Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Wireless Networking Networking Hardware

Wi-Fi Piggybacking Widespread 459

BaCa sent in this article about stealing network access that opens, "Sophos has revealed new research into the use of other people's Wi-Fi networks to piggyback onto the internet without payment. The research shows that 54 percent of computer users have admitted breaking the law, by using someone else's wireless internet access without permission." Of course, online polls being what they are, the results are hardly a plank for a full investigation, but a good share of the answerers did 'fess up to it as well.
This discussion has been archived. No new comments can be posted.

Wi-Fi Piggybacking Widespread

Comments Filter:
  • by r_jensen11 ( 598210 ) on Thursday November 15, 2007 @09:20PM (#21373065)
    What about people who keep their access points open and connect to other people's access points when they're away? I'd imagine that if somebody purposefully leaves their AP open that it wouldn't be stealing. The trouble is knowing if somebody intentionally has an unsecured WAP or if the person just never knew/bothered to secure it.
  • Encryption (Score:5, Insightful)

    by chill ( 34294 ) on Thursday November 15, 2007 @09:21PM (#21373075) Journal
    Considering many systems are configured to latch on to the strongest unprotected wifi signal they see, I've piggy-backed several times without intent.

    If you can't be bothered to set up even 40-bit WEP, then you have nothing to complain about. Hell, there are five signals that I can see from my house! Your RF is in my space! I should charge rent.
  • by compumike ( 454538 ) on Thursday November 15, 2007 @09:23PM (#21373097) Homepage
    The article asserts that logging onto someone's AP without their permission is "breaking the law", but is that really clear? Do I have to explicitly ask for permission before I walk into a restaurant? Of course not -- there's a reasonable expectation that there are no barriers to my entry, so I'm allowed (even invited) in. But, while I think physical analogies to computer situations can be very misleading, in the real world entry becomes illegal when you've had to defeat some protection mechanism (a lock) to get in.

    So, to summarize: I feel like cracking someone's WEP key to get on their net is pretty damn illegal. But I don't think hopping onto an open net is unsecured. In fact, the fact that it's open may be interpreted as a sign that the owner intends to allow open access!

    --
    Educational microcontroller kits for the digital generation. [nerdkits.com]
  • by PhantomHarlock ( 189617 ) on Thursday November 15, 2007 @09:25PM (#21373117)
    When you have an ornery parent...that REFUSES to get broadband...even if he's paying MORE for dialup through earthlink...you get desperate when you're visiting. Especially when two or three neighbors are running unsecured WiFi.

    I think it should be legal unless you're cracking someone's WEP or WPA to get in.
  • by Vellmont ( 569020 ) on Thursday November 15, 2007 @09:33PM (#21373197) Homepage
    Did I break the law? I didn't call up someone at net-security.org and specifically ask them if I can read their article.

    How is putting up an unsecured Wi-Fi connection any different than putting up an unsecured website?
    • The WPA actually ADVERTISES the fact that it exists.
    • When you connect to the network, most networks will have DHCP happily gives out all the information, even giving you an IP address automatically to any computer that asks.
    • Many people actually put up an unsecured AP with the INTENTION of giving out access. (And thus this becomes common expectation)
    • Many client computers will automatically connect to unsecured Wi-Fi APs
    • The technology exists to easily put a password on the Wi-Fi connection to prevent anyone from connecting to it


    oh, and here's one just for you people who like "it's like entering my house" analogies...
    • The wireless signals often times go right into MY house. i.e. I don't have to be one someone else's property to connect to an AP
  • by dwillden ( 521345 ) on Thursday November 15, 2007 @09:35PM (#21373219) Homepage
    The survey site and article are targeted at folks in the UK, where the legality of using an open wi-fi spot isn't as open as here in the US. Here, the FCC has said that if there is no attempt to lock it down, it's free game. There the rules are different. Thus the article is able to claim the act is illegal.
  • by konohitowa ( 220547 ) on Thursday November 15, 2007 @09:47PM (#21373313) Journal

    "Access" means to gain entry to, instruct, or communicate with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network. (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.

    By that definition, my operating system is in violation of the law whenever it scans for an available network and presents it to me for connection.

  • by doshell ( 757915 ) on Thursday November 15, 2007 @09:50PM (#21373341)

    "Access" means to gain entry to, instruct, or communicate with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network.

    (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.

    So every time you want to visit a web site, you write a letter or call up the webmaster to ask for permission?

    If by setting up a Web server I'm tacitly permitting inbound traffic, then surely setting up an unprotected wifi access point is the same, as far as the law is concerned?

    (I'm not saying Wifi piggybacking is or should be legal, just pointing out that the law you mention as it is is quite vague and open to interpretation.)

  • by tkw954 ( 709413 ) on Thursday November 15, 2007 @09:52PM (#21373367)

    Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.

    I would say that the beacon and authentication process would communicate that permission is granted:

    Access Point Hey everyone, I'm open for business!

    My Adapter Can I have permission to join your network?

    Access Point Sure! Here's an IP!

  • by nxtw ( 866177 ) on Thursday November 15, 2007 @09:56PM (#21373417)
    Thing is, though, 802.11a/b/g/n clients usually "associate" with an access point. This is after the client receives a "beacon" from the access point, basically advertising its existence.

    So, the access point tells the area that it's broadcasting, and the client sends an association request, and the access point associates with the client. Assuming that that association was gained by the client in a non-malicious manner (no MAC spoofing, no WEP cracking, etc,) it sounds a lot like the system was configured to give any client permission automatically.
  • by Average ( 648 ) on Thursday November 15, 2007 @09:58PM (#21373437)
    Look. 2.4ISM is an unlicensed band. Under 200mW, I have rights to transmit anything I want to. Period. If your router interprets it as a part of an HTTP request, that's not my fault. The "I'm swinging my arms, and if you walk into them it's your fault" theory.

    And, I do think someone needs to introduce RFC 2131 (DHCP) into evidence. An open router responds to a polite request with a positive acknowledgment. It is possible to configure the box not to give that acknowledgment, probably via an encryption key, but also by MAC filters or turning off DHCP. Introduce the owner's manual while you're at it.

  • by DJCacophony ( 832334 ) <<moc.t0gym> <ta> <akd0v>> on Thursday November 15, 2007 @10:14PM (#21373573) Homepage
    If by setting up a Web server I'm tacitly permitting inbound traffic, then surely setting up an unprotected wifi access point is the same

    Only if you name your access point "FREE WIFI", or by some other means convey that it is free, since a website is implied to be public by default, and an access point is implied to be private by default, even if there isn't a password.

    This is not the same thing as piracy. Stealing WiFi REALLY IS stealing, because you are depriving somebody of the bandwidth they are paying for when you use it without permission. That you think anything unknowingly left unprotected is fair to steal illustrates your lax morals. Would you steal somebody's car if they left it unprotected without knowing it? Well then why would you steal somebody's wifi if they left it unprotected without knowing it?
  • by monsterlemon ( 713644 ) on Thursday November 15, 2007 @10:16PM (#21373591)
    Yep, in the same way that giving a hitchhiker a ride is depriving a bus company of revenue. Or helping your neighbour install Linux is depriving both MS and your local PC repair shop of revenue. Let's just make "helping people" or "being a good neighbour" illegal in general, shall we?

    I guess the real motivation for this being illegal in the UK is to try to reduce the possibility of anyone getting truly anonymous net access. After all, they might be TERRORISTS! Or PAEDOPHILES! Or inconvenient protestors who disagree with the government and are going to do something about it...
  • by DJCacophony ( 832334 ) <<moc.t0gym> <ta> <akd0v>> on Thursday November 15, 2007 @10:19PM (#21373611) Homepage
    While I was away, my parents decided to get WiFi, without telling me until I returned. I looked at the configuration and they did not put a password on it. When I asked them about this, they said they didn't know about adding a password. Did they intend to make their internet available to everybody? NO. They just didn't know to protect it. An access point is open by default, so by your logic, all new access points are free to use until they're passworded, even if their owner doesn't know to add a password.
  • by phoenix_rizzen ( 256998 ) on Thursday November 15, 2007 @10:22PM (#21373631)
    Why would putting a server up on port 80 be considered public anymore than putting up a wireless access point? I don't see how having a web server is "implied public". Just because I put it there doesn't mean I want everyone to access it. That's a poor example to use.
  • by MilesNaismith ( 951682 ) on Thursday November 15, 2007 @10:57PM (#21373905)
    Let me make it SIMPLE for the simpletons and ethically challenged.

    Your neighbor has an old-style cordless phone. You find a handset for that type phone at a garage sale, and start using THEIR phone line that THEY paid for, to make your own calls.

    It starts out just doing it in the middle of the night, you know so nobody will notice. Then one day they pick up the line while you're on it. Do you LAUGH HYSTERICALLY and explain to them how you are entitled to use their utility?

    Probably not. Because you know it's wrong, and illegal, so you hang up really quick. All other analogies people will make, are attempts to RATIONALIZE what they are doing and make it okay when they know it is not. There is a vast difference between picking up radio signals like with a scanner, and ACTIVELY sending them into someone else's network so you can make us of the utility that they paid for and you didn't.

  • Re:Sharing = Crime (Score:3, Insightful)

    by Lehk228 ( 705449 ) on Thursday November 15, 2007 @11:03PM (#21373947) Journal
    the gain of widespread free wifi is much greater than the harm of aononymous criminals. a pedophile cannot hurt a child with only an internet connection, a terrorist can't blow up a bus with only an internet connection, however only an internet connection can make the difference between finding your hotel and spending the night sleeping in your car cause you got lost. a free access point can keep you entertained, it can let you send an important email after a power surge toasts your modem, or GET an important email after your neighborhood loses power. or for that matter check your utility company's outage reporting website (yes it sounds stupid, but some do have a website to check for and report power failures)
  • by 1u3hr ( 530656 ) on Thursday November 15, 2007 @11:15PM (#21374013)
    (1) A person who-
    (a) dishonestly obtains an electronic communications service...

    So it's "illegal" if it's "dishonest". How is it "dishonest" to connect to an open wifi point? No misrepresentations are made. Your PC/laptop requests access and it is granted. No hacking, cracking or dishonesty is involved. No dishonesty, no illegality, it seems to me.

  • by Ungrounded Lightning ( 62228 ) on Thursday November 15, 2007 @11:32PM (#21374151) Journal
    I would say that the beacon and authentication process would communicate that permission is granted:

    For decades much of the computer using community has taken the settings of things like file permissions as not just a technical access control, but an expression of intent.

    For instance:

      - If a file's permission is read-group or read-world and it is sitting in a directory that is also group or world accessible, anyone might chose to examine it at any time, without notice to, or explicit permission from, the owner.

      - If it (or the containing directories) is not read-enabled, users with adequate system permission or knowledge of system internals may be ABLE to read it. But (if they behaved ethically) they would normally NOT do so unless the had either explicitly obtained permission from the file owner or were performing the access as something necessary to their job function - in which case they'd read it as little as possible.

    Tools (such as mail readers) were normally designed to set the permissions of files they created in accordance with the likely wishes of the users.

    IMHO continuing that logic makes perfect sense.

    A significant number of people deliberately make their access points available to any non-disruptive transient user, as a community service. This is often done by leaving them at their default settings. Meanwhile, access points have a fine mechanism for putting up a "no trespassing" sign: WEP encryption. It's very weak and can be trivially broken. But turning it on makes it clear that the AP's owner did not intend for the AP to be used without explicit permission, and breaking the encryption makes it clear that a user intended to disregard the owner's wishes. So it's like the latch on a screen door: Trivially bypassed - but clearly expressing intent.

    Granted most APs are shipped with WEP turned off, so a lot of users leave them open out of ignorance rather than as an expression of intent. But IMHO the user of an open AP can plausibly deny any intent to trespass on the AP and that the user had failed to post the property as private.

    So it seems to me that the appropriate stand for the legal system to take is that the WEP setting and key distribution practices of an AP's owner are an expression of the owner's intent.
  • by westlake ( 615356 ) on Thursday November 15, 2007 @11:35PM (#21374187)
    I would say that the beacon and authentication process would communicate that permission is granted

    Communication between machines is not communication with their owners.

    The permission you need is from the subscriber who signs the monthly checks to Verizon. The judge doesn't have to say that as a matter of law a residential "access point" is meant to be public simply because it is not secured.

    It's the judge's business to ask the inconvenient questions:

    Why were you parked in a neighborhood where you had no acquaintances, no obvious reason for being there? Why were you using a directional antenna, the Pringles can? The legit public access point generally isn't in the basement playroom of a private home.

  • by jcuervo ( 715139 ) <cuervo.slashdot@zerokarma.homeunix.org> on Friday November 16, 2007 @12:13AM (#21374451) Homepage Journal

    Only if you name your access point "FREE WIFI", or by some other means convey that it is free, since a website is implied to be public by default, and an access point is implied to be private by default, even if there isn't a password.
    Uhm. My public network is not named "FREE WIFI". It's a Linux box with a Prism2 card doing HostAP, and it's free to anyone in range. In the interests of brevity, suffice it to say that I've put a lot of work into it.

    So, if my network is intentionally left easily accessible, why do you say that "linksys", "NETGEAR", or "default" network isn't there because that's how they wanted it? Because the essid is factory default? I had a Netgear wireless router once. Nice piece of equipment, IMHO, but overpriced. I routed it through the Linux box I had handling that sort of thing at the time and left the access point itself unsecured (except the admin password, obviously). Basically the same setup as now, but less complex. I left it that way so that my neighbors could get online through me.

    Am I the exception to the rule?

    Stealing WiFi REALLY IS stealing, because you are depriving somebody of the bandwidth they are paying for when you use it without permission
    I'm sharing it. Willingly. Right now. Know why I didn't include traffic shaping in either of my descriptions of my current or previous setups? Because I never needed to. Besides that, if I'm just doing the usual browsing, it's not like it takes up a lot of bandwidth. Slashdot? Oh no. A couple of seconds where the connection drops below 153k/s. I'd be more worried about sbcglobal going down for a few hours again. One of the outages lasted so long, I wrote a system to gnuplot how often and how long my connection went down.

    That you think anything unknowingly left unprotected is fair to steal illustrates your lax morals. Would you steal somebody's car if they left it unprotected without knowing it? Well then why would you steal somebody's wifi if they left it unprotected without knowing it?
    That you equate "open wireless" with "anything" illustrates your warped version of reality, and that you equate stealing wireless with stealing a car indicates that you, sir, with all due respect, are a complete idiot.

    If you don't want someone accessing your network, fine. Enable encryption. I'll stay off of it. Most other people will, too.

  • by asdfghjklqwertyuiop ( 649296 ) on Friday November 16, 2007 @12:25AM (#21374561)

    Communication between machines is not communication with their owners.


    Ah, so you personally asked all owners/shareholders of SourceForge, Inc. if you could access this website and post comments on it...
  • by tunapez ( 1161697 ) on Friday November 16, 2007 @12:31AM (#21374605)
    When the LEOs knock on your door and take all your electronics b/c a squatter ran stolen credit cards on your network, then you may rethink your altruism. Sure you'll probably be cleared if the MAC's not a clone of yours, but that's after a long, long investigation. I've seen it happen twice in the last 2 years, not pretty. I suggest encrypting, filtering and sharing the hex key w/ the neighbors. But then, some crank will probably get in and do it anyways...nm.
  • by Oligonicella ( 659917 ) on Friday November 16, 2007 @12:40AM (#21374679)
    At best you are disingenuous. A web page is put up on the internet for the specific function of being viewed. It is analogous to posting a flier on a public bulliten board. A wifi can be set up by third party techs in a house for family use. It is reasonable to expect others to not trespass.
  • by Shakrai ( 717556 ) * on Friday November 16, 2007 @12:47AM (#21374737) Journal

    broadcasting the SSID is offering access. the purpose of the SSID is to say "hey i'm here, connect to me"

    Actually, I thought the purpose of the SSID was to serve as the service set identifier to differentiate between networks. The SSID is also broadcast on an encrypted network, and anyone would agree that an encrypted network is not exactly saying "hey, I'm here, connect to me"

  • by Bartab ( 233395 ) on Friday November 16, 2007 @12:52AM (#21374761)
    This whole analogy to a car has to stop. It's not even close.

    You do not take possession of a wifi AP. It stays exactly where it is, still available for use by the owner - or anybody else.
  • by a_nonamiss ( 743253 ) on Friday November 16, 2007 @01:05AM (#21374895)

    Connecting to an open wi-fi network is not a crime in New York State. Bypassing someones WEP key in order to use his wi-fi however, is.
    I'd say that pretty much nails it right on the head. I feel very strongly that if my neighbor sets up an open access point called "netgear" and broadcasting it into my house, they're telling me that they don't care if I use it. In fact, maybe I don't want every person in my household to have unrestricted Internet access. If they're not securing their access point, my children could browse unsavory websites, and aside from taking their computers away from them, I couldn't do a thing about it. (legally) Now, I am a good neighbor, and I've made more than one household in my neighborhood aware that they were offering up free bandwidth to anyone who happened by, and I've even offered up my expertise free of charge to help them secure said access point.

    Now, on the other hand, if I crack a WEP key, I am clearly crossing a black and white line. Cracking WEP, although trivial, requires effort on my part. If my neighbor puts up a sign on his front door reading "GOLD INSIDE." and buys a really flimsy lock, it's still clearly crossing a line for me to help myself to said booty.
  • by Lehk228 ( 705449 ) on Friday November 16, 2007 @01:19AM (#21375007) Journal
    sure it is, it's then refusing to let you on if you don't authenticate, just like a club with a bouncer.
  • by jamar0303 ( 896820 ) on Friday November 16, 2007 @01:36AM (#21375113)
    Ignorance of the law has never been a defense in criminal cases. Why should it be a defense here? If they don't want to share and don't want to bother to learn how to set WEP, they can go for an Ethernet router.
  • by Anonymous Coward on Friday November 16, 2007 @01:40AM (#21375135)

    It is reasonable to expect others to not trespass.

    Trespass??

    At any given time I have up to 27 different wi-fi signals traversing my front room. If I walk through to the back of the house I have perhaps 15 others. Who's trespassing?

    If I sit on a bench in the street and use your wi-fi, how can I be trespassing in a public street?
  • by prockcore ( 543967 ) on Friday November 16, 2007 @03:54AM (#21375797)
    because an SSID is an identifier.. my street number is on the side of my house.. it's not an invitation to come on in.
  • by prockcore ( 543967 ) on Friday November 16, 2007 @03:57AM (#21375811)

    Does anyone who buys a wireless access point seriously believe that they are the only ones who will be able to access it?


    It's not unreasonable. My cordless phone didn't require a password, and I'd be pretty upset to find my neighbor using it.

    I think access points should come with a password out of the box.
  • by Gordonjcp ( 186804 ) on Friday November 16, 2007 @04:06AM (#21375837) Homepage
    If they're not securing their access point, my children could browse unsavory websites, and aside from taking their computers away from them, I couldn't do a thing about it. (legally)

    I know this is a stretch, and I know some people are averse now new and untested ideas, but - you could try *talking* to your children about what they are and aren't allowed to do.

    Why get your knickers in such a twist about "unsavory websites" anyway? If they're old enough to be allowed the responsibility of using the Internet unsupervised, they're old enough to make their own decisions about what's suitable and what's not, and whether or not it breaks their rules.

    I guarantee you, whatever you call an "unsavory website", your teenagers will already have seen something worse. And laughed at it.
  • by konohitowa ( 220547 ) on Friday November 16, 2007 @04:56AM (#21376007) Journal
    Either you're being tongue-in-cheek, or you didn't understand what I was talking about. Both Windows & OS X automatically scan the local wireless network area and keep track of open networks. In order to do so, they have to communicate with the wireless network. This is PRIOR to the user having any interaction with the system.

    Obligatory car analogy: If my car explodes and kills someone, it's the car's fault, not mine (unless I rigged it to blow up).
  • by Artifakt ( 700173 ) on Friday November 16, 2007 @05:10AM (#21376089)
    I'm not sure if a WAP is analogous to a webserver, but I don't see how either can be considered private by default. There are certainly public web pages, and there are certainly public wireless access points (i.e. the ones offered at Starbucks, Krystal, various hotels and others are intended to be publicly accessed, at least by their customers. Sometimes whole communities have set up public WAPs). Then there's WAPs that a completely innocently minded person might well assume are public, (i.e. the cases where a person parked outside the local library has accessed its wireless net, and knows that the library provides public terminals, so assumes this is part of the same service). The ratio of public to private WAPs favors private, but the law isn't based on some "is the majority private or public" test in most other cases.
          (For example there are lots of charter only buses, and some private buses with fixed stops and routes on the roads near my location, and there are lots of School buses, and a public transport community bus system that paints its vehicles with many different designs and colors. There's no law that says people should not hail a bus until they are absolutely certain it's not a private chartered vehicle, or anything remotely like that, and no one is looking at how many buses of what kinds are public or private, and what subtypes there are, when it comes to passing new laws. If the ratio of chartered lines to school buses changed, I don't think anyone would say we needed to change the existing laws vis-a-vis buses.).
          Most laws are built on reasonableness tests and the like, not some percentage test. Telling people they should assume any WAP not explicitly marked public is private is no different from telling them they should assume anything not explicitly marked public domain is still copyrighted, or should assume any road without a clear sign is a private drive. That pesky "Innocent unless proven guilty" principle includes not shortcutting the law by claiming that someone had criminal intent just because they didn't assume automatically that something was private unless clearly marked otherwise. Instead the law should have to prove the person didn't have a reasonable expectation that something was being made public. That's mostly well established law - hanging your wash out on a clothesline isn't making the wash legally takeable by the public, putting in a sidewalk that better supports access to an adjacent location is explicitly giving someone permission to walk that way (unless it's marked otherwise). Instead of whole new laws, WAP issues are best resolved by a body of precedents that follow existing examples. The courts can decide just how much or little the WAP owner has to do to have it considered private.
          We frequently tell private owners they should put up the signs or shut up (i.e. If you want parking in front of your business to be used for your business only, post it or don't complain, if you don't want your buried cable dug up, then mark it, etc.). We used to make copyright holders put explicit notices on works rather than make everyone else assume they existed unless proved to have expired. Let a person cross your land enough times without complaint, and you don't have to give them explicit permission to have established an easement. The law has many cases where not doing something to stop access counts as granting access. A legal decision that not changing the WAP defaults is in line with giving permission is justifiable on similar grounds. It's not necessarily the right call, but people who are arguing that the courts can't, or should never do that don't know common law very well (Or they know it very well indeed, but hope the general public never learns).

