Re: OT: unathorized network user.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



ahh, all true. But if we all ran open wireless networks then the cops
would know that this could be an open network and would handle it
differently.  Right now they assume one ip one person because people
like you keep it that way.



On Jan 24, 2008 1:07 PM, Jacques B. <jjrboucher@xxxxxxxxx> wrote:
> On Jan 24, 2008 3:02 PM, Bazooka Joe <fastfish@xxxxxxxxx> wrote:
> > All this talk of locking networks down is odd for an open source
> > community.  (Business networks are different)
> >
> > I run dd-wrt running nocat auth w/ 5 wds nodes placed around the
> > block. At any given time i have a half dozen people who I don't know
> > doing I don't know what on my network.
> >
> > I don't block p2p, smtp .... anything.  I even have my printer on the
> > network w/ instructions on how to print to it.
> >
> > Am I personally at risk? Yes. But I think it is a small price to pay
> > to cultivate an open community where information isn't kept from
> > others.
> >
> > -bazooka
>
> Scenario #1
>
> I connect via your wireless AP and download child porn.  The IP
> captured resolves back to your ISP, and ultimately to you.  The police
> show up at your door, arrest you, and seize your equipment to conduct
> a forensic analysis of it.  You get labeled as a pedophile pending
> this being cleared up.  Your equipment is gone for at least 6-12 mths
> (minimum backlog for many forensic units).  At the end of the day no
> evidence is found on your system so no charge is pursued.
>
> Scenario #2
>
> I connect via your wireless AP and use it to send out spam.  Your ISP
> cuts off your service for violation of terms of service.  You tell
> them it wasn't you, you run an open wireless AP.  They discontinue
> your service for breach of terms of service (sharing your connection).
>
> Scenario #3
>
> I connect via your wireless AP and send a threatening email to
> someone.  The police come knocking at your door (same as scenario 1).
>
> Scenario #4
>
> I connect via your wireless AP and launch a denial of service attack
> against the Department of Defense.  Police arrive at your door (same
> as scenario 1).
>
> Scenario #5
>
> I connect via your wireless AP and lure a child.  Police show up at
> your door (same as scenario 1).
>
> I'm sure people can come up with all kinds of other nasty scenarios.
>
> Running an open access point is a very, very bad idea for many reasons.
>
> Jacques B.
>
> --
>
> fedora-list mailing list
> fedora-list@xxxxxxxxxx
> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
>

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux