Schneier Says 'Steal this Wi-Fi' 432
apolloose noted Bruce Schneier's latest entry on Wired where he talks about insecured wifi networks, and suggests that you
Steal this WiFi. Basically, since insecure WiFi is everywhere, why not? You're helping make the world a little better for someone else.
Yeah, but... (Score:5, Funny)
Re: (Score:2, Insightful)
No thanks, I'll lock down my network.
Re:Yeah, but... (Score:5, Informative)
What he said was, "If I enabled wireless security on my network and someone hacked it, I would have a far harder time proving my innocence", and I often wonder if he's right. Like you, I'm pretty terrified of the accusation, so my network is locked down as tight as I can get it. I use WPA with a strong password, MAC address filtering, I renumbered the subnet from the default, I set a strong administrator password, and disabled DHCP... and if I can think of anything else I can do to lock it down, I'll probably do it, out of fear that somebody will do something nefarious with it.
On the other hand, if I do get hacked (somehow), all that work will probably hang me. Couple that with the fact that I have an advanced degree in computer science (which to the average slashdot reader seems to mean I now *nothing* about computers, but would surely impress a jury of my "peers" that I'm impervious to being hacked), and if my network is used against me, I'm getting the death penalty.
Re:Yeah, but... (Score:5, Insightful)
Re:Yeah, but... (Score:5, Funny)
Re:Yeah, but... (Score:5, Insightful)
All he's doing is making life harder for himself.
Re:Yeah, but... (Score:4, Insightful)
His theory. I didn't hear him claim the lawyer told him that.
Like you, I'm pretty terrified of the accusation, so my network is locked down as tight as I can get it. I use WPA with a strong password, MAC address filtering, I renumbered the subnet from the default, I set a strong administrator password, and disabled DHCP... and if I can think of anything else I can do to lock it down, I'll probably do it, out of fear that somebody will do something nefarious with it.
No, from what I've seen in legal cases is that you have to at least show it was likely someone else used your property to commit the crime. It's not enough to say "someone else was driving my car" you have to explain who it could have been and know reasonably where it was.
If you really want to lock things down, no need to disable DHCP. Just setup a RADIUS server and get an AP that supports it. Breaking into your network requires two steps then; breaking the encryption, AND compromsing the RADIUS server.. both of which would need to be done to use the network in the first place.
On the other hand, if I do get hacked (somehow), all that work will probably hang me. Couple that with the fact that I have an advanced degree in computer science (which to the average slashdot reader seems to mean I now *nothing* about computers, but would surely impress a jury of my "peers" that I'm impervious to being hacked), and if my network is used against me, I'm getting the death penalty.
They'd have to prove more than just your network was used. They'd need to find it on one of your computers somewhere, which there shouldn't be, because you didn't do it. Also, keeping logs can help if you can find in the logs that something weird happened that looks like a security breach.
Re: (Score:3, Informative)
Re: (Score:3, Informative)
The six dumbest ways to secure a wireless LAN [zdnet.com]
Re:Yeah, but... (Score:4, Insightful)
Compared to using a dictionary based attack on a WPA encrypted WLAN it is rather trivial to bypass this hurdle. In this light it seems much more reasonable to invest time in creating a non-trivial password for WPA than to turn on such "features".
The only downside is that it's quite annoying to dictate 16-char urandom passwords whenever some friend comes along and wants to connect. Plus all these non-geek people get assurance that I'm truly paranoid (heck, when 16 chars random becomes the standard I'll just move on to radius to convince these people
Re:Yeah, but... (Score:4, Insightful)
Anonymity (Score:4, Insightful)
If you want to commit a crime online, it's easy enough to drive your car to the next city, open you laptop and connect to a random open AP.
And if you were too lazy to do that, you can always say "It wasn't me, someone else connected through MY open AP!"
Re: (Score:2)
Yeah, like this guy [theregister.co.uk]. He only got caught 'cause he set a meet. I wonder if the "elderly couple" were reprimanded for leaving their AP open? It doesn't sound like it.
That actually seems to work! (Score:4, Informative)
Hey, how about that? Here's a link an article about it. [techdirt.com]
"The IP address simply can help you know who paid for the internet access, but not who was using what computer on a network. In fact, this even had some people suggesting that, if you want to win a lawsuit from the RIAA, you're best off opening up your WiFi network to neighbors. It seems like this strategy might actually be working. Earlier this month the inability to prove who actually did the file sharing caused the RIAA to drop a case in Oklahoma and now it looks like the same defense has worked in a California case as well. In both cases, though, as soon as the RIAA realized the person was using this defense, they dropped the case, rather than lose it and set a precedent showing they really don't have the unequivocal evidence they claim they do."
Well, whaddya know?
I don't even own any WiFi equipment for fear of someone using my connection to do something questionable...but now maybe I will buy one. Nothing like a get out of jail free card, y'know?
Re: (Score:2)
Beware of strangers bearing gifts (Score:5, Interesting)
So please "steal this Wi-Fi" since I need a few more social security and credit card numbers.
Re: (Score:2)
Re: (Score:2)
[TJX nods approvingly]
Re: (Score:2)
Assuming the person stealing your Wi-Fi is using an unsecured site to do their transactions or that you can crack an SSL link.
Re: (Score:3, Informative)
Re:Beware of strangers bearing gifts (Score:5, Informative)
All of that means you aren't going to do shit; the payoff just isn't worth it and it's not as easy as some
Re: (Score:3, Insightful)
Re:Beware of strangers bearing gifts (Score:5, Funny)
Re:Beware of strangers bearing gifts (Score:5, Funny)
The non-tech savvy will find it ambiguously gross and avoid you, your property, your children, your dog...
Re:Beware of strangers bearing gifts (Score:5, Funny)
"He snorts coke and has a commercial lumber company."
Or
"He has cold, and probably a clogged toilet."
I'm surprised you don't more traffic.
Re: (Score:2)
I have the reverse problem at home.
I run an encrypted Wi-Fi network, connected to my local network and ADSL connection. However, someone else in the neighborhood runs an unencrypted Wi-Fi network, and whenever I start my laptop it tries to connect to the unencrypted networks first. I have to remember to check what network it is connected to before I use anything.
The unencrypted network is probably benign, setup by someone who hasn't read the manual and is blissfully unaware of the implications of hav
Re: (Score:3, Interesting)
Chris Mattern
Why steal when you can share? (Score:2, Informative)
Re: (Score:2)
I just publish it's availability with it's SSID an not putting a password on it. Surely it's obvious that I don't mind other people using it.
If I didn't want people to use it, I would take measures to make it obvious, like putting a password on it, and not advertising the SSID.
Re: (Score:3, Insightful)
Re:Why steal when you can share? (Score:4, Insightful)
Car analogy (Score:3, Insightful)
Re: (Score:2, Insightful)
Obviously the situation you describe is somewhat unrealistic (since no one would do that--losing a car is rather worse than losing a few MB of your bandwidth). A more realistic version might be a defense such as "yes that's my car, but these 20 people have access to the keys for that car, so it could have been any one of them driving it" a
Re: (Score:3, Interesting)
The ticket was specifically worded not to be issued to the driver. It was to the owner of the car, regardless of whether they were driving. This did have some implications otherwise: It therefore didn't result in 'points' being added to my record.
So, back to the computer situation, they could just say that you are responsible for that bandwidth, and should have blocked it if the traffic wasn't from you. Don't know which would hold up in
Re:Car analogy (Score:4, Insightful)
Re: (Score:2)
Yeah! But firmware and software changes would help (Score:5, Interesting)
1. Clients (laptops) default installed wifi software (hint: Steve Jobs are you reading???) need a scanning
mode which does not waste my time telling me about all the password or mac-address locked wifi
basestations, and only advises me about open ones.
2. Basestation/routers need a simple-to-configure mode where they will let others into a separate
subnet that goes straight out to the Internet but does not see my home computers directly.