         
  • by Grakun ( 706100 ) on Friday November 16, 2007 @10:12AM (#21378143)

    In each of your links, the perp was purposely sitting outside a hub and creating traffic, knowing he was siphoning bandwidth and money.
    That's spin as well. Most ISPs don't charge by the amount of data transferred. Someone checking their email on a lunch break, such as the case in Michigan, is not going to incur any extra charges from the ISP. Nor are they going to cause any noticeable performance loss on the network.

    An automatic detection is not the same as traffic.
    Windows doesn't just detect the networks. It automatically connects to any available one. When it connects it does generate traffic. It also communicates with the Access Point, which is the crime people are being charged with. After it receives the SSID broadcast from the AP saying that it's open and available to connect to, it connects and sends a DHCP discover packet. The AP responds with a DHCP offer. The client then requests an IP address and waits for the AP to acknowledge it before it can even send anything across the network.

    In addition to that, your typical mail client will check for new messages every 10 minutes. Windows will automatically download updates. Many manufacturers pre-install software that also automatically downloads additional software updates. These things all generate traffic.

    Regardless, the crime people are being charged with is unauthorized computer access. The amount of traffic they generate is irrelevant. The law is interpreted as meaning that it's illegal to access the network device, regardless of the AP being configured to broadcast that it's open and offering IP address leases to machines that it sees trying to connect.

    How is your average user supposed to know that the internet access they are given automatically is illegal?

    How do you distinguish between APs that are open but illegal to use from APs that are intentionally left open for the public to use?
  • It's Not Stealing (Score:3, Insightful)

    by YetAnotherBob ( 988800 ) on Friday November 16, 2007 @10:34AM (#21378397)
    As long as we continue calling net access via unprotected gateways, music file downloading, etc 'STEALING' we are not going to be able to deal with the problems that are real.

    It isn't stealing. For music, it is copying without permission. that is wrong, but it isn't worse than murder, as US federal law currently maintains, and it isn't 'Piracy'. Piracy is a crime that involves murder, theft and the destruction of property, with rape and enslavement frequently thrown in. None of that happens on line. It isn't even physically possible.

    For net access, there are less drastic means to fix things. I run a home network that is open. I know that at least one neighbor has used it for their access. For the occasional email or light browsing, that's not a problem. I pay for the connection so that my family can use the net. As long as we are not inconvenienced, we are not harmed. My ISP has contracted with us to provide a certain level of data throughput, so they aren't out. We can't exceed our contract amount anyway. Where there is no harm, there is no reason for a stupid law.

    If I were running a business this would be different. Then, I wouldn't be running it wide open. Where someone has to break in, it should be illegal, but any open network connection should be able to be used.

    Can anyone show me where I'm wrong?

    P.S. I did have one incident where somebody was downloading something big, and we had seriously degraded performance on our home wifi. I solved it by unplugging the wifi for 15 minutes. Never happened again. Simple solutions are the best.
  • by Khisanth Magus ( 1090101 ) on Friday November 16, 2007 @11:02AM (#21378769)
    Actually, they are describing "In absentia" parenting. Don't try and keep track of what your kids are doing. Just find a way to block what you don't want and then let them do their own thing. "Parenting" involves talking to your kids and being involved with their lives. A kid who has true parenting will KNOW what is right and wrong. Oh, and sex? Many kids begin having sexual urges around puberty(which generally hits at the end of elementary school). The typical American approach of "SEX BAD!" really does nothing more than make them more curious and more likely to do something stupid. Although I know it is a foreign concept these days, talking to your kids about it might actually accomplish something.

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...