Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I asked him if he had ever run into Tor exits, he said no, but they did sometimes run into people with unsecured wireless that had been used by third parties and once it was clear that was what happened it was pretty much dropped.

Could one have open Wifi "accidentally" (on purpose) as a defence mechanism against one's own actions to introduce reasonable doubt?

Bruce Schneier in 2008:

* https://www.schneier.com/blog/archives/2008/01/my_open_wirel...



Yes, but it is a very weak defense that can be smashed e.g. your device is seen communicating with the BSSID of the closed wifi, or your mac address (open wifi) is seen communicating with surveilled target.

Maybe in 2008 this was plausible, but it was also plausible to disguise one's self and walk to mcdonald's free wifi with a burner wifi card and/or Kali Linux. With the proliferation of surveillance devices everywhere it becomes an uphill battle


In college I used this excuse when my apartment buildings self managed wifi cut off my internet for torrenting. I just went into the office and was like “a torrent? Idk what that is…”. But it wasn’t anything more official than a guy in my apartment’s office’s ability to turn my internet back on. I didn’t even have to prove I had an open Wi-Fi network.


I had a similar lockout problem but it was because I hit a honeypot when port scanning the entire university network for fileshares.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: