Re-encrypting WiFi

2008-07-22

in Daily updates, Geek stuff, Internet matters, Law, Ottawa, Security

Unfortunately, I had to shut down my open wireless network experiment. That is because I found three people within the span of two days who were both (a) criminal and (b) very stupid.

One thing to remember: if you are going to use open wireless networks to download illegal things, make sure you aren’t sharing your entire hard drive in read/write mode. Not only will the person running the network get wise to you without even needing to sniff packets, they will be able to remotely eliminate your ill-gotten files before banning you from the network. If they were so inclined, they could do much worse things to you.

I suppose I could set up a captive portal system using something like ZoneCD – thus providing scope for well behaved neighbours and passers by to use the network. That would, however, require acquiring and setting up a computer between my DSL modem and WAP. Since the two are presently integrated, the expense and bother would be even greater.

As is so always the case, a few bad apples have made it necessary to discontinue a good thing.

Report a typo or inaccuracy

{ 11 comments… read them below or add one }

robin July 22, 2008 at 11:58 pm

Hi Milan,
I’ve nominated your blog for a Brillante award.
-Robin

Davi Ottenheimer July 23, 2008 at 5:40 am

Not surprised. Open networks, like any public space, must be regulated in some fashion to detect and prevent abuse. If you don’t do it on your end then someone upstream will be watching traffic registered under your identity and come to you for an explanation.

Emily July 23, 2008 at 12:10 pm

.. my collection of low res MPEG cock-fighting videos!!

Where have they gone?!

Milan July 23, 2008 at 12:11 pm

You joke, surely.

You would never leave such videos in a place where some random buffoon could elimate them.

Emily July 23, 2008 at 12:14 pm

Please. The “Random Buffoon that I Live With

(I need those videos back. For reasons that are neither illegal, nor require me to send thousands of dollars in recompense to the Puerto Rican mob.)

Milan July 23, 2008 at 12:20 pm

I’ve nominated your blog for a Brillante award.

On the basis of a minimal Google-based investigation, it seems that a ‘brilliante award’ is a kind of internet mind virus.

Milan July 23, 2008 at 12:24 pm

I need those videos back.

The videos can probably still be recovered from your hard drive, provided they haven’t been overwritten. I don’t know of a way to do a multi-pass-type secure wipe on a shared drive, so all I could do was remove the flags indicating those blocks of data were important to keep.

See: Data remanence, Data recovery, Zeroisation.

Milan July 23, 2008 at 12:30 pm

Someone who really wanted to eliminate the files would probably have copied a hard drive wiping virus onto your system, then set it up to execute automatically when you rebooted.

Anon July 23, 2008 at 12:56 pm

You could call your network something like: “Call XYZ number for access.” That would let you screen potential users, to some degree.

. November 6, 2008 at 11:13 am

WPA cracked in 15 minutes or less, or your next router’s free

They always knew it could be done; that a hacker with enough time and processing power could watch your WPA-protected wireless network and, eventually, decrypt your precious datas. In under 15 minutes, though? “Inconceivable!” those hypothetical security experts would say — but they’re about to get a lesson from WiFi wizard Erik Tews. He’ll be giving a presentation next week at the PacSec Conference in Tokyo, describing the “mathematical breakthrough” that, he says, enables him to crack WPA-TKIP in 12 to 15 minutes.

. April 27, 2011 at 7:09 pm

The three stories all fall along the same theme: a Buffalo man, Sarasota man, and Syracuse man all found themselves being raided by the FBI or police after their wireless networks were allegedly used to download child pornography. “You’re a creep… just admit it,” one FBI agent was quoted saying to the accused party. In all three cases, the accused ended up getting off the hook after their files were examined and neighbors were found to be responsible for downloading child porn via unsecured WiFi networks.

Leave a Comment

You can use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

{ 2 trackbacks }

Previous post:

Next post: