WiFi Triangulation 233
mikegroovy writes "WiFi software
tracks you down: 'Positioning technology company Ekahau has released an updated version of its software, which allows devices to be physically tracked when they are connected to an 802.11 WLAN network.' Maybe connections that are made from the street(or outside of a predefined area) could be automatically disconnected... It may spell an end to warchalking."
Finally (Score:2, Insightful)
Re:Finally (Score:2, Informative)
Re:Finally (Score:2, Interesting)
Actually, how long it takes to work through WEP depends on how much traffic you create. There are a few ways to use RC4 that really cut down on its security; WEP does most of these things.
Re:Finally (Score:2, Informative)
On a not very used network it can take over a day of collect the desired packets to crack it, on a heavily used network a few hours.
Re:Finally (Score:3, Informative)
WEP will only deter the laziest script kiddie... Sorry.
Good God, are you Clueless? (Score:5, Insightful)
Re:Good God, are you Clueless? (Score:3, Insightful)
Re:Good God, are you Clueless? (Score:3, Insightful)
Anyway, 128-bit WEP (actually just 104 bits) isn't safe. The crack just takes twice as long.
Re:Good God, are you Clueless? (Score:5, Insightful)
We all know that. But an AP with WEP enabled is the digital equivalent of a "no trespass" sign, while an AP with no security at all is either set up by a clueless newbie or is deliberately left open to allow other people to get Internet access (which I'll do once I go wireless in my apartment).
In order to promote public accesspoints, I'd prefer that the law doesn't consider it trespass to use an unsecured AP for Internet access.
Re:Good God, are you Clueless? (Score:2)
It is neither my nor your responsibility to protect the business model of others.
If an ISP thinks it is a problem that their customers run public APs they should put something about it in the service contract or AUP.
Re:Good God, are you Clueless? (Score:2)
Re:Good God, are you Clueless? (Score:4, Insightful)
That practice is one reason that even clued network admins need to regularly recheck their networks for AP's. Rogue ones will forever be a pain in the ass.
Re: re-checking for access points? (Score:2)
I'm not saying there's anything wrong with doing it, if you so choose. I just feel like it's playing "whack a mole" with a technology that network admins would be better off dealing with "head-on".
If a given environment requires a high level of security from people outside the building gaining network access, they should make efforts to block the radiation of the wi-fi signal beyond their perimeter. A farraday cage of sorts could be constructed to shield the signals from getting out. This might make a lot of sense in the construction of new bank buildings, for example. (Just place wire mesh behind the drywall that goes up against outer walls.)
For those unwilling to go this far to solve the problem, it still seems like good network practices should "save the day". Let's say, for example, war-driver X does find your sale guy's new, unsecured access point, and gets on your corporate LAN. How is he/she any different from a visitor who decided to plug his laptop into an available network port when he sits down in one of your company's conference rooms for a meeting?
In both cases, you'd assume the person wouldn't be able to do much more than get issued a valid IP address and be able to "ping" stuff. He/she doesn't have a username or password, so therefore, no security granted to modify or open any resources. (Or is your network lacking security on important files and/or directories, so all users get default access? If so, *there* is your primary issue!)
Even if your only concern is that war-driver X not be able to bum free Internet access off of you - that's solvable too. If you set up a front-end that requires authentication before using the web (or ftp), you can stop that. Of course, your employees might resist the inconvenience of having to "log in again" to use the net each time.... but hey, you should really be logging what sites they're visiting anyway if you're concerned about security and legal liability.
Re: re-checking for access points? (Score:2)
If conference rooms are set up to allow outsiders, then if you're sane (and you were able to get your bosses to cough up the money, admittedly), it's set up in a DMZ of it's own, unlike the internal networks.
Now, I set up my DHCP in a paranoid fashion - if I don't know the MAC, it doesn't get an address... but that's often not workable for bigger places, and if the WAP-adder has enough technical savvy, he may realize he needs to make his WAP pretend to be his old box by MAC, and get on that way. If the WAP is handing out it's own addresses to those that connect by it, now you can't MAC filter anymore.
And once the person's on the inside LAN, a little bit of arpflooding (which, admittedly, your IDS should be picking up, but folks often don't have them internally because of the false alarms all the time) will make the switches failover and start acting like hubs - and he can sniff away at traffic to get passwords.
In essence, I view it not as re-checking for AP's specifically, but just another part of the constant check and recheck of your setups that you need to do to see if something has been changed in a way to break access controls that exist. HIDS, NIDS, tripwire, etc all factor in to this, making sure you haven't opened up a new vulnerability is just part of the big picture. It won't make you safe in and of itself, but neither should it be ignored based on trust that the rest is all "strong enough".
Re:Good God, are you Clueless? (Score:4, Insightful)
This may an important consideration for home wireless networks, but no excuse for corporate networks. Any business that has a "non-techie" building their network is inviting a whole lot of trouble--most of which probably won't be coming to them through their wireless AP.
Re:Good God, are you Clueless? (Score:3, Funny)
Re:Good God, are you Clueless? (Score:3, Funny)
Re:Good God, are you Clueless? (Score:2)
Re:Good God, are you Clueless? (Score:2)
The difference between what is wrong versus what can be done seems to be something some people cannot grasp. Bike locks are easy to break. Are you out stealing bikes while warchalking?
--
Evan
Re:Good God, are you Clueless? (Score:4, Insightful)
It will take AirSnort all of 30 minutes to crack your 128Bit WEP encryption since it is so badly flawed that I'd rather go _without_ it.
Really, _don't_ trust WEP. Search Google or Ask Slashdot about cracking it, have a look at what You'll find.
The only reachable IP on my 802.11 net is the IPSEC gateway.
Re:Good God, are you Clueless? (Score:3, Interesting)
Maybe you generate that many packets in 30 minutes (NOT), but the researchers said that it would take about a day to get the key from a network of active office users, and a few hours if the network is maxxed out.
Your average home user won't generate that many packets in a week (except, perhaps, those playing quake) and only their neighbors will have the patience and opportunity to grab keys for a week without being caught.
You should change your WEP as often as you change your passwords. Doing these things will keep freeloaders and those who are looking for an easy to break into network out. If someone is determined enough to break into your network, it won't matter what you do, they'll manage a way in. Even you know that if your life depended on getting access to someones home network, even with ssh, ipsec, etc, you could do it through other means.
-Adam
Re:Good God, are you Clueless? (Score:2)
Re:Good God, are you Clueless? (Score:2)
Re:Good God, are you Clueless? (Score:2, Informative)
An example: client and AP are both avoiding weak IVs: Airsnort and similar are completely ineffective (to the best of my knowledge).
AP avoids weak IVs while cheap client adapter with old firmware does not: Airsnort, etc. now can crack the key, but it takes many hours (we'll say 12 hours just to throw out a number).
Neither client adapter nor AP are avoiding weak IVs: Airsnort, etc. now take about half the time (we'll say 6 hours) to gain the WEP key, because there are proportionally twice as many packets with weak IVs being thrown across the network.
I'm kinda tired, so hopefully that makes sense.
Re:Good God, are you Clueless? (Score:5, Informative)
Not hard but unfortunately not secure either. Due to a broken design the WEP mk1 scheme only gives 24 bits of security regardless of whether you have the 128 bit or 40 bit cards.
However this has since been fixed, and the fixed cards will be available fairly soon. In addition the new cards fix the original major inanity of WEP, the single key shared by every card. The newer cards will have built in certificates to suport 802.1x authentication.
While the triangulation scheme might be used for security purposes, it is no replacement for cryptography. In the first place the scheme appears to be working on signal strength rather than the arrival time of the signals. That is easily spoofed. Arrival time of the signals would be hidously expensive to do right (I used to do that type of thing, but not with IP routers and bridges in the way...)
It might be useful to use triangulation to detect when people were entering an leaving cells, but that can probably be done by just choosing the strongest signal.
I can imagine using this type of thing to track down criminal suspects, the sort of thing that the FBI have fun doing. It is not a replacement for cryptography and probably not even as secure as WEP mk1.
Re:Good God, are you Clueless? (Score:2, Interesting)
This is not a replacemet nor a supplement for security. I am unaware of any type of triangulation system that cannot easilly be spoofed by a sufficiently smart person.
This is a neat trick you can use for practical purposes (such as smart shopping carts in grocery store, cheep "GPS" in the city, etc.) but worthless for security, etc.
If anyone thinks i'm incorect, please reply. It would be interesting to hear other people's ideas on spoofing triangulations.
Re:Good God, are you Clueless? (Score:3, Informative)
based on ping times. They're talking about
measurements of less than a meter, which is
on the order of 3 nanoseconds at c. Much more
sensible is to triangulate based on signal
strength.
Yes, signal strength can be spoofed *downward*,
but for commercial cards, it can't be spoofed
*upward*, significantly, without the spoof being
clearly detectible. Therefore, I disagree: It
is a very useful supplement to perimeter security.
The ability to defeat does not invalidate a
security measure, unless the effort and expense
involved is below the cost/benefit threshold.
Re:Good God, are you Clueless? (Score:2)
"clearly detectible". For raw triangulation, in
which no more than 3 points are used, a directional
antenna does create a new degree of freedom in the
solution space, but that degree can be eliminated
with just one more sample point.
Re:Good God, are you Clueless? (Score:2, Insightful)
It's not that it's hard, it's that the kinds of people who are generally setting these things up have been roped into doing so, and often don't have the first clue about security in general. Nor do they care - they're not usually frontliners who deal with security breaches on a day-by-day basis, and probably couldn't detect a security breach if/when it happened to them.
Very few SMEs - at least in Australia - 'can afford' to hire a fulltime sysadmin with any level of security knowledge. Sad, yet true...
Re:Good God, are you Clueless? (Score:2, Insightful)
Re:Good God, are you Clueless? (Score:2)
For most of these networks, a normal functioning laptop equipped with a wireless card will automatically sign on to the network with no input from the user at all, just by bringing the laptop into the general vicinity.
No it's not lax security. I think it qualifies as no security at all.
And if you make absolutely no attempt at privacy, if you put your computer network outside in public places (the street), then no, you don't have much right to privacy.
Re:Good God, are you Clueless? (Score:2, Funny)
--Nicholas
Re:Good God, are you Clueless? (Score:2, Informative)
Warchalking is like walking around with a wireless devices, finding a signal, and marking that fact. Usually that is not done by the people running the network.
Re:Good God, are you Clueless? (Score:3, Interesting)
Normally, then, the owner of the network would not be party to either the "war" or "chalk" methods.
Re:Good God, are you Clueless? (Score:2, Insightful)
heh (Score:5, Funny)
Can't remember the last time I saw the word, "reckons" in a major publication. I reckon it was some time ago.
Re:heh (Score:2)
"Dead reckoning" is triangulation of your location based on your previous location and the speed, direction and duration of your travel.
I suspect it got its name from a bunch of hippies trying to find a Jerry Garcia concert
cornell (Score:2, Informative)
Re:cornell (Score:2, Informative)
That's quite amusing, as I appear to be writing this comment from *on-campus* over a *land line*. But our operating systems course does feature an ad hoc routing assignment which uses handhelds w/ wireless ethernet cards.
some additional info (Score:4, Informative)
Re:some additional info (Score:2, Insightful)
And yeah, yeah, triangulation and signal strength and stuff, but does this software do it the hard way or depend on the truthful clients?
end to warchalking? (Score:5, Insightful)
Re:end to warchalking? (Score:3, Informative)
I'm a researcher at Carnegie Mellon University who has been implementing this same system for the last two years.
This type of system relies on the client (pda/laptop) to gather the raw information for triangulation and send it to the server.
No accesspoint (that I'm aware of) is capable of gathering the information needed for triangulation.
Details:
An accesspoint only knows the signal strength between itself and its connected users.
Triangulation requires the signal strength between the client (pda/laptop) and at least three nearby accesspoints for 2d triangulation.
Current accesspoints do not record or calculate information for clients that are not currently connected to themselves.
It would be possible after modifying the firmware on the accesspoints. The manufactures have been extremely reluctant to give this information out (even under NDA.)
The most accurate information that could be gathered about war{driv,chalk,walk}ers is which accesspoint they are connected to.
Joshua Tree
Re:end to warchalking? (Score:2)
Well, I dunno. The implication is that the APs can triangulate, but i don't see anything in the article saying it's not the client doing the triangulation. Or maybe they have a deal with some manufactuer to get more info from the AP, or maybe you have to set up a comptuer with a PC card. Ooooor, you could just set up some simple 2.4GHz receivers which give you signal strengths and/or delays for tringulation (although that's pretty clearly not what these guys are doing).
PS- you forgot warflyers [slashdot.org].
What is warchalking about? (Score:3, Informative)
I thought that warchalking existed more for those who are offering wireless access to alert others than revealing the open status of another's network. Any warchalkers want to chime in? Are you guys mostly ID'ing your own WAPs or the WAPs of others?
Re:What is warchalking about? (Score:4, Interesting)
As a sidenote, Schlotsky's restaraunts put up little plaques near the entrances to their stores with the open AP symbol. Such a nice thing to see, rather than the money hungry Starbucks shops charging by the minute for access.
range? (Score:3, Interesting)
The 802.11b network at my school fails after 50 feet.
Don't throw away that chalk just yet!
Re:range? (Score:2)
The 802.11b network at my school fails after 50 feet.
?? If you are within range, you can connect, but you can be tracked (and thus expelled if intruding).
If you are outside range, you can't be tracked, but you CAN'T CONNECT EITHER.
So the idea holds true regardless of the range!
Re:range? (Score:2, Informative)
oh, the irony... (Score:5, Funny)
Not so new... (Score:5, Informative)
802.11b Tracking (Score:5, Informative)
Since most modern triangulation techniques, including Ekahau's, depend on standard mathematical models of radius delta-reduction, it's trivial to set up your reflectors in such a way that the tracking mechanism can't deduce a logical place for your signal to originate from. Hopefully as location-spoofing becomes more commonplace, the government won't enact any laws restricting the use or registration of EM reflective surfaces.
much easier solution (Score:2)
Re:802.11b Tracking (Score:2, Funny)
Right, because you know, everyone who is anyone has AMD jacketed polycarbonation.
(joke)
Constantly diminishing signals are rare in RL (Score:5, Interesting)
When was the last time you were using wireless (especially through a wall) that had the same range from the access point in any direction?
I can't picture it working in a supermarket, with the metal shelving, compressors for the cold storage, etc. Sure, in a lab it'll work great, but with any kind of range or non-uniform building structures, not a chance.
Re:Constantly diminishing signals are rare in RL (Score:2, Insightful)
not required--no "triangulation" involved (Score:2)
Silly, silly controls... (Score:3, Insightful)
Don't be too sure. (Score:2)
Bah! (Score:5, Funny)
Although I guess using triangulation accurate to a meter would let me say "You're on my spot on on the couch. When I get back from class, you gotta move."
Re:Bah! (Score:2, Funny)
OR when you get on irc and notice someone is online from the university computer lab.... so you find someone else online from the same lab, and start asking them to describe said person.
Then you pretend you are psychic by explaining to the first person what they are wearing, what they are doing, etcterea.
Is that creepy or what?
Re:Bah! (Score:2, Funny)
Is that creepy or what?
Or you can type "INCOMING" and chuck a pen their way. Nothing like a virtual warning before getting tagged in the head with a flying object.
No Triangulation , Just bump the power for War (Score:4, Interesting)
And it implies that triangulation is not involved:
So perhaps if you bump the power of your signal from the outside they will think you are inside.
Uh oh (Score:5, Funny)
Perhaps I'd better log off now....
Re:Uh oh (Score:5, Funny)
Re:Uh oh (Score:2)
This slashdotter has a girlfriend
Are you sure that she's not a girl he's stalking and pretending she's his girlfriend? Sounds more likely. Uh-oh, gotta go!
Re:Uh oh (Score:5, Interesting)
For a brief moment, I questioned why I am paying for a landline feed and not just piggybacking bandwidth off of my hapless neighbors.
Re:Uh oh (Score:2, Funny)
No this isn't possible (Score:2, Funny)
How does it work? (Score:5, Interesting)
Using a GPS-like timing comparison might do the trick, but it's set up backwards. With GPS you have a bunch of atomic clocks in orbit, and one device correlates the relative signal phase between them. With APs, you have to have extremely accurate timing across all the APs, which is a very hard problem (I've researched it...). Once you have that, you can compare reception times of a packet from the device being tracked, and triangulate. Problem is 1 meter accuracy represents some scary clock accuracy numbers across several APs with just an Ethernet between them.
