Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Wireless Networking Hardware

Schneier Says 'Steal this Wi-Fi' 432

apolloose noted Bruce Schneier's latest entry on Wired where he talks about insecured wifi networks, and suggests that you Steal this WiFi. Basically, since insecure WiFi is everywhere, why not? You're helping make the world a little better for someone else.
This discussion has been archived. No new comments can be posted.

Schneier Says 'Steal this Wi-Fi'

Comments Filter:
  • by Serenissima ( 1210562 ) on Thursday January 10, 2008 @12:03PM (#21984798)
    If I opened up my network, anyone could start downloading pirated movies and music and use up all of my bandwidth that I want to use for downloading pirated movies and music!
    • Re: (Score:2, Insightful)

      by plague3106 ( 71849 )
      Well, the actual article is pretty silly. His response to "if you're accused of downloading child porn you're better off pleading that going to court?" Ya, just want I want to do, have that on my record.

      No thanks, I'll lock down my network.
      • Re:Yeah, but... (Score:5, Informative)

        by computational super ( 740265 ) on Thursday January 10, 2008 @12:57PM (#21985708)

        What he said was, "If I enabled wireless security on my network and someone hacked it, I would have a far harder time proving my innocence", and I often wonder if he's right. Like you, I'm pretty terrified of the accusation, so my network is locked down as tight as I can get it. I use WPA with a strong password, MAC address filtering, I renumbered the subnet from the default, I set a strong administrator password, and disabled DHCP... and if I can think of anything else I can do to lock it down, I'll probably do it, out of fear that somebody will do something nefarious with it.

        On the other hand, if I do get hacked (somehow), all that work will probably hang me. Couple that with the fact that I have an advanced degree in computer science (which to the average slashdot reader seems to mean I now *nothing* about computers, but would surely impress a jury of my "peers" that I'm impervious to being hacked), and if my network is used against me, I'm getting the death penalty.

        • Re:Yeah, but... (Score:5, Insightful)

          by Connie_Lingus ( 317691 ) on Thursday January 10, 2008 @01:04PM (#21985824) Homepage
          jeez...security is great and all that but you sound paranoid as hell. does the word overkill mean anything to you?
        • Re:Yeah, but... (Score:4, Insightful)

          by plague3106 ( 71849 ) on Thursday January 10, 2008 @01:17PM (#21986032)
          "If I enabled wireless security on my network and someone hacked it, I would have a far harder time proving my innocence"

          His theory. I didn't hear him claim the lawyer told him that.

          Like you, I'm pretty terrified of the accusation, so my network is locked down as tight as I can get it. I use WPA with a strong password, MAC address filtering, I renumbered the subnet from the default, I set a strong administrator password, and disabled DHCP... and if I can think of anything else I can do to lock it down, I'll probably do it, out of fear that somebody will do something nefarious with it.

          No, from what I've seen in legal cases is that you have to at least show it was likely someone else used your property to commit the crime. It's not enough to say "someone else was driving my car" you have to explain who it could have been and know reasonably where it was.

          If you really want to lock things down, no need to disable DHCP. Just setup a RADIUS server and get an AP that supports it. Breaking into your network requires two steps then; breaking the encryption, AND compromsing the RADIUS server.. both of which would need to be done to use the network in the first place.

          On the other hand, if I do get hacked (somehow), all that work will probably hang me. Couple that with the fact that I have an advanced degree in computer science (which to the average slashdot reader seems to mean I now *nothing* about computers, but would surely impress a jury of my "peers" that I'm impervious to being hacked), and if my network is used against me, I'm getting the death penalty.

          They'd have to prove more than just your network was used. They'd need to find it on one of your computers somewhere, which there shouldn't be, because you didn't do it. Also, keeping logs can help if you can find in the logs that something weird happened that looks like a security breach.
        • Re: (Score:3, Informative)

          by aarroneous ( 973056 )
          You forgot to disable broadcasting of your SSID.
          • Re: (Score:3, Informative)

            by 1u3hr ( 530656 )
            You forgot to disable broadcasting of your SSID.

            The six dumbest ways to secure a wireless LAN [zdnet.com]

            SSID hiding: There is no such thing as "SSID hiding". You're only hiding SSID beaconing on the Access Point. There are 4 other mechanisms that also broadcast the SSID over the 2.4 or 5 GHz spectrum. The 4 mechanisms are; probe requests, probe responses, association requests, and re-association requests. Essentially, youre talking about hiding 1 of 5 SSID broadcast mechanisms. Nothing is hidden and all you've ac

        • Re:Yeah, but... (Score:4, Insightful)

          by matt_king ( 19018 ) on Thursday January 10, 2008 @02:03PM (#21987032)
          That's actually an erroneous legal idea....if in fact you have shown due diligence in trying to secure your network, and someone gets in, you are less likely to be found at fault. If however the courts can show that you knew the risks and consequences to having your network opened, and you had the means to do it, yet did not, you are much more likely to be held accountable.
  • Anonymity (Score:4, Insightful)

    by N3TW4LK3R ( 841526 ) on Thursday January 10, 2008 @12:07PM (#21984872)
    Why not? For one thing because it would pretty much guarantee total anonymity to everyone online.

    If you want to commit a crime online, it's easy enough to drive your car to the next city, open you laptop and connect to a random open AP.

    And if you were too lazy to do that, you can always say "It wasn't me, someone else connected through MY open AP!"
    • by Iorek ( 68393 )

      If you want to commit a crime online, it's easy enough to drive your car to the next city, open you laptop and connect to a random open AP.

      Yeah, like this guy [theregister.co.uk]. He only got caught 'cause he set a meet. I wonder if the "elderly couple" were reprimanded for leaving their AP open? It doesn't sound like it.

    • by Weaselmancer ( 533834 ) on Thursday January 10, 2008 @02:05PM (#21987086)

      Hey, how about that? Here's a link an article about it. [techdirt.com]

      "The IP address simply can help you know who paid for the internet access, but not who was using what computer on a network. In fact, this even had some people suggesting that, if you want to win a lawsuit from the RIAA, you're best off opening up your WiFi network to neighbors. It seems like this strategy might actually be working. Earlier this month the inability to prove who actually did the file sharing caused the RIAA to drop a case in Oklahoma and now it looks like the same defense has worked in a California case as well. In both cases, though, as soon as the RIAA realized the person was using this defense, they dropped the case, rather than lose it and set a precedent showing they really don't have the unequivocal evidence they claim they do."

      Well, whaddya know?

      I don't even own any WiFi equipment for fear of someone using my connection to do something questionable...but now maybe I will buy one. Nothing like a get out of jail free card, y'know?

  • by Applekid ( 993327 ) on Thursday January 10, 2008 @12:11PM (#21984918)
    Sure, everyone please use my unsecured local Wi-Fi access point. I'm giving back to the community... ... and the community in turn will have all traffic filtered through a box that will sniff passwords, private keys, you name it.

    So please "steal this Wi-Fi" since I need a few more social security and credit card numbers.
    • ... because CC#'s are generally transmitted in cleartext...
    • So please "steal this Wi-Fi" since I need a few more social security and credit card numbers.

      Assuming the person stealing your Wi-Fi is using an unsecured site to do their transactions or that you can crack an SSL link.
      • Re: (Score:3, Informative)

        An SSL certificate is fairly cheap to purchase, just by one and operate a man-in-the-middle for all SSL connections. A few tech-savvy might notice, but most won't.
        • by Braino420 ( 896819 ) on Thursday January 10, 2008 @01:17PM (#21986042)

          An SSL certificate is fairly cheap to purchase, just by one and operate a man-in-the-middle for all SSL connections. A few tech-savvy might notice, but most won't.
          You purchase an SSL cert from a CA for a single host, so you will have to go through the whole process for each site the user tries to connect to. Not only this, but CAs do, admittedly minimaly, verify that you are who you say you are (depending on how much money you give them). Not only this, but you will not be able to get a cert that says you're, for example, Bank of America. You can always self-sign a cert, but this will alert the user in all modern browsers. On top of all that, if the user does get fooled by your MITM attack, you only get the information that they give you: their username and password. Sure, you can now log in to the site, but I know that if you're signing into BoA for the first time from that location, they ask you one of the security questions (which you do not have). Even if they didn't (or you fooled the user into giving you that information too) and you got access to their account, what are you going to do? You can't just transfer that money to your account without someone finding out who you are, and the accounts only show the last 4 digits of each account number. You can't get that 3 digit number on the back of the card for most online purchases, not to mention that online purchases will also point back to you. I will admit this is all much easier than cracking the 128-bit SSL session.

          All of that means you aren't going to do shit; the payoff just isn't worth it and it's not as easy as some /. posters will have you believe.
    • by garcia ( 6573 ) on Thursday January 10, 2008 @12:47PM (#21985554)
      My public facing wireless AP has a SSID that reads, "I_SNIFF_AND_LOG". I generally find that no one is using my network and instead probably chose to use one of the 8 open "linksysfoo" APs around me.
    • by zrq ( 794138 )

      I have the reverse problem at home.

      I run an encrypted Wi-Fi network, connected to my local network and ADSL connection. However, someone else in the neighborhood runs an unencrypted Wi-Fi network, and whenever I start my laptop it tries to connect to the unencrypted networks first. I have to remember to check what network it is connected to before I use anything.

      The unencrypted network is probably benign, setup by someone who hasn't read the manual and is blissfully unaware of the implications of hav

      • Re: (Score:3, Interesting)

        You should be able to specify the SSID you want to be using with the iwconfig command; tell the system you want to use your SSID (which will need to be different from your neighbor's, of course). You can automate this (at least in Debian, I don't know Fedora) in /etc/network/interfaces with a pre-up line in the stanza for your wireless interface to have the iwconfig command run before the interface is brought up.

        Chris Mattern
  • by Anonymous Coward
    Why steal when you can *share*? i.e. get the owner's permission, a la www.sharemywifi.com
    • by dwater ( 72834 )

      Why steal when you can *share*? i.e. get the owner's permission, a la www.sharemywifi.com
      Why would I want to do that?

      I just publish it's availability with it's SSID an not putting a password on it. Surely it's obvious that I don't mind other people using it.

      If I didn't want people to use it, I would take measures to make it obvious, like putting a password on it, and not advertising the SSID.
    • Re: (Score:3, Insightful)

      by Hatta ( 162192 )
      If you request an IP and it's given to you, isn't that permission to use it?
  • Car analogy (Score:3, Insightful)

    by Anonymous Coward on Thursday January 10, 2008 @12:13PM (#21984952)
    In the article, B.S. writes:

    And yes, if someone did commit a crime using my network the police might visit, but what better defense is there than the fact that I have an open wireless network?
    So if one of those red-light-cameras snaps a picture of my car running down a pedestrian, it should be a really great defense for me to say, "Oh yeah, I have a policy of leaving my car doors unlocked the keys in the ignition. Everyone around the neighborhood knows that."
    • Re: (Score:2, Insightful)

      by Anonymous Coward
      I guess your implication was that this would be a poor defense, but I'm pretty sure it would be a good defense in court (or rather a useful argument as part of a defense).

      Obviously the situation you describe is somewhat unrealistic (since no one would do that--losing a car is rather worse than losing a few MB of your bandwidth). A more realistic version might be a defense such as "yes that's my car, but these 20 people have access to the keys for that car, so it could have been any one of them driving it" a
      • Re: (Score:3, Interesting)

        Having recently gotten a speeding ticket from one of those cameras...

        The ticket was specifically worded not to be issued to the driver. It was to the owner of the car, regardless of whether they were driving. This did have some implications otherwise: It therefore didn't result in 'points' being added to my record.

