Safe and Insecure? 508
JoeCotellese writes "Can making your network insecure actually improve your security? That's the question asked in this story running in Salon. The author makes the case that by 'making my Internet connection available to any and all who happen upon it, I have no way to be certain what kinds of songs, movies and pictures will be downloaded by other people using my IP address. And more important, my ISP has no way to be certain if it's me.'"
In related news... (Score:5, Funny)
Re:In related news... (Score:5, Insightful)
This guy is behaving just like Comcast. He's the pipe and he doesn't know what goes on in that pipe. Unless the Judge were to determine that the pipe owner is responsible (and Comcast will certainly help him fight _that_ kind of fight) then he's ok.
BTW, he also said he turned off logging. In many, many cases, there is no law that says you have to log, but there is a law that says you can't destroy evidence you alread poses. If you don't have a log in the first place, you have nothing to turn over to the feds and you have no evidence to destroy. I think that's a big step closer to true freedom.
TW
Re:In related news... (Score:5, Interesting)
First note to anyone setting up commercial installations is ONLY KEEP WHAT YOU ABSOLUTELY NEED, actively
I helped set up local public library systems and we ensured that no personal information was kept regarding book history, or check out history beyond the confirmation of return. We do track how many times and for what duration a book is out, but not who had it beyond the most current user, assuming the book is in fact out, if it is checked-in there is no user associated data kept. If the FBI under the guise of keeping us free from terrorism wants to know, we can tell them that the anarchist's cookbook gets LOTS of out time, and who currently has it but not what that person had prior or any sort of user history for a particiular subject, just the bare data that is required to maintain a good inventory of books and cut loose the dead weight that doesn't get used...
Re:In related news... (Score:5, Informative)
Both parent posts are pretty much right, but you should *definitely check that you're complying with the law* regarding what you must keep.
I'd recommend reading this paper over at SecurityFocus as it covers a pretty similar remit: Destructive Influence [securityfocus.com] By Scott Granneman
Basically what he says is that if you have a thoroughly designed and well implemented data destruction policy (that complies with local laws) it can be somewhat favorable should something bad, like a lawsuit, come your way.
freedom's just another word (Score:5, Insightful)
"Freedom's just another word
For nothing left to lose"
- Kris Kristofferson, "Me & Bobby McGee" [lyricsfreak.com]
Re:In related news... (Score:3, Insightful)
Either way by making yourself insecure like this you are just adding to the many problems of the Internet. Plus you'll have spyware installed on your machine just by surfing to the wrong website, popups like there's no tomorrow. What happ
FBI-statement (Score:4, Insightful)
Trust us!
You, sir, make a very, very good point!
Since you are, without doubt, a legitmate user of the internet, please provide us with your login and passwords of all your emailaccounts or any other internetservice or tool you might use. Also, can we count on you to promote the use of encryption where we, as part of your trusted government, have the key/pasword of? It didn't work out the last time we and our pals on the NSA tried it, but with enough help of you and your ilk, we just might succeed, this time.
Thanks for your cooperation, and be sure to distribute our leafflets "Trust your Good Friend the FBI to Do what's Right". Please don't forget to place your name and address on that leaflet, however, because we try to change the law so we can make that obligatory.
To combat CRIMINALS ofcourse, not law-abiding citizens like you!
your friend,
the FBI
Spinder Award Winner! (Score:5, Insightful)
Re:Spinder Award Winner! (Score:5, Interesting)
If you are providing wireless network access for your neighborhood, houseguests, or even patrons in your restaurant, then you are a carrier and protected. Just in case you were not sure, IANAL.
So the question really is if you are in violation of your Terms of Service or not. My experience has been that most cable Internet providers restrict your usage to you and your household - no operating servers (e-mail, web, etc.) This is because of the shared bandwidth nature (bus topology) of the connection. If you are consuming mass quantities, then your neighbor's connection slows down. Same is true of most satellite systems. I am sure there are some satellite and cable ISP's that offer guaranteed bandwidth, so obviously they are the exception to my comments.
xDSL on the other hand is guaranteed bandwidth (star topology). In essence you have a dedicated pipe between you and the central office. Granted if you could consume all the bandwidth at the CO then you would slow everyone else down, which is why they throttle you and have a really fat pipe there. Now xDSL typically allows servers and other activities that could result in greater bandwidth consumption because you cannot degrade the performance of your neighbors connection.
So to sum up, it would seem that this strategy would work to defray suits from MPAA, RIAA, etc., and if you were running xDSL it may even be allowed under your TOS. But, your TOS probably says you are responsible for anything that goes over your pipe. This means you are responsible to your ISP, not to anyone else. So if your ISP says "Hey, you can't do that!" then they might pull your plug. It would seem to me that loosing your ISP and having to switch to one of the competitors would be much less of a inconvenience then being sued by RIAA, MPAA, SCO, etc.
Bottom line, if you think there is a chance that incriminating traffic might take place on your connection (by you or someone else) then you may improve your odds of claiming it wasn't you by adopting this strategy. But when you are trying to download game patches or some other large download, and it is taking a lot longer then you expected, remember that is the price you pay for freedom in this country.
What you need is a router that provides bandwidth priority to some connections and not others (I forget the term), and also that partitions the public portion of your personal network off from the private portion. And instead of claiming ignorance, claim you are a nice guy who just wants to help out your neighbors, houseguests or restaurant patrons.
This is in no way an endorsment or advocation for any of the actions outlined in this comment, the comments of others, or the original news post. It is just an observation.
Re:Spinder Award Winner! (Score:3, Informative)
You mean QOS? about qos [dslreports.com]
Re:Spinder Award Winner! (Score:3, Informative)
Re:In related news... (Score:4, Insightful)
In a civilized society, you are responsible for your actions.
Re:In related news... (Score:3, Interesting)
Do you have any case law references to backup this statement?
Re:In related news... (Score:4, Funny)
You're new here . . .
Re:In related news... (Score:3, Informative)
Re:In related news... (Score:5, Insightful)
In the USA you should be free to assume that somebody will not break the law. Assuming people will break the law is very, very dangerous, and has cost us many of our freedoms through "preemptive legislation" like license plates, inummerable searches without probable cause (travel lately?), and handgun registration.
Re:In related news... (Score:5, Insightful)
It was properly stored; it was in my private residence where nobody is allowed to go! You again are telling me I MUST ASSUME that somebody is going to break the law and I'm responsible for THEIR illegal actions. How can that be? That's very dangerous!
[gestapo voice] YOU ARE NOT ALLOWED TO HAVE THAT [insert anything] BECAUSE SOMEBODY *MIGHT* TAKE IT FROM YOU AND USE IT TO COMMIT A CRIME! [/gestapo voice] The abuses of that logic are endless! Where do they stop?
If you buy something dangerous like a gun, you should be expected to take precautions to prevent its misuse...
I also own a 10" über-sharp Wüsthof kitchen knife, which is "dangerous". If somebody takes it from my house and kills the President, should I go to jail? Do I have to lock up all my forks too? Where does it stop?
If you're so irresponsible as to neglect to install a fence to prevent trespassing neighborhood kids from falling in, then as far as I'm concerned, you have no business building a pool in the first place. Most municipal laws agree on this point as well.
What about the parents? Aren't THEY irresponsible for not preventing their kid from trespassing? Again, you are telling me I'm responsible for the consequences of SOMEBODY ELSE's illegal actions! That's not right!
(But I'll grant you I'd be nuts not to put a fence around a pool, but because it's the right thing to do, not because I'm responsible for the illegal actions of others.)
Re:In related news... (Score:3, Insightful)
Re:In related news... (Score:3, Insightful)
Well the fact that he wrote this article might be a clue...
Re:In related news... (Score:3, Interesting)
Seriously, for anything else with this kind of possible liability, there is licensing, multiple warning labels and required training so that Joe Shmoe KNOWS the dangers. I think that opening that kind of regulation on wireless access points will be faught pretty hard by hardware
It's called an attractive nuisance (Score:4, Interesting)
For an example, lets say you have a swimming pool. You put up a fence keep the gate locked. You post signs saying "danger, no lifeguard." You chase away all the neighbor hood kids when they come around, but one climbs in late at night and drowns. You are at fault.
The author of this article has shown himself to be a sophisticated technical consumer. Someone who knows what they are doing. By choosing _not_ to protect access to his line he is acting in a negligent manner and his open AP could be considered an attractive nuisance.
Re:In related news... (Score:5, Insightful)
Wrong. Comcast is a business, and their business is transmitting information. That makes them a common carrier. The twitiot who wrote the article isn't in that business, and his TOS says that he can't use it that way. That means that he isn't a common carrier, can't use their protections and that if it gets to court, Comcast will not only not help him, they'll be doing everything they can to help the other side.
Re:In related news... (Score:3, Interesting)
If he's responsible for the conduct of the people using his traffic then every free community wireless access service should be very afraid. Yet they appear to be thriving.
TW
Re:In related news... (Score:3, Informative)
Assuming you were in the United States, you would go to your state public utilities commission, or equivalant, and file for a Certificate of Public Information, Convenience or Necessity
There are specific requirements that vary from state to state
Re:In related news... (Score:4, Interesting)
Re:In related news... (Score:3, Interesting)
Re:In related news... (Score:3, Insightful)
Well, not necessarily. If there were some kind of lawsuit, and the Feds (or RIAA, or whoever) made a demand along these lines in discovery, I doubt you could get rid of them simply by saying, "Nope, I don't keep logs. Take my word for it." They'd probably petition the court to order you to turn your computer over to them so that they can check for themselves (as if you couldn't destroy such logs). The side with the mo
Re:In related news... (Score:4, Interesting)
Many of the arguments people are applying to this guy could also apply to freenet--that running an unsecured wireless point or a freenet node could both be construed as facilitating a crime. In both cases, it's letting someone else use your bandwidth resources.
Not likely to fly... (Score:5, Insightful)
I'd have read the whole thing, but I was morally repelled by the salon.com ad policy. Anyway, this concept seems to be some perverted cousin of "security by obscurity" -- only this has less to do with protecting your security and more to do with having a way out when someone comes knocking on your door.
Unfortunately, I think this only applies when you *don't do it on purpose*. From my point of view, if you design a network solely for the purpose of relieving yourself of responsibility for what traverses your network, you are pretty much screwed once you get to court. This reeks of the "I accidentally did it on purpose" defense, and isn't likely to fly with any judge that has even a portion of a clue.
Re:Not likely to fly... (Score:3, Insightful)
Re:Not likely to fly... (Score:3, Interesting)
He isn't doing it deliberately to facilitate illegal things. For that to be true, he would have to have some prior knowledge that illegal activities were to take place and have taken actions to facilitate them. Instead, he took actions such that if someone were to take illegal actions, he would have less responsibility. He is neither condoning nor encouraging illegal activities, not is he aware o
Just plain silly. (Score:5, Insightful)
Second, forgetting that your name is still on the bill for that ISP, and that in all likely hood (see your ISP TOS) that makes you liable for what happens over your line.
Re:Just plain silly. (Score:4, Funny)
Yeah... and the fact that this premise was copied verbatim from the article and also included in the slashdot summary.
-a
Re:Not likely to fly... (Score:5, Interesting)
It is a fact after you do open your net up there is no way for them to proove that you commited the illegal acts. The fact that you did this opening up by stupidity or on purpose does not change that fact.
They can maybe get you on intent, as it might be argued that you opened up so you can do illegal acts, but that is far fetched.
Re:Not likely to fly... (Score:2)
Doing something on purpose is worlds different to stupidity when it comes to recriminations. Look at murder vs manslaughter. Intent vs stupidity.
Re:Not likely to fly... (Score:3, Interesting)
Is it against the law for him to share his internet connection?
Is he required to be "his brother's keeper" and monitor everyone that uses it?
IMHO, the only issue is between him and his provider and the TOS... if it is OK with the provider, that is all that matters.
You are not required to keep your neighbor from breaking the law.
Now... if this keeps some "big brother" from being able to accurately determine who is doing what... well... I say bravo. Added benefit.