If anyone can think of any other way to pull this off (WITHOUT modifying the client, and ideally without any special hardware, i.e. implementable in the HostAP driver), post them here.
Wave dispersion? (Score:2)
The effect may be far too small to use in practice, though.
Re:How does it work? (Score:2)
It can't. To get meter resolution, you need a 300MHz clock (1 meter per tick) with reasonably low jitter on each AP, all locked to each other with less than one tick difference across all APs receiving a given packet. That's an effective impossibility on its own (like I said, I've done a lot of research into that problem for a semi-related project).
Even if the chip rate of 802.11b is 11MHz (I'm not so sure, I'm pretty sure there are multiple bits transmitted at the same time), that only gives you a resolution of 30 meters, or about 100 feet.
However, from looking at their website it appears they are indeed using signal-strength calculations. I suspect their 1-meter number is resolution, not accuracy. There's not the *slightest* chance that they can accurately pull the position of someone to within a meter, when moving your laptop a few centimeters can *wildly* change the signal level on the various APs. I know, I've done it.
I saw a graph once, I wish I knew where, that showed the *measured* signal strength in a small cubicle room with a single door and simple desk. The interference patterns caused by reflections caused differences of 10's of decibels in repeating centimeter-sized patterns. Move a tiny bit and you could lose signal entirely. Use those numbers to try to correlate anything and you're smoking some serious crack.
How Microsoft did something like this (Score:4, Informative)
The equations they use are pretty simple, and they seem to be getting very optimistic results. They, too, use signal-strength triangulation, together with a model of the local area (so you feed in how many walls are between you and the AP, for instance), and some processing based on recent history. That's to say, four out of the five latest samples have you outside on the pavement, and one of them has a 50 yards away in the eastern wing, you're probably still on the pavement.
Venkata N. Padmanabhan [microsoft.com] has some more papers on this on his homepage. Victor Bahl has a demonstration here [microsoft.com] but I guess it only works on IE.
What about this (Score:5, Interesting)
Re:What about this (Score:2)
This deals with distance based triangulation, so I'll just touch on that.
This works by calculating the distance you are from each point in the triangle. (based on signal strength). Imagine you're in an elevator, in the dead center of the triangle. You're now on the same floor as each point.
Hypothetically, you are exactly 10meters away from each point. Now you hit down.. after a floor, you're exactly 20 meters away from each point. It is physically impossible for you to be on the same floor as the triangle and be exactly 20 meters away from each point, since 10 meters is dead center.
Now.. there's only one instance where distance-based triangulation doesn't work. If you can go above as well as below the triangle. If you're 20 meters away from each point, you've got to be in the exact middle, and down one floor.. However you can also be up one floor. So that breaks it. The only way to fix it is to move the triangle so that you can only be either above it or below it.
So put your APs on the ground floor and yes, indeed, triangulation works in 3 dimensions just fine.
(Directional triangulation doesn't have the negative-z limitation)
No, he's right. You need 4 (Score:2)
Unless someone can point out a flaw in my logic.
Right answer, wrong reasons. (Score:2)
If you could tell the exact distance to the signal from each access point, you could probably place 3 of them cleverly to give you a good location. For example, if the access points were on the top floor, you take the solution below them, unless you believe the person accessing your network to be warskydriving [slashdot.org].
This is similar to whiteboard capturing (Score:4, Informative)
Another Excuse (Score:2, Funny)
Wow, a software only solution... (Score:5, Funny)
Clueless MCSE: Sir, we have a real problem.
Clueless boss: What's that?
Clueless MCSE: Well, we installed that neat location tracking software so that the executives could play multiplayer PDA video games, without those evil linux hackers stealing our secret files...
Clueless boss: And?
Clueless MCSE: Someone is trying to hack us, they're accessing a directory on our web server that they can't get to from the main page!
Clueless boss: Well, call the cops. They're in for it now.
Clueless MCSE: We can't though! The software says they're orbiting Jupiter!
Neat for real-time real-space role playing games (Score:2)
Re:Neat for real-time real-space role playing game (Score:2)
Actually, I was more frightened that you suggested real-life shoot-em-up games...
New toy for the BOFH... (Score:2, Funny)
Heh. Not so quick guys. (Score:2, Insightful)
Even the very term "triangulation" implies that you'll need 3 access points to do it.
- With 3 access points, you can generally locate a signal rather well, because they can see more points, and in particular if the 3 APs are located in a triangular fashion, with the user in the middle, youcan quite accurately track them.
The accuracy of the system will be almost entirely dependent on the number of access points that a user can see at a given moment, the more APs, the more accurate. Just like GPS.Re:Heh. Not so quick guys. (Score:2)
Re:Heh. Not so quick guys. (Score:2)
When calculating position on range alone, two antenna sites will indeed result in two intersection points, but that's not really trianulation anyway.
Don't forget the "Tri" in "Triangulate"! (Score:3, Insightful)
Free Wi-Fi Tracking Software (Score:3, Informative)
Things to note, however, about any 802.11 tracking software it that its accuracy is poor > 5 meters, unless you are using 5 or 6 *simultaneously* accessible access points (it even states this in the Ekahau manual). Tracking software can be thrown off by even seemingly minor enviornmental changes like crowds of people etc. Also some calibration is also required.
Don't worry about this shutting down free access points as it is way harder to do location tracking than it is to set up an encryption system (even really good VPN style encrytion) or a simple MAC address filter.
Mike
How this works (not triangulation) (Score:3, Informative)
Rather than using signal strength for triangulation, you use it to record a "radio map", and compare your current position to the map. The basic steps are:
1) Walk around a room, recording the signal strength to each AP (so you get a file such as "Access Point #1, Avg signal: 96 AP#2, Avg signal: 74 ..."
). Netstumbler [netstumbler.com] or other software can help you make this file.
Create a "profile" like this for every location you wish to map (roughly, one every square foot or meter). The number of profiles determines the granularity of the system, but too many profiles can cause "collisions" in the sense that different locations have similar profiles, for some reason or another. There are ways to combat this, one of which is to make an educated guess on the new location based on the last one. (i.e., the user could not have walked over 10m in one interval)
2) When a user connects, they can compare their current signal strength info ( such as AP#1, signal: 34 AP#2, signal: 74) to the map: the closest point is probably their location.
I did a simple euclidean distance calculation (taking each profile as a vector in some large space [cool how the pythagorean thm. generalizes, eh?]. There are many better ways, which I am researching this semester, but euclidean distance is fine for now.
I'm pretty sure this is why they must spend an hour per 10,000 square feet to "calibrate" the system. I had to do the same, but it was a *lot* slower; I need to make a tool to do this automagically.
This semester I am also looking to get my system working with an ipaq robot running familiar [handhelds.org]. It's the combination of the palm pilot robot kit [cmu.edu] and this positioning system. Hopefully, the little robot should know (roughly) where it is, and be able to be controlled via the internet.
Check out my webpage if you are interested in more details.
one problem with triangulation (Score:2, Informative)
So to accurately determine if someone is outside the intended coverage area, wouldn't you really need to deploy additional base stations? For instance, if you have three stations at your business, one near the front, and two in the rear corners of your building, and someone is wifi'ing in from the bus stop bench outside, he's going to hit the front station and not do much for the two in back. It's very hard to tell this user apart from someone just inside the building and very near the front base station. To settle this, you'd need a base station like across the street or something.
I don't see wifi triangulation as a practical way of identifying users outside the perimiter for this reason.
It's also worth noting that it would be a poor choice to place the base station right at the front of the building, because you'd be wasting 50% of the station's coverage area. But to pull the stations in toward the building's center would further degrade your triangulation abilities because relative signal strength differences would lower your triangulation precision.
Just tossing ideas out, I'd propose the best way to keep warchalkers out if that is your intention, is to deploy your base stations in such a way as to not provide (effective) coverage to areas outside your premisis. If your business is already too small to keep coverage just inside your building, then obviously buying several base stations to try for triangulation is patently absurd.
Of course, my final suggestion would be to openly allow public access, and use it as a P.R. booster. Free advertisement is handy, and in most cases, this would almost be free.
For the entrepeneur: I haven't seen anyone selling warchalking plaques yet. I bet there are some businesses out there (cafe's etc) that would buy a custom made brass or bronze wall plaque they could affix to the outside of their buildings to attract more customers.
Re:Where will it end? (Score:2, Insightful)
That's not what warchalking is about. It is about marking open access points, not about breaking into networks.
It should be legal to plug an AP into my DSL line, put a chalk mark on the side of the building and allow people nearby to use my connection for checking mail or the occational browsing.
Is it shoplifting or trespass if your neighbour put a radio in the window and you listen to it while relaxing in your yard?
Securing an AP is fairly trivial, and people who don't want the occational stranger to access their network should take the 30 seconds needed to enable WEP or password/MAC security.
Re:Where will it end? (Score:4, Insightful)
Anybody who comes up with any kind of estimate is an idiot, and is obviously being "funded" by some interested party. CD sales went up when Napster was in its prime. What does that mean? Nothing. Maybe the fact that we're in a major recession and people don't have as much money to blow on stuff, or that the crap they're pushing for sale... naah, that couldn't be it. It must be those Music Pirates! Arrr!
Re:Triangulation with one receiver? (Score:2, Informative)
Re:Triangulation with one receiver? (Score:4, Informative)
The other way requires three sites. You use a timing method to determine how far away they are. Imagine points A, B, and C (the location of the points is basically arbitrary, so long as they aren't too far apart). Draw a circle with a radis of one inch from point A (indicating the signal, determined by timing is, we'll say one mile away), and another with a two inche radis from point B. In most (but not all) circumstances, the circles will meet at two points. Thus, in most (but not all) circumstances, two will not be enough. Now draw a circle around C (I can't give you a radis length as I am unwilling to do the math in my head) to intersect with one of the other two intersections. If you've done it right, no matter how hard you try, assuming you've drawn perferct circles, the circle around point C will only meet with one of the two A/B circle intersections. This make any sense???
Re:Triangulation with one receiver? (Score:2, Informative)
go test it out.
get a compass and two points 4 inches apart. if u know a user is 3 inches from one point and 2.5 inches from another point there would be two possible locations the user could be.
you need three points.
u only have signal strength(which is prop to distance) not angles. so you need three points to clarify any point in two dimensions. And four or more to more acurately place a point in 3 dimensions.
its like gps'es
http://www.howstuffworks.com/gps1.htm
Re:big brother? (Score:2, Interesting)
However, while this won't add much to the most secure systems, it would allow companies to reduce the hassle associated with maintaining a reasonably secure wireless system. For example, a company like Starbucks might want to offer internet access to customers inside the store, but keep people from using it in the unaffiliated bookstore next door. Or, a company might want to offer internet access to visiting consultants, customers, etc. without dealing with setting up each device. (Full disclosure: I have never used a wireless LAN, so I don't know how much trouble it is to connect to one that is properly secured. I would imagine it could become at least an annoyance.) If a company was willing to assume that the building was secure, they could allow access from any point withing the building. If you were paranoid, you could limit this to business hours.
Re:Assimetric aerial (and a new hobby) (Score:5, Interesting)
Their method will probably even fail if you switch WiFi cards. I've got a Compaq WL110 which has a range of about 10 feet. My Lucent card on the other hand sees the access point from 100 feet, without line-of-sight (I assume the radio waves bounce off the ceiling through the window; no other way to explain _that_ range).
My access point has antennas that can be moved into different polarisations, and in an off-colour configuration, access without line-of-sight becomes really spotty: it works in one place, and a few feet to the side it stops.
But it seems to me the point of the seller is not to track abusers, but rather to track known-good devices in a known area. That alone is a cool concept, if you see what contortions people go through now when designing warehouse positioning systems. I've seen the results of an automated fork lift running through the wall of a warehouse because the reflective pad that marked the end of the aisle was covered in grime.
Hmmmm, I can envision the next hobby: sit outside a warehouse with a 2.4GHz klystron, wait until you hear the fork lift come down the aisle, then switch on the jammer and watch the fireworks
parent post is complete nonsense (Score:3, Interesting)
Re:not really the end... (Score:2, Insightful)
Bollocks it does! I'm fed up hearing this negative view of warchalking coming from people who don't have a clue. I have a warchalk symbol outside my house to denote that I give free net access, not that I have 'an insecure network.' Warchalking is about telling others what is available, and it doesn't imply that the network is insecure or illegal in any way.
No wonder warchalking is getting so much bad press these days. Next I'll be having the Police at my door, arresting me for being a hacker on my own network and telling others about the free net access I've found.
Bloody idiots.
Re:not really the end... (Score:2)