008 9:50:54 PM PST by County Agent Hank Kimball ("Huckabee is the bastard child of Lou Dobbs and Pat Robertson." - Jonah Goldberg)
[ Post Reply | Private Reply | To 35 | View Replies]

To: BJungNan
Your saying the following password could be cracked in minutes? Fr$$R$pupl1c10 Or is the password usesless?

I have no expertise in cracking but it looks like it would be rock solid to me, even if that were an WEP passcode.

274 posted on 01/13/2008 9:54:44 PM PST by Blue Highway (The only cure for RINOvirus - Fred Thompson)
[ Post Reply | Private Reply | To 270 | View Replies]

To: SubGeniusX

How can you steal what someone has given to you through their ineptitude?


275 posted on 01/13/2008 9:57:15 PM PST by July 4th
[ Post Reply | Private Reply | To 1 | View Replies]

To: BJungNan
Your saying the following password could be cracked in minutes? Fr$$R$pupl1c10

That password is of no defense against statistical attacks.

276 posted on 01/13/2008 9:57:55 PM PST by steve86 (Acerbic by nature, not nurture™)
[ Post Reply | Private Reply | To 270 | View Replies]

To: steve86

What is a statistical attack? Bottomline, why would they spend all that time cracking your WEP or WPA just to borrow your wireless internet access?


277 posted on 01/13/2008 10:25:11 PM PST by Blue Highway (The only cure for RINOvirus - Fred Thompson)
[ Post Reply | Private Reply | To 276 | View Replies]

To: County Agent Hank Kimball
If you piggyback off a Starbucks Wi-Fi connection, you have deprived them of nothing.

Yes you do, you deprive them of bandwidth (a finite resource), you deprive them of an IP address that could be used by a paying customer (a finite resource), and you deprive them of revenue since they sell their connection on a subscription basis.

If I am a subscriber and go to Starbucks to use their WiFi service and the particular location can support, say, twenty concurrent users, but when I get there I can't even log on because all the available connections have been stolen by non-subscribers that have hacked the system. How is that different from having my cell phone service stolen from me?

There is no difference between stealing cell phone minutes and stealing WiFi bandwidth except in the case of the cell phone you are stealing the entire bandwidth for the period that you use it rather than just a portion of it as is the case with WiFi, but in both cases it is stealing.

278 posted on 01/14/2008 7:42:52 AM PST by Wil H
[ Post Reply | Private Reply | To 273 | View Replies]

To: SubGeniusX

It’s a good way to download free music from Kazaalite and Limewire, etc.


279 posted on 02/12/2008 11:48:37 AM PST by RobRoy
[ Post Reply | Private Reply | To 1 | View Replies]

To: SubGeniusX
I'm not advocating breaking any laws, but the following link is pretty good:

http://www.turnpoint.net/wireless/cantennahowto.html

280 posted on 02/12/2008 11:53:18 AM PST by Natural Law
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 221-240241-260261-280281-283 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson