psydT0ne Posted July 22, 2009 Share Posted July 22, 2009 This sucks ass.. http://www.smh.com.au/technology/security/...90721-drqb.html Quote Link to comment Share on other sites More sharing options...
Brian Sierakowski Posted July 22, 2009 Share Posted July 22, 2009 This sucks ass.. http://www.smh.com.au/technology/security/...90721-drqb.html Seems pretty awesome to me :). Quote Link to comment Share on other sites More sharing options...
beakmyn Posted July 22, 2009 Share Posted July 22, 2009 Sounds like all they know how to do is to find the unsecured networks. They don't know how to triangulate their location and they don't know what they'll do after they find the network. I wonder if they plan on publishing a map of the neighborhoods with the number of unsecured APs? I leave my wifi unsecured* *Then again it won't get you far. You still have to log into the captive portal and then again into the Proxy. Quote Link to comment Share on other sites More sharing options...
barry99705 Posted July 22, 2009 Share Posted July 22, 2009 Sounds like all they know how to do is to find the unsecured networks. They don't know how to triangulate their location and they don't know what they'll do after they find the network. I wonder if they plan on publishing a map of the neighborhoods with the number of unsecured APs? I leave my wifi unsecured* *Then again it won't get you far. You still have to log into the captive portal and then again into the Proxy. You get the upsidedownternet working?? Quote Link to comment Share on other sites More sharing options...
Netshroud Posted July 22, 2009 Share Posted July 22, 2009 Thank goodness I'm not in QLD. Quote Link to comment Share on other sites More sharing options...
Kung Fu Jesus Posted July 22, 2009 Share Posted July 22, 2009 My wireless lan is only wep encrypted with two AP's (running freebsd and slackware 12.1), however it's on a segmented vlan that can't touch my wired network. One day I'll actually bother to setup a WPA2/Radius config. Quote Link to comment Share on other sites More sharing options...
digip Posted July 22, 2009 Share Posted July 22, 2009 In the US we call that Wiretapping, and its illegal, even if you are the cops, you would need a warrant to enter someones network. Just becaus it says open does not mean there isn't a proxy or authentcation running internally. cafe's leave the networks open, but you still get prompted for a user/pass or login screen if set up properly. wifi-->network firewall/proxy --->inernet/internat. Still traffic would be sent un encrypted, but you could also add a ssl/web-vpn thingy and make the users download a client to go any further. Quote Link to comment Share on other sites More sharing options...
X3N Posted July 22, 2009 Share Posted July 22, 2009 technically the cops wouldn't have to actually get on your network to sniff it in order to find out if someone is illegally accessing your connection. But it still is wiretapping. Also how do they know if you gave someone permission to access your network or not. Quote Link to comment Share on other sites More sharing options...
barry99705 Posted July 22, 2009 Share Posted July 22, 2009 In the US we call that Wiretapping, and its illegal, even if you are the cops, you would need a warrant to enter someones network. Just becaus it says open does not mean there isn't a proxy or authentcation running internally. cafe's leave the networks open, but you still get prompted for a user/pass or login screen if set up properly. wifi-->network firewall/proxy --->inernet/internat. Still traffic would be sent un encrypted, but you could also add a ssl/web-vpn thingy and make the users download a client to go any further. The article didn't say they were connecting to the networks. I've said this before and I'll keep saying it until I'm blue in the face, WARDRIVING HAS NOTHING TO DO WITH CONNECTING! What the cops are doing is looking for unsecured networks and then telling the owners to lock it down. How they're pinpointing the actual location I'm not sure, probably just knocking on a few doors. Quote Link to comment Share on other sites More sharing options...
silentknight329 Posted July 22, 2009 Share Posted July 22, 2009 The process of searching for open wireless networks using a laptop or handheld in a moving vehicle is known in the geek community as "wardriving". They refer to us as the geek community, haha Quote Link to comment Share on other sites More sharing options...
Brian Sierakowski Posted July 22, 2009 Share Posted July 22, 2009 Also how do they know if you gave someone permission to access your network or not. I think you're missing the idea. They aren't going around arresting people for attaching to other peoples Wifi, they're wardriving to look for unsecured APs, then informing the owners that that's a super bad idea and they should cut it out. The newer AP's are getting much better, like not being able to config the router from wireless, and making it so that only certain devices can associate with the AP (like root/non-root configs with cisco antennas). Quote Link to comment Share on other sites More sharing options...
digip Posted July 22, 2009 Share Posted July 22, 2009 Somebody define "Secured wireless" to me. Because I have yet to see one that truly is unbreakable, regardless of what consumers have implemented at home. Quote Link to comment Share on other sites More sharing options...
beakmyn Posted July 22, 2009 Share Posted July 22, 2009 Somebody define "Secured wireless" to me. Because I have yet to see one that truly is unbreakable, regardless of what consumers have implemented at home. It's not a discussion of unbreakable. It's a discussion of whether or not measures are in place to require a key to use use the network. If a network is open then any criminal can connect and use it. That's the problem. By using WEP/WPA/WPA2/RADIUS/Captive Portal/laser equipped lemmings you prevent someone from casually connecting. This is a first line of defense. Sure WEP/WPA/WPA2 can be broken but that's not the point (besides the felony of breaking the encryption*). You should have some means of connection control on your network as you are responsible for what goes across it. *See your state/province law for unauthorized access to a computer network. @Barry not yet been fighting to get Squidguard working now I have to figure out how to imagemagick libraries installed and then the scripts....Been busy getting my 2m rig working and getting LMR400 pulled from basement to attic. Quote Link to comment Share on other sites More sharing options...
thedude Posted July 22, 2009 Share Posted July 22, 2009 I love this idea. I wish my home town would do this to open jobs. I would be a shoe end after spending time in this community lol. But yeah if the network is open its just beging for someone to come in. Wether or not if it is or isnt wiretapping. Dumb computer users are not smart computer users. Quote Link to comment Share on other sites More sharing options...
wh1t3 and n3rdy Posted July 22, 2009 Share Posted July 22, 2009 Good luck to them accessing my wifi lol Quote Link to comment Share on other sites More sharing options...
digip Posted July 23, 2009 Share Posted July 23, 2009 laser equipped lemmings Hmm. I like that! I feel a photoshop image is in order... :) edit: Quote Link to comment Share on other sites More sharing options...
psydT0ne Posted July 23, 2009 Author Share Posted July 23, 2009 Well in response and if the odd chnce that a cop car full of nerds actually makes it into my neighbourhood alive, i've changed my SSID to "KEEP DRIVING WARPIGS!!!!" Quote Link to comment Share on other sites More sharing options...
Brian Sierakowski Posted July 23, 2009 Share Posted July 23, 2009 Hmm. I like that! I feel a photoshop image is in order... :) edit: Bahhahaha. I think the lemmings are actually the transmission media, not the security :). Quote Link to comment Share on other sites More sharing options...
CraigHB Posted July 23, 2009 Share Posted July 23, 2009 That's the main reason I use a wired network in my house. I have an AP on my network for the laptop, but I only turn it on when I need it (not often) and it's secured. What a security hole for people who don't know what they're doing. Quote Link to comment Share on other sites More sharing options...
doyouhas Posted July 23, 2009 Share Posted July 23, 2009 The dude above me has the right idea. Turn off your access point when you're not using your laptop. Then go wired for all other connections. Quote Link to comment Share on other sites More sharing options...
barry99705 Posted July 24, 2009 Share Posted July 24, 2009 The dude above me has the right idea. Turn off your access point when you're not using your laptop. Then go wired for all other connections. If you're that worried about your pr0n stash, then sure go ahead. WPA2 with a good password is about as close to impossible to hack as you can get at the moment. Quote Link to comment Share on other sites More sharing options...
Brian Sierakowski Posted July 24, 2009 Share Posted July 24, 2009 Oorrrr just set your wireless to be in a separate vlan from your home computers :). Quote Link to comment Share on other sites More sharing options...
barry99705 Posted July 24, 2009 Share Posted July 24, 2009 Oorrrr just set your wireless to be in a separate vlan from your home computers :). I do both.... Quote Link to comment Share on other sites More sharing options...
Burncycle Posted July 24, 2009 Share Posted July 24, 2009 Good luck to them accessing my wifi lol That smells like a challenge. Quote Link to comment Share on other sites More sharing options...
Kung Fu Jesus Posted July 24, 2009 Share Posted July 24, 2009 Oorrrr just set your wireless to be in a separate vlan from your home computers :). Which I do as mentioned earlier. IPCop's Blue network is intended to be this way. When I want to be on my green network I use my VPN. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.