3. (Brain software/mindset change.) Americans need to stop reflexively calling sharing 'stealing'.
You've been trained into this terminology by those who have already stolen everything and don't
want you to get it back.
Encrypted private *and* unencrypted open wi-fi (Score:2)
Re:Encrypted private *and* unencrypted open wi-fi (Score:4, Informative)
Re: (Score:2)
Some of the newer APs have it built-in. Or you can do it by cascading two older, cheaper APs, like this [slashdot.org].
Re: (Score:2)
Its just up to the firmware of the device which determines what it can do.
There certainly are some which can do it without much hacking.
Re: (Score:3, Informative)
Re:Yeah! But firmware and software changes would h (Score:2)
I'm not saying nobody should offer such paid public access points, just that
Re:Yeah! But firmware and software changes would h (Score:2)
++
Sharing WiFi is fundamentally different from sharing copyrighted material. I don't get why pe
Re:Yeah! But firmware and software changes would h (Score:2)
1. Clients (laptops) default installed wifi software (hint: Steve Jobs are you reading???) need a scanning mode which does not waste my time telling me about all the password or mac-address locked wifi basestations, and only advises me about open ones.
Leopard shows padlock icons next to locked networks. For at least two prior major OS revisions, you have the option to be told about open networks, and/or join them automatically.
Do you have any idea how much of a problem this is for IT people dealing wi
Re:Yeah! But firmware and software changes would h (Score:2)
mode which does not waste my time telling me about all the password or mac-address locked wifi
basestations, and only advises me about open ones.
You need to upgrade to leopard. It shows a little lock next to the names of locked down wifi.
Ethics by analogy (Score:5, Insightful)
As I see it, if someone left their wi-fi open, then either it was intentional, or they're too clueless to notice (or care) that I'm reading my email.
Re:Ethics by analogy (Score:5, Insightful)
Re: (Score:2)
It's pretty bad when I sit in my living room, forgetting that my 802.11 configuration was for'any' SSID and swear about WTH can't I get to my local servers?
"Insecured" Wi-Fi (Score:5, Funny)
Usually not stealing (Score:4, Interesting)
Re:Usually not stealing (Score:5, Insightful)
- You might be blamed for illegal file sharing or spamming
- You might be held legally responsible for what other do
- You might be the victim of malicious users
- You might.... nevermind, all the reasons are to protect you from people who would sue you. What does that say about the world?
Lets throw some other analogies out there:
You shouldn't stop to help a stranded motorist because they might attack you or kill you
You shouldn't give people advice because they might sue you for using it badly (lawyers & doctors)
You shouldn't leave objects in your lawn in case someone trips and sues you
you.... getting the picture?
You are NO LONGER free to do as you wish with what is yours because other people control what you do, either directly, or indirectly as a consequence of fear of what they MIGHT do. If gun makers are not responsible for what people do with the products they make, you should NOT be responsible for what people do with the bandwidth you gave them to use.
If we can be held responsible for what happens across our open APs, then the ISP can be held responsible for what goes across its network.
In the end, common sense and reasonable thought dictate that the person who does the spamming or file sharing is responsible. If you leave a gardening tool in your lawn, and a person trips on it and hurts themselves, who is at fault? If you put a bench in your yard where people can sit and rest and some kid pushes another who then falls and cuts his head on the bench, who is at fault?
I know those don't fit perfectly, but the point is that just because you helped to create something, you are NOT responsible for the use of it. Leaving your car unlocked is a good analogy: if someone takes it, they are stealing, and just because you did not do all that you could do to prevent them from taking it does not change the fact that they stole it.
In another thought, holding the AP owner responsible is like trying to treat them as network security experts under the law. Insurance companies, police departments, all sorts of people work to inform you how to stop someone from stealing your property but does anyone do public service announcements to tell you how to stop people from stealing your bandwidth? Can you get insurance to protect you from bandwidth theft? or to compensate you when the **AA are suing you?
Is a bus driver culpable if he drives the bus that a bank robber used to get to the bank he robbed?