        So, back to the computer situation, they could just say that you are responsible for that bandwidth, and should have blocked it if the traffic wasn't from you. Don't know which would hold up in
    • Re:Car analogy (Score:4, Insightful)

      by phasm42 ( 588479 ) on Thursday January 10, 2008 @12:29PM (#21985226)

      So if one of those red-light-cameras snaps a picture of my car running down a pedestrian, it should be a really great defense for me to say, "Oh yeah, I have a policy of leaving my car doors unlocked the keys in the ignition. Everyone around the neighborhood knows that."
      Which completely ignores that pretty much nobody does that with their cars (since having your car stolen results in a definite loss that can cost lots of money and a major inconvenience), but a large percentage of people do that with their wi-fi (since most of the time they don't even notice, and it doesn't cost them anything).
      • But, a lot of people DO leave their cars unlocked with the keys inside. Ever pull up to a gas station and find a running car...but no one is in it? It just all depends on where you live. In some places, it is quite safe to leave everything unlocked.
  • by presidenteloco ( 659168 ) on Thursday January 10, 2008 @12:13PM (#21984956)


    1. Clients (laptops) default installed wifi software (hint: Steve Jobs are you reading???) need a scanning
    mode which does not waste my time telling me about all the password or mac-address locked wifi
    basestations, and only advises me about open ones.

    2. Basestation/routers need a simple-to-configure mode where they will let others into a separate
    subnet that goes straight out to the Internet but does not see my home computers directly.

    3. (Brain software/mindset change.) Americans need to stop reflexively calling sharing 'stealing'.
    You've been trained into this terminology by those who have already stolen everything and don't
    want you to get it back.
    • So for point 2, you want encrypted wi-fi for your home systems and open unencrypted wi-fi for guests. Is that even possible without two separate access points?
      • Actually, yes it is. DD-WRT (http://dd-wrt.com/ [dd-wrt.com]) has a feature that lets you put out a second (up to 4 IIRC) SSID with separate security and etc. It's only available in the RCs at the moment (and broken in RC6, but working in RC5).
      • So for point 2, you want encrypted wi-fi for your home systems and open unencrypted wi-fi for guests. Is that even possible without two separate access points?

        Some of the newer APs have it built-in. Or you can do it by cascading two older, cheaper APs, like this [slashdot.org].

      • There is nothing *technically* stopping you as long as both use the same channel.

        Its just up to the firmware of the device which determines what it can do.
        There certainly are some which can do it without much hacking.
      • Re: (Score:3, Informative)

        by cerberusss ( 660701 )
        It's totally possible. One of those FON WiFi routers (google it) will publish two SSIDs. Each has different settings. They sell them at cost and they're meant to have the public SSID be shared with other FON users, but they also have a feature where you can generate passwords for friends/family.
    • I'd like to amend your number 1 -- I want a scanning mode that doesn't waste my time telling me about all the encrypted or mac-address locked networks, and also doesn't waste my time telling me about the "open" networks that don't actually give me any access until I open a browser, try to load a URL and get redirected to their own little page where I have to log in with a code to show that I've paid for a 24 hour pass or some shit.

      I'm not saying nobody should offer such paid public access points, just that
    • 2. Basestation/routers need a simple-to-configure mode where they will let others into a separate subnet that goes straight out to the Internet but does not see my home computers directly.

      ++

      3. (Brain software/mindset change.) Americans need to stop reflexively calling sharing 'stealing'. You've been trained into this terminology by those who have already stolen everything and don't want you to get it back.

      Sharing WiFi is fundamentally different from sharing copyrighted material. I don't get why pe

    • 1. Clients (laptops) default installed wifi software (hint: Steve Jobs are you reading???) need a scanning mode which does not waste my time telling me about all the password or mac-address locked wifi basestations, and only advises me about open ones.

      Leopard shows padlock icons next to locked networks. For at least two prior major OS revisions, you have the option to be told about open networks, and/or join them automatically.

      Do you have any idea how much of a problem this is for IT people dealing wi

    • 1. Clients (laptops) default installed wifi software (hint: Steve Jobs are you reading???) need a scanning
      mode which does not waste my time telling me about all the password or mac-address locked wifi
      basestations, and only advises me about open ones.