Re:Not likely to fly... (Score:5, Interesting)
You may be forgetting all the civil and criminal facilitation laws. The article describes a deliberate attempt to allow unlawful activity and to obscure its source (disabling of all filtering). You may not be able to prove you did the activity, but proving who facilitated it is a snap.
Consider night clubs that "look the other way" on illegal drugs. They get slapped with a criminal facilitation charge.
Up to the point of turning off the logging, you could argue ignorance (by default, most wireless routers ARE wide open, except they log things). As soon as you intentionally create a launch-pad for illegal activities, you are hardpressed in court to prove to a reasonable jury a legitamite purpose (notice I said reasonable, as in reasonable doubt, not "shadow of a doubt," the standard some believe you must achieve but, in fact, don't need to).
Re:Not likely to fly... (Score:3, Insightful)
Correct. If the illegal act is the downloading of MP3z through a P2P network, that's not so bad, because the DMCA practically requires that Comcast act as an intermediary between RIAA/MPAA and you. Furthermore, because the aggreived parties, namely RIAA/MPAA, are private organizations, they can't really make your life all that miserable.
If, however, the illegal act involves the
Re:Not likely to fly... (Score:3, Interesting)
However it does not change the fact that:
a. 80%-90% of wireless users never secure their net
b. securing the net require way above technical knowledge
c. even when you think you secured it, it is probably not secure (see built in factory passwords)
d. even if it is the most secure at the moment, it requires constant updating and patching to stay that way
All of the above reasons will stand in a court of law.
Re:Not likely to fly... (Score:5, Insightful)
However, lets just say that some scumbag uses your internet connection to download some kiddy porn. Since it's not HIS connection, he's not terribly careful, and your address falls into the hands of the FBI.
Soooo, they come banging on your door bright and early one morning, with their guns and their search warrants. They confiscate everything in your house that's even remotely computer related, and haul it all off as potential evidence. Maybe they'll arrest you too, who knows?
Now you get to spend lots of time and money fighting those accusations, while trying to assure friends, family, co-workers, and strangers that it's all a mistake and you're really innocent. Then you'll finally get to court, and maybe your defense will stand up and you'll be found innocent. Then you can spend a couple more years trying to recover your confiscated property.
Worth it?
Me... I think I'll keep everything as secure as I can, and count on the fact that there are hundreds of unsecure connections out there, and no real reason for anyone to go through the trouble of breaking into mine. I might not be totally safe, but at least I'm not asking for trouble.
Re:Not likely to fly... (Score:2)
Re:Not likely to fly... (Score:2, Interesting)
Re:Not likely to fly... (Score:3, Interesting)
> of relieving yourself of responsibility for what traverses your network,
> you are pretty much screwed once you get to court.
I dunno about that part. Isn't exactly what the telcos do? They intentionally make zero effort to control the traffic passing across their network, lest they lose common carrier status and become legally liable for everything that happens inside their zone of control.
The questionable part is turning o
Re:Not likely to fly... (Score:4, Insightful)
Comment removed (Score:5, Insightful)
Re: (Score:3, Insightful)
Re:I believe that you are wrong. (Score:3, Interesting)
How did he conspire with the guy in a van? He just told the guy, on a major media website, that he's deliberately disabled everything that might assist in the guy's capture. There's nothing in conspiracy law that requires the communication to be secret.
Now, he says, "I'm not deliberately opening my network to hackers and miscreants bent on downloading copyrighted material. I'm simply choosing not
privacy != security (Score:5, Insightful)
Re:privacy != security (Score:5, Informative)
good eye though!!
Re:privacy != security (Score:2)
You're still tracable... you're just not bothering to keep the identity of your guests. The investigation will just go cold at you... never a good place to be.
That is so retarded (Score:5, Informative)
Wishing something doesn't make it so.
Re:That is so retarded (Score:3, Informative)
No, most of us have similar terms with our ISP.
However, so far in this discussion, people seem to have completely failed to realize that we deal with two distinct layers of accountability. The AUP only apply to the ISP's dealing with us, it doesn't extend beyond the continuation of them providing a service in exchange for us paying a set fee.
So, at the ISP level, your AUP ap
Salon: News writen by Sophomores... (Score:5, Insightful)
By choosing to run the "notoriously vulnerable technology", as the author admited in his confession letter, he admitted that he knowingly chose a piece of technology that could be exploited yielding his internet equipment making a request on behalf of somebody unknown. That's nice... you just gave that unknown person the gift of a liability shield at your expense.
As I just posted last thread, [slashdot.org] annonymity these days is really achieved by somebody else who had the chance to know who you are intentionally failing notice or promising not to tell. The thing is, that other person is taking on the liablity for what you do.
How nice of you to pay his MPAA/RIAA verdict bill for him, you'll be a hero to copyright pirates everwhere. I'm sure they'll be excited to learn there's still people dumb enough to fall for this trick still out there.
Re:Salon: News writen by Sophomores... (Score:3, Informative)
No, I don't work for them. Just a very satisfied customer on a 6.0/768 DSL connection.
:)
Re:Wow Bigger, heavier, and costs more (Score:5, Insightful)
Are you kidding me? (Score:5, Interesting)
Re:Are you kidding me? (Score:2)
Re:Are you kidding me? (Score:3, Insightful)
If you download illegal content in a library is the librarian on the hook if she cant point at you.
At work or university you can probably put a laptop with a fake MAC address on the network and download your illegal stuff. Is the CEO or dean on the hook?
Re:Are you kidding me? (Score:5, Funny)
Security through insecurity? (Score:4, Funny)
That's one way to improve security. (Score:2)
And by keeping a loaded gun in my mailbox... (Score:5, Funny)
This is brilliant. I'm in total awe.
Doubtful (Score:5, Insightful)
It would be interesting to see how this would play out. The closest analogy I can think of would be automobiles. If you allowed someone else to use your car, you may be held liable for damages they cause while they are driving it. As far a criminal activity, you may be targetted if your car is identified as taking part in a crime, though you have a pretty good chance of being found innocent if you can prove you weren't driving the car.
Not perfect, but close. The idea sounds good though.
Holy fuck.... this is stupid all around (Score:5, Insightful)
Second: stupid f'en idea
In a word, privacy. By making my Internet connection available to any and all who happen upon it, I have no way to be certain what kinds of songs, movies and pictures will be downloaded by other people using my IP address. And more important, my ISP has no way to be certain if it's me.
But since you're liable for everything that goes through your connection, you're fucked if something really bad does happen from your IP. That whole article sounds like it was written by some 14 year old. God... the logic employed in that article is truly amazing!
Re:Holy fuck.... this is stupid all around (Score:3, Insightful)
Think of a Windows PC as a home. The home has a door and the windows PC has some means of network administration. There's a vulnerability in it and viruses take advantage of it. Who are we going to hold responsible? The user may say that they didn't know such a vulnerability existed.. similar to saying that part of the door is broken and it just needed to be pushed in to open it but the person didn't know about it.. with things like default passwords, it's similar to hav
Re:Holy fuck.... this is stupid all around (Score:3, Insightful)
It's nothing like owning a gun and leaving it out for public use. Guns are dangerous even in trained hands and are illegal for many people to own or possess. You can be criminally liable for acts someone else commits with your unsecured gun and negligent parents are often prosecuted for this. There are laws covering this.
This much mor
Obscurity? (Score:2)
Yeah but... (Score:2)
Yeah, but the author does so fully aware of the potential consequences, thereby not really being an ignorant victim.
Put another way: If you open your house to all who come, including fugitives, are you going to
A better way (Score:4, Insightful)
Open != Insecure (Score:3, Informative)
There's a huge difference in implimentation, and also when speaking of liability and your situation in the eyes of the law.
I'm not a lawyer, so I'll hold off from saying more.
RD
too bad (Score:4, Funny)
Get a life (Score:5, Interesting)
I'm not deliberately opening my network to hackers and miscreants bent on downloading copyrighted material. I'm simply choosing not to secure it. That's no different from the millions of people who haven't installed anti-virus software and the millions more who don't keep theirs up to date.
But he IS deliberately opening his network to these people:
Last week, I turned off all the security features of my wireless router. I removed WEP encryption, disabled MAC address filtering and made sure the SSID was being broadcast loud and clear.
