Security Basics mailing list archives
RE: Wireless Security (Part 2)
From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Tue, 16 May 2006 19:15:59 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: Steve Armstrong [mailto:stevearmstrong () logicallysecure com] Sent: Tuesday, 16 May, 2006 07:49 To: hfebelingjr () lycos com; security-basics () securityfocus com Subject: RE: Wireless Security (Part 2) : Herman : : How are you going to get the web page open? What if they don't : want to use your connection for web browsing? A common use of other : wireless connections is for bandwidth hungry or illegal activities. : And while there are illegal activities that can be performed with a web : browser, it is more likely to be another program that utilizes the : connection eg P2P or Bit Torrent for illegal file sharing. That's why I said either a web page or a dialog box, or maybe even some kind of batch/script file to automatically display it. : : However, your post did get me thinking as to the legal ramifications : of conducting sniffing operations on what you believe to be a closed : network. For example if I was sniffing all traffic on my network : and you connected without permission and my knowing, I would capture : your traffic. While there is an offences of accessing a private network : (especially is encryption was broken to gain the access), but where : do I stand on the interception and storage of your data? There is a lot of room for a person to "lost" in, isn't there? : : While some may say this is clear cut, how about the grey area of an : insecure wireless LAN, there a remote un-authorized user may connect : without their knowledge and may pass data they believe to be private. : While I did not intend for you to connect I still have your data - : possible without your knowledge. Sadly, yes it isn't a clear cut area. Guess that's where those of us who know technology the best need to work with lawmakers to get the right kinds of laws passed. : : Interesting eh? : : Perhaps the lesson here is to ensure you encrypt your WLAN to : ensure the casual user does not connect, and if they do (i.e. they : have hacked in), they are not casual, not wanted and get what they : deserve. Yep, use the highest level of security possible. : : Steve A : - ----- Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 Comment: Space the Final Frontier iQA/AwUBRGpdLx/i52nbE9vTEQLe7gCeIM/lA15jls00dVVqbagj6mbvDdkAoOd0 7hpI4dCYVOJpH09oPz82I9IV =VyaM -----END PGP SIGNATURE-----
Current thread:
- RE: Wireless Security (Part 2), (continued)
- RE: Wireless Security (Part 2) Murad Talukdar (May 16)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 17)
- Re : Wireless Security (Part 2) Maxime COSTE (May 16)
- RE: Wireless Security (Part 2) David Gillett (May 16)
- Re: Wireless Security (Part 2) Ian Scott (May 17)
- Re: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- Re: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 20)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 16)
- RE: Wireless Security (Part 2) Steve Armstrong (May 16)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 17)
- RE: Wireless Security (Part 2) Ramsdell, Scott (May 16)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- Re: Wireless Security (Part 2) Robb Wait (May 20)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Murad Talukdar (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 20)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
(Thread continues...)
- RE: Wireless Security (Part 2) Murad Talukdar (May 16)