      You need to upgrade to leopard. It shows a little lock next to the names of locked down wifi.
  • Ethics by analogy (Score:5, Insightful)

    by crow ( 16139 ) on Thursday January 10, 2008 @12:14PM (#21984960) Homepage Journal
    This is an ethics by analogy situation. Everyone arguing over whether it is right to use unsecured wi-fi connections bases their arguments on analogies, and depending on the analogy, reaches a different conclusion.

    As I see it, if someone left their wi-fi open, then either it was intentional, or they're too clueless to notice (or care) that I'm reading my email.
    • by plague3106 ( 71849 ) on Thursday January 10, 2008 @12:30PM (#21985244)
      Fine. Go to said person and tell them "your network is not secured, so I'm using it to read my mail." Tell me if they care or not then. Seriously, just because someone doesn't know their WiFi is not secured doesn't mean they won't care that you're using. They just don't know.
    • How is using something that your laptop connects to without any effort an analogy? If you don't want to share your connection, even just turning off broadcasting will stop legitimate clients from using you automatically (but if you took the effort to do that, you likely enabled privacy settings too).

      It's pretty bad when I sit in my living room, forgetting that my 802.11 configuration was for'any' SSID and swear about WTH can't I get to my local servers? :-)
  • by wcrowe ( 94389 ) on Thursday January 10, 2008 @12:18PM (#21985014)
    "Insecure?". Yeah, nobody wants a clingy Wi-Fi.

  • Usually not stealing (Score:4, Interesting)

    by totallygeek ( 263191 ) <sellis@totallygeek.com> on Thursday January 10, 2008 @12:19PM (#21985040) Homepage
    Another side to this is to consider that some people may actually allow access. I used to. I had an SSID of JUMPONFREE. I did this for two reasons: one to give Internet access to people in my apartment complex if they did not want to pay for it themselves, and two because I incorporated transparent proxying and compiled lists of visited sites (as well as port mirroring on the switch to track protocol usage). You don't have to concern yourself with abusers if you set up traffic priorities and/or bandwidth limiters. I am not alone, as I have seen many cleverly named SSID's indicating the owner is not just some non-configuring noob, but rather someone that cares enough to share.
    • by zappepcs ( 820751 ) on Thursday January 10, 2008 @12:42PM (#21985448) Journal
      Not only might you want to give away unused bandwidth, but look at the reasons people are telling us we should not give it away:

      - You might be blamed for illegal file sharing or spamming
      - You might be held legally responsible for what other do
      - You might be the victim of malicious users
      - You might.... nevermind, all the reasons are to protect you from people who would sue you. What does that say about the world?

      Lets throw some other analogies out there:

      You shouldn't stop to help a stranded motorist because they might attack you or kill you
      You shouldn't give people advice because they might sue you for using it badly (lawyers & doctors)
      You shouldn't leave objects in your lawn in case someone trips and sues you
      you.... getting the picture?

      You are NO LONGER free to do as you wish with what is yours because other people control what you do, either directly, or indirectly as a consequence of fear of what they MIGHT do. If gun makers are not responsible for what people do with the products they make, you should NOT be responsible for what people do with the bandwidth you gave them to use.

      If we can be held responsible for what happens across our open APs, then the ISP can be held responsible for what goes across its network.

      In the end, common sense and reasonable thought dictate that the person who does the spamming or file sharing is responsible. If you leave a gardening tool in your lawn, and a person trips on it and hurts themselves, who is at fault? If you put a bench in your yard where people can sit and rest and some kid pushes another who then falls and cuts his head on the bench, who is at fault?

      I know those don't fit perfectly, but the point is that just because you helped to create something, you are NOT responsible for the use of it. Leaving your car unlocked is a good analogy: if someone takes it, they are stealing, and just because you did not do all that you could do to prevent them from taking it does not change the fact that they stole it.

      In another thought, holding the AP owner responsible is like trying to treat them as network security experts under the law. Insurance companies, police departments, all sorts of people work to inform you how to stop someone from stealing your property but does anyone do public service announcements to tell you how to stop people from stealing your bandwidth? Can you get insurance to protect you from bandwidth theft? or to compensate you when the **AA are suing you?

      Is a bus driver culpable if he drives the bus that a bank robber used to get to the bank he robbed?

      This goes on and on, but the point of holding you responsible for what others do with something you gave them (without the intent of doing so for malicious or nefarious reasons) has been proven in court already. Gun makers are not responsible for any deaths that happen from use of their products. Game over.
    • Because in other countries you will get busted.

      See this example in the UK
      http://news.bbc.co.uk/1/hi/england/hereford/worcs/6565079.stm [bbc.co.uk]

  • by Vellmont ( 569020 ) on Thursday January 10, 2008 @12:20PM (#21985062) Homepage
    Everything Schneire says is true.. for Bruce Schneire. Not everyone is as adept as he is in configuring a computer to be secure. I'm OK, but I'm likely not vigilant enough to keep everything as secure as it should be (and thus I have WPA encryption on in my wireless network). The vast majority of the public is just plain terrible, and has no clue how to configure their computers to be secure in an open network.

    Securing your wireless network with encryption isn't like flipping a switch, but it's a HELL of a lot easier and more accessible than knowing how to secure each and every device accessible on your network. Having ONE point of entry and configuring that properly is a lot easier to maintain than having multiple, different, changing points that take continued vigilance to remain secure. Is it better to keep each device secure on any network? Sure.. but how many people have the time, patience, knowledge, and ability to do that? Not many.
    • Yeah, that is my biggest concern here. In a perfect world everyone would secure their systems (or vendors would design systems securely) so that being on the local LAN did not grant any special privileges. But with that not being the case an open wireless network lets people access the files you accidentally shared out, compromise the system you forgot to patch or sniff your e-mail that you never setup SSL/TLS for.
  • by Anonymous Coward on Thursday January 10, 2008 @12:22PM (#21985090)
    That's just inviting trouble.

    If "Something Bad" were to happen from your IP address, there -will- be a knock at your front door in the early morning. Trust me.

    "Something" happened to my personal email server several years ago, and I had federal agents at my front door at 1am. I don't know what the heck happened - they wouldn't give me any details - but they seized my email server, and every computer in my household, even though their search warrant was only for the server. You don't tell them "no" - all that means is that they wait for the search warrant to be signed, and THEN they wreck your place searching. Much better for everyone involved to be cooperative.

    Cost me thousands of dollars in a retainer fee to a lawyer, I had to take a polygraph exam, and it took almost 2 years to get all my "stuff" back. That was 2 years where I was fearful for my job, worried about keeping my family afloat, worried about just about everything. My wife lost ALL of her graduate school work, and had to re-do most of it to turn in her final portfolio. Talk about miserable.

    And I STILL have no idea what that "Something Bad" was. And it didn't even happen at my house - it happened at my hosting ISP where the email server lived. It didn't matter that *I* didn't do it. I still had MY stuff taken from my, *I* still had to go take the polygraph exam, and *I* was still on the hook for 2 years.

    So yeah - keeping an open wireless network is just ASKING for trouble. If you want to deal with federal agents in the middle of the night, well, be my guest. You can talk the talk about how you'd tell them to go away, and how they'd have no proof, etc. etc., but unless you've been there, you have no idea what you're in for.

    Trust me.

    • Re: (Score:3, Insightful)

      But you have to look at it in Bruce's mind, this only happens to probably a few thousand people a year, so it's an acceptable risk! Because all security is a tradeoff. In this case, the what you get is getting to feel "polite," and the risk is that anyone could do anything on your network and you're the one who gets investigated by the police or FBI who are all very trustworthy and concerned about maintainging your innocence. Now this personally doesn't sound to me like an acceptable tradeoff, but then I'm
      • Bruce jumped the shark for me when in the comments section of his blog he dismissed state election voter ID requirements because voter fraud probably only accounts for a few percentage points here and there, as if that's not enough to sway an election.

        If you don't know, this is the very issue that was argued before the U.S. Supreme Court yesterday (Indiana law requiring government issued photo ID to vote). I agree with Bruce's POV, but his argument is NOT STRONG ENOUGH.