This goes on and on, but the point of holding you responsible for what others do with something you gave them (without the intent of doing so for malicious or nefarious reasons) has been proven in court already. Gun makers are not responsible for any deaths that happen from use of their products. Game over.
think it's OK .... better stay in the USA then (Score:3, Informative)
See this example in the UK
http://news.bbc.co.uk/1/hi/england/hereford/worcs/6565079.stm [bbc.co.uk]
The flaw in Schneire's logic. (Score:5, Insightful)
Securing your wireless network with encryption isn't like flipping a switch, but it's a HELL of a lot easier and more accessible than knowing how to secure each and every device accessible on your network. Having ONE point of entry and configuring that properly is a lot easier to maintain than having multiple, different, changing points that take continued vigilance to remain secure. Is it better to keep each device secure on any network? Sure.. but how many people have the time, patience, knowledge, and ability to do that? Not many.
Re: (Score:2)
Re: (Score:2)
Assuming that he properly secures any protocols that he cares, he can probably do it pretty damn well. SSL/TLS secured protocols use a cert signed by a trusted authority. SSH allows you to validate the public key of a server. Initially obtaining the public key could use some improvement though.
Someone could do a MITM attack against http based web browsing, but that's fine as long as you stick to SSL for any
He's being an idiot. (Score:4, Insightful)
If "Something Bad" were to happen from your IP address, there -will- be a knock at your front door in the early morning. Trust me.
"Something" happened to my personal email server several years ago, and I had federal agents at my front door at 1am. I don't know what the heck happened - they wouldn't give me any details - but they seized my email server, and every computer in my household, even though their search warrant was only for the server. You don't tell them "no" - all that means is that they wait for the search warrant to be signed, and THEN they wreck your place searching. Much better for everyone involved to be cooperative.
Cost me thousands of dollars in a retainer fee to a lawyer, I had to take a polygraph exam, and it took almost 2 years to get all my "stuff" back. That was 2 years where I was fearful for my job, worried about keeping my family afloat, worried about just about everything. My wife lost ALL of her graduate school work, and had to re-do most of it to turn in her final portfolio. Talk about miserable.
And I STILL have no idea what that "Something Bad" was. And it didn't even happen at my house - it happened at my hosting ISP where the email server lived. It didn't matter that *I* didn't do it. I still had MY stuff taken from my, *I* still had to go take the polygraph exam, and *I* was still on the hook for 2 years.
So yeah - keeping an open wireless network is just ASKING for trouble. If you want to deal with federal agents in the middle of the night, well, be my guest. You can talk the talk about how you'd tell them to go away, and how they'd have no proof, etc. etc., but unless you've been there, you have no idea what you're in for.
Trust me.
Re: (Score:3, Insightful)
Voter ID fraud - DOESN'T EXIST, so no law req. (Score:3, Insightful)
Bruce jumped the shark for me when in the comments section of his blog he dismissed state election voter ID requirements because voter fraud probably only accounts for a few percentage points here and there, as if that's not enough to sway an election.
If you don't know, this is the very issue that was argued before the U.S. Supreme Court yesterday (Indiana law requiring government issued photo ID to vote). I agree with Bruce's POV, but his argument is NOT STRONG ENOUGH.
In-person voter ID fraud doesn't
Re: (Score:3, Interesting)
Besides, the police probably wouldn't be able to get any useful data off his computers without hiring him to help.
Re:He's being an idiot. (Score:5, Insightful)
The only reason you had no recourse is because you consented. If you made them get the warrant signed and they still took items not listed on the warrant you would have had an excellent case against them.
FON and Co (Score:5, Interesting)
There are already a number of organisations/initiatives around that actively encourage you to purchase their wireless routing products and then open up access to everyone.
I'm a member of FON [fon.com], which allows you to allocate a specific amount of bandwidth for sharing if you're using one of their routers - say 1MB of your 8MB ADSL, which neatly overcomes the first poster's issue of not having enough bandwidth for their own nefarious purposes. After being a member of FON for 12 months they actually sent me three free wireless routers at Christmas, which I gave away to friends hoping that they too will join and share bandwidth.
