timjet
Guru
- Joined
- Apr 9, 2009
- Messages
- 1,920
You folks that have devices that can receive free WiFi signals from several miles away, I have a question. Aren't most free WiFi password protected? And if so what good is this type of equipment.
So true just ask if the AP identifies itself, many do. Most modern AP's use a splash legal terms page once you get past that it allows access after it records your MAC address.And even where a password is required, you can still enter a password to gain access, assuming you have said password. This is required in lots of marinas, even where there is no charge for access.
So true just ask if the AP identifies itself, many do. Most modern AP's use a splash legal terms page once you get past that it allows access after it records your MAC address.
Bill
That's because the bridge unit submits it's MAC address for authentication and everything behind most router/ AP's inside the boat are behind a firewall or invisible to the Hot Spot your connected to.Right. And the beauty of a wifi extender is that once you are logged on, everything on the boat works through that single logon. No need to login each device.
There are many boaters who choose this device. It's not something I would recommend for long distance WiFi unless it's hooked up to an external antenna.Folks, Admittedly I have limited experience in this area, but I have been using a simple USB powered Alpha Networks Wi Fi range extender for years that is totally portable (stays with my laptop) and works extremely well on my boat, even in the BVI's. Amazon.com: alpha networks 802.11b g long range wireless usb adapter model awus036h George
Oh brother. I'm sure you're right, all kinds of vulnerabilities out there, but who has time to hassle with all that complexity when all I want to do is surf boat sites and CNN and send emails to grandma. Life is too short.
Oh brother. I'm sure you're right, all kinds of vulnerabilities out there, but who has time to hassle with all that complexity when all I want to do is surf boat sites and CNN and send emails to grandma. Life is too short.
I think most POP and IMAP servers can run via SSL. Mine does, so email can't be snooped. And all web banking and ecommerce is via https, so that can't be snooped either. That just leaves all my browsing on TF and other sites. If someone wants to watch, feel free.
What else is there? I don't claim to be an expert on this, but know more it than the average user.
Admittedly, I know little about wifi, but I don't think the above is correct.
I'm paying the money for my verizon data simply because at least in NYC, it is clear that anyone can read pretty much anything over wifi unless you have a vpn setup.
This is discussed all the time on our business channels.
Anytime your browser is connected to https://something or other, the entire data stream between your browser and the web server it is talking to is encrypted. Listen all you want, it will just be jibberish. Every bank and ecommerce site uses https at least for checkout, if not for the whole session. So I think that makes those browser sessions secure no mater who is listening in.
Twistedtree,
You say the "entire data stream under https is encrypted. Does that include the login, or just the stream after login? If login is not encrypted someone can steal the login name and password and access your banking data.
You say the "entire data stream under https is encrypted. Does that include the login, or just the stream after login? If login is not encrypted someone can steal the login name and password and access your banking data.
Login pages for financial institutions of any size are highly likely to be secured. They either use a home page SSL login, or an intermediate redirect (the pause you sometimes experience and can sometimes see taking place in the address bar). The process can often be seen if you know what to look for.
Paypal and others use an HTTPS home page and there are other strategies as well. Yes, it would be possible to connect with a small retailer that does not use best practices, but the general state of the art has advanced tremendously. So has the state of the art for the crooks. If you look for absolute security, you will not find it online any more than offline.
Protect yourself by using different logins and passwords per site and generally using established institutions who cannot afford to defend themselves if they are caught using less than best available security techniques. So far, Target has lost their CEO and its CIO in its recent data breach.
Anytime your browser is connected to https://something or other, the entire data stream between your browser and the web server it is talking to is encrypted. Listen all you want, it will just be jibberish. Every bank and ecommerce site uses https at least for checkout, if not for the whole session. So I think that makes those browser sessions secure no mater who is listening in.
Twistedtree,
You say the "entire data stream under https is encrypted. Does that include the login, or just the stream after login? If login is not encrypted someone can steal the login name and password and access your banking data.
Unless the web programmer is a complete idiot, it includes the login. Just look at the top of your browser screen and you can see when the session is secure as indicated by the https:// (note the "s"). Some browsers now have an icon instead of "https", so you may need to check how yours works.
It is so incredibly simple to get into much of what you think is secure. POP is rarely SSL based. IMAP is quite secure but no one would try to break through that wall when there are so many easier ones.
Panbo challenged me with something similar a few years ago. So that evening I used free software to dump some basic network packets. It showed an open POP password within 30 seconds of use. The screen shot is still at:
http://www.panbo.com/assets_c/2010/11/sniffig_courtesy_Jeff_Siegle-3090.html
And Billylll - how would you possibly know how much information was stolen from the marina hotspots that you "run" - which marinas are they (I'd love to check my notes if I've been to one). I'm working with literally hundreds of marinas right now with WiFi. Most are the most unsecure setups I've ever seen. Most of the marina WiFi setups I've seen are created by people who know just enough to be dangerous.
You either need to use cellular or you need to use a VPN. Anything else is just asking to have your identity stolen.
If I use my Rogue Wifi to pull in an unsecured wifi signal and run that through my onboard WPA-encrypted Cradlepoint wifi router to access the wifi, are my up/downloads vulnerable or am I protected by my router's encryption?