        In-person voter ID fraud doesn't

    • Re: (Score:3, Interesting)

      Schneier isn't being an idiot. Do you think the feds could actually pull off an "investigation" like you describe on him of all people? It would look really fishy, and it would probably hit the mainstream media. I'd say that Schneier is pretty safe from high-level harassment.

      Besides, the police probably wouldn't be able to get any useful data off his computers without hiring him to help.
    • by Hatta ( 162192 ) on Thursday January 10, 2008 @02:29PM (#21987534) Journal
      You're being an idiot. You consented to the search without having it signed by a judge, and then you let them take things that weren't on the warrant. You don't have to do either of those. And why the hell did you let them give you a polygraph? Those aren't admissible anywhere because they're absolutely useless for anything.

      The only reason you had no recourse is because you consented. If you made them get the warrant signed and they still took items not listed on the warrant you would have had an excellent case against them.
  • FON and Co (Score:5, Interesting)

    by PhillC ( 84728 ) on Thursday January 10, 2008 @12:22PM (#21985102) Homepage Journal

    There are already a number of organisations/initiatives around that actively encourage you to purchase their wireless routing products and then open up access to everyone.

    I'm a member of FON [fon.com], which allows you to allocate a specific amount of bandwidth for sharing if you're using one of their routers - say 1MB of your 8MB ADSL, which neatly overcomes the first poster's issue of not having enough bandwidth for their own nefarious purposes. After being a member of FON for 12 months they actually sent me three free wireless routers at Christmas, which I gave away to friends hoping that they too will join and share bandwidth.

    There's another company I heard about, US based, that does something similar, but I can't think of their name right now.

    However, I wonder about my ISP's stance regarding sharing WiFi for free with others. Does it violate their Ts&Cs? Do I care enough to actually find out? No!

    • by PhillC ( 84728 )
      Meraki [meraki.com] is the other company I was thinking of. Like FON, they supply wireless hardware with the express aim of you sharing your connection. The Meraki stuff looks quite good too in terms of having an extended connectivity range.
  • BS writes:

    "The accused's chance of winning is higher than in a criminal case, because in civil litigation the burden of proof is lower. "

    I am having a hard time parsing this sentence. Should it be "accuser's" rather than "accused's" or have I just got a mental blank about this sentence. Maybe change "winning" to "losing".

    • by mcmonkey ( 96054 )

      "The accused's chance of winning is higher than in a criminal case, because in civil litigation the burden of proof is lower."

      If you go to court accused to downloading something bad, you have a better chance of winning (not guilty) in criminal court. The burden of proof is lower is civil litigation. Think OJ--not convicted of murder in criminal court, but still found libel in civil.

  • by Seakip18 ( 1106315 ) on Thursday January 10, 2008 @12:26PM (#21985178) Journal
    But I thought the best way to browse securely was have all traffic sent to your home server, encrypt it, and forward to the laptop. This was because you assume your home network is inherently more secure. With is approach, you are leaving your home network, including your significant others, at risk. Especially those who are not savvy enough to apply updates and maintain anti-virus.

    While I understand the anonymity helps his secure network stand out, all those open networks are just waiting for a guy with a little time and knowhow to start doing many bad things, say, man-in-the-middle. Just because you are blending into the pack does not keep the lions from eating one of you.

    Now then, it IS his network at home, so he can do whatever the heck he feels like. And I do understand his social aspects of looking at WiFi as another resource for the public. But that does not free you from liability regardless of how little or insignificant it may be or stupidly enforced.

    To me, it sounds like he doesn't want to roll up his sleeves and do some dirty work with port-forwarding, SSH-ing, and proxying. With those, you can enjoy quite decent browsing while away AND understand that your weakest point is at home.

    On an unrelated note, where does this guy live?
  • I use WPA. Why? Because on my parents network, they want to use file sharing between their desktop and their laptop. On both mine and my parents, there are networked printers.

    But I write down the password on the router, and anyone who visits in person is welcome to use it.