There's another company I heard about, US based, that does something similar, but I can't think of their name right now.
However, I wonder about my ISP's stance regarding sharing WiFi for free with others. Does it violate their Ts&Cs? Do I care enough to actually find out? No!
Re: (Score:2)
Need help Here (Score:2)
"The accused's chance of winning is higher than in a criminal case, because in civil litigation the burden of proof is lower. "
I am having a hard time parsing this sentence. Should it be "accuser's" rather than "accused's" or have I just got a mental blank about this sentence. Maybe change "winning" to "losing".
Re: (Score:2)
If you go to court accused to downloading something bad, you have a better chance of winning (not guilty) in criminal court. The burden of proof is lower is civil litigation. Think OJ--not convicted of murder in criminal court, but still found libel in civil.
Correct my if I'm wrong (Score:5, Interesting)
While I understand the anonymity helps his secure network stand out, all those open networks are just waiting for a guy with a little time and knowhow to start doing many bad things, say, man-in-the-middle. Just because you are blending into the pack does not keep the lions from eating one of you.
Now then, it IS his network at home, so he can do whatever the heck he feels like. And I do understand his social aspects of looking at WiFi as another resource for the public. But that does not free you from liability regardless of how little or insignificant it may be or stupidly enforced.
To me, it sounds like he doesn't want to roll up his sleeves and do some dirty work with port-forwarding, SSH-ing, and proxying. With those, you can enjoy quite decent browsing while away AND understand that your weakest point is at home.
On an unrelated note, where does this guy live?
My printer means "Closed Network" (Score:2)
But I write down the password on the router, and anyone who visits in person is welcome to use it.
Does Bruce not use a home printer? Share files between home computers?
I am a Sharer (Score:2)
For several years, I ran an open connection. Nothing bad happened. I doubt anybody used it, because it was in an apartment complex with mostly older, non-tech savvy individuals. But it was there.
I have since moved, and found an open network in my area. I browse, chat, e-mail, do occasional software updates, and occasionally download free music [jamendo.com]. I stream a Sirius radio audio connection from time to time, but that is low bandwidth. No streams of pirated movies. No infinite queues of warez or copyrig
If advertised as open... (Score:2)
Kinda like having a doorman shouting "C'mon in!" to passers-by and handing full-access visitor ID cards to anyone who walks in.
Hardly stealing in most cases (Score:2)
In my neighborhood, there are a number of 'belkin54' and 'linksys' APs advertising default SSIDs and networks with no privacy settings.
Now, if you log in to the device (which likely has a default password too), and change any setting, that is definitely tresspass (despite the utter lack of security). But as far as just using it goes? How can you be accused of steali
he says "it's basic politeness" - rubbish! (Score:2)
By providing free internet access, you are effectively saying that it's OK for someone you don't know to commit crime and to have no defence when the cops come knocking on your door. The "it wasn't me, it was someone else" defence stopped being credible years ago and could easily wind up with the freeb
Re: (Score:2)
Because that is different. Heat and light is something you have in your house anyways and it costs you nothing to share it. WiFi is the same. When my son'e freind came over and brought his Apple iPod Touch it cost me nothing to put him on my wireless network
The problem with making it public is that 99.
He's right when he says it's a trade off (Score:3, Insightful)
Plenty of people worried; "Oh someone might download kiddie porn and I would get blamed", "Oh, someone steals my information", "Oh, someone might download riaa music..."
If you walk around in fear of things that never happen to you, then by all means, lock your stuff down - even better, stay off the net entirely! Then maybe you'll feel safe. Oh wait, you don't want to feel safe, you want to be afraid and worry.
"This happens everywhere/all the time" - is a dangerous mindset when watching TV (or surfing
I used to have an open WiFi until... (Score:2)
Are ISPs Paying Schneier? (Score:2)
Open WiFi because it's a security risk? That sounds supportable on the surface, but it's just asking for trouble, and Bruce Schneier ought to be the first person to tell you so.
Then why is he espousing the controversial option of an open network? The answer may be obtained by following the money. Schneier propaganda leads to more open WiFi everywhere leads to ISP's raising cain and justifying high
Recently Opened Mine (Score:4, Interesting)
it's not "insecure", it's "open" (Score:4, Insightful)
Re:how do i crack a WEP password? (Score:4, Insightful)
Re: (Score:2)
Because he's a cheap bastard?
Re:how do i crack a WEP password? (Score:5, Funny)
Re: (Score:2)
Re:how do i crack a WEP password? (Score:5, Funny)
Re:how do i crack a WEP password? (Score:5, Insightful)
1. Ask your neighbors for permission to connect to their WiFi.
2. If you get permission, use the password they give you.
3. If you don't get permission, don't be a dick.
If someone has their WiFi configured to allow public access, I don't see much problem in making limited (e.g. no hogging bandwidth, nothing that might get them in trouble) use of it. The internet is built on the idea that people set up unattended computers to give automatic electronic permission for total strangers to use them; Slashdot would suck if everyone had to call Rob before they felt they were allowed to use his web server. But finding a hole in someone's security isn't permission, it's just intrusion.
Even when you see an open access point asking permission isn't a bad idea. It shouldn't be a legal requirement, but it's a nice thing to do, despite involving the frightening prospects of going outside and meeting someone in real life.
What what WHAT? (Score:5, Funny)
Wait! You mean I don't? Shit! All those wasted phone calls!
Re: (Score:2)
Re: (Score:3, Funny)
I thought that's how most people seal music files and do P2P: one of their neighbor's open networks.
FON (Score:2, Insightful)
I have a similar setup - but I don't have FON APs. I run an open AP, with all of my machines and services on an internal VPN.
Re:Steal Wi-Fi? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
And if an O.J company wrote on their boxes that by buying their juice you agree to not sharing it with your friends you stick to that integrity?
You bought it, it's yours, you can do what you please with it.
Re: (Score:3, Insightful)
Insider trading does harm others. You are very literally stealing money from other people.
C'mon, can't you come up with something better?
ISP and integrity in the same comment? (Score:5, Insightful)
You mean the same ISP that agreed to give me unlimited downloads but cancels my service if I pass their secret limit? The same ISP that sold me unlimited high-speed but throttles it back for certain applications? Who is that needs the integrity?
Re:Steal Wi-Fi? (Score:4, Informative)
Re:Steal Wi-Fi? (Score:5, Insightful)
That said, IANAL but the ones that he apparently spoke to seem awfully cavalier about the situation. I would be extremely uncomfortable explaining to a judge that I:
1) Published an article stating that I knew that my wireless connection could be used by others to commit crimes.
2) Left my connection unsecured anyway.
3) Was arrested because of illegal traffic.
4) Expect to be excused.
Re:Steal Wi-Fi? (Score:5, Insightful)
Re:Steal Wi-Fi? (Score:5, Interesting)
However, don't be surprised that companies like Comcast freak out because, while they want you to PAY for all that bandwidth, they don't actually want you to USE it!
Re:Steal Wi-Fi? (Score:5, Interesting)
Actually, it's more like ordering the all you can eat buffet and letting your friend eat off your plate.
If your friend says, "gee that looks good," and you say, "here, have a bite," the restaurant doesn't care. You had a good time, your friend had a good time, you'll probably come back for more. On the other hand, if your friends eats a dozen jumbo shrimp and couple of salmon fillets, the restaurant will be ticked off, because they priced the buffet around the probable range of one person's appetite. If everybody starts doubling or tripling up, then they have to raise prices, which mean they can't sell to individual diners.
So the way this works is, the vendor makes rules, and they look the other way at insignificant bits of rule breaking that keep their customers happy. When people get organized about breaking rules to unilaterally drop the price of service, then they start to get a bit tetchy.
Re: (Score:2)