    Does Bruce not use a home printer? Share files between home computers?
  • For several years, I ran an open connection. Nothing bad happened. I doubt anybody used it, because it was in an apartment complex with mostly older, non-tech savvy individuals. But it was there.

    I have since moved, and found an open network in my area. I browse, chat, e-mail, do occasional software updates, and occasionally download free music [jamendo.com]. I stream a Sirius radio audio connection from time to time, but that is low bandwidth. No streams of pirated movies. No infinite queues of warez or copyrig

  • If you've got a router broadcasting to the world "I'm here! I'm open! I'm free!" and handing out DCHP IP addresses on request, using it ain't "stealing".

    Kinda like having a doorman shouting "C'mon in!" to passers-by and handing full-access visitor ID cards to anyone who walks in.
  • I mean, with windoze (and linux, if you set it up that way) automatically associating with any open AP that advertises, is it really stealing?

    In my neighborhood, there are a number of 'belkin54' and 'linksys' APs advertising default SSIDs and networks with no privacy settings.

    Now, if you log in to the device (which likely has a default password too), and change any setting, that is definitely tresspass (despite the utter lack of security). But as far as just using it goes? How can you be accused of steali
  • In the article the guy says it's just like providing heat and light to guests. Fine, why not give them all your money, too. Why not take the fall when your "guests" are pulled for speeding, or online fraud?

    By providing free internet access, you are effectively saying that it's OK for someone you don't know to commit crime and to have no defence when the cops come knocking on your door. The "it wasn't me, it was someone else" defence stopped being credible years ago and could easily wind up with the freeb

    • In the article the guy says it's just like providing heat and light to guests. Fine, why not give them all your money, too. Why not take the fall when your "guests" are pulled for speeding, or online fraud?

      Because that is different. Heat and light is something you have in your house anyways and it costs you nothing to share it. WiFi is the same. When my son'e freind came over and brought his Apple iPod Touch it cost me nothing to put him on my wireless network

      The problem with making it public is that 99.
  • by joebagodonuts ( 561066 ) <cmkrnl.gmail@com> on Thursday January 10, 2008 @12:49PM (#21985586) Homepage Journal
    "Security is always a trade-off. I know people who rarely lock their front door, who drive in the rain (and, while using a cellphone) and who talk to strangers..."

    Plenty of people worried; "Oh someone might download kiddie porn and I would get blamed", "Oh, someone steals my information", "Oh, someone might download riaa music..."

    If you walk around in fear of things that never happen to you, then by all means, lock your stuff down - even better, stay off the net entirely! Then maybe you'll feel safe. Oh wait, you don't want to feel safe, you want to be afraid and worry.

    "This happens everywhere/all the time" - is a dangerous mindset when watching TV (or surfing /.)!
  • Someone started running his own DHCP server on it and caused other random disruptions. I've moved since so I may consider re-opening it.
  • Schneier is a pretty clever person. From my reading of some of his cryptography books, he knows a lot of tricks.

    Open WiFi because it's a security risk? That sounds supportable on the surface, but it's just asking for trouble, and Bruce Schneier ought to be the first person to tell you so.

    Then why is he espousing the controversial option of an open network? The answer may be obtained by following the money. Schneier propaganda leads to more open WiFi everywhere leads to ISP's raising cain and justifying high
  • Recently Opened Mine (Score:4, Interesting)

    by dcollins ( 135727 ) on Thursday January 10, 2008 @02:44PM (#21987744) Homepage
    I used to keep my WiFi router secured. But then there were some days when I couldn't connect from the other end of my apartment, and it was real handy to go through neighbor's unsecured WiFi. This convinced me that it was the neighborly thing to do and opened mine.
  • by Russ Nelson ( 33911 ) <slashdot@russnelson.com> on Thursday January 10, 2008 @03:45PM (#21988760) Homepage
    "insecure" is bad. "open" is good. It's an "open wifi network" not an "insecure wifi network."

"I think trash is the most important manifestation of culture we have in my lifetime." - Johnny Legend

Working...