If he didnt have them enabled in the first place, then I might have agreed with his statement, but this is nothing like the "millions of people who havent installed anti-virus software", or the "millions more who don't keep theirs up to date". Those people dont intentionally install said protection and then disable it.
And more important, my ISP has no way to be certain if it's me.
And how is this going to matter? The ISP is renting YOU the connection, so its arguably your own responsability for the traffic passing through it. Your landlord might have something to say if you left your front door open to all who might be passing, and drug dealers take up residence. Id love to see his line rentals terms and conditions, they will amost certainly forbid what this guy is doing (intentionally sharing his connection with third parties).
If it ever comes down to a lawsuit, who can be certain that I was the offender? And can the victim of hacking be held responsible for the hacker's crimes?
Theres no hacking (cracking) going on here, the networks wide open. And there are such laws as accessory to a crime, which if you are doing this wilfully, then Id almost certainly say you were.
I hope this guy took legal advice about this, and about his stance regarding correspondance with Comcast in the future, because from where I can see, he may be on the shakiest legal ground. This article is pretty lame imho.
Re:Get a life (Score:5, Interesting)
The ISP is renting YOU the connection, so its arguably your own responsability for the traffic passing through it
You're missing the point. We're geeks. We can see how its your responsibility, but the rest of the world doesn't see it like that, and the courts are part of the rest of the world fellow.
In court, if the defendent said "I just bought this wireless thing from wallmart and now they're telling me that its my fault someone drove by my house and used it for bad things" then the judge/jury would go with them. If the prosecution then said "but purchasing that wireless router gave them a responsibility to learn how to generate and distribute WEP keys" they would be laughed off stage
No, what really screws him is that he WENT AND TOLD THE WHOLE WORLD ABOUT IT! in a Salon article. There goes his alibi...
I think there's a problem with his reasoning... (Score:2)
I just leave my front door open (Score:5, Interesting)
Ultimately, if you knowingly leave your computer open to mask your own poor behavior, you won't get off, you'll just get busted for all of it, and then get busted for knowingly providing a venue for this.
Re:I just leave my front door open (Score:3, Interesting)
Computer users can't be held responsible for the security and actions of their own computer... Esspecially if Microsoft has no responsibility for Windows' security.
Re:I just leave my front door open (Score:5, Interesting)
So, it's not my fault that there are 12-year olds drinking 40s on the front porch. No way is it my fault someone's selling crack in the living room, or that someone drowned in the pool.
I'm sure it depends on the jurisdiction, but in the UK (whose legal system I am most familiar with), I don't have any responsibility for others' actions. Provided I didn't supply the alcohol, or encourage the drinking, I think I'd be OK on the first point. (The actual act of a 12 year old drinking isn't illegal in the UK, just supply).
The crack dealer is more of a problem - as I have an obligation to report illegal activity to the police. However, there have been news reports recently of cases where dealers have broken in and taken over peoples' houses in rough areas of London, and started using them to deal from while the rightful owners are too scared to object. I don't think there was ever any risk of the victims (i.e. houseowners) being charged with anything. So provided I have an excuse for not reporting it (I was threatened, or more likely in the wireless network case, I didn't know it was happening) I think I'd have a defence.
As for the dead person in the pool - it depends how they died. Sure I'd be investigated, but if no-one can prove I was directly responsible (i.e. I pushed them) or grossly negligent (i.e. had a very deep pool with high edges so no-one could climb out) I think I'd be fine. Look at the recent case of the TV guy who had a party after which someone was found dead in the pool. It was all very suspect (indications of violence and drugs being involved), but no-one could prove there was deliberate foul play so no charges. There's no crime of "owning a pool in which someone drowned".
Re:If you let them (Score:3, Informative)
Rubbish. The only person liable is the driver, not the owner (provided I had no reason to believe that they would do that if I lent it to them). That's like saying if I kill someone in my car you can prosecute the car dealer who sold it to me, or the manufacturer who made it.
Snow Shovelling (Score:4, Insightful)
I shovel and salt to try to make it safer and damn the liability.
Until a malicious person secure up your AP (Score:2, Funny)
How cowardly! (Score:5, Interesting)
Not only does he not have the courage to stand up for himself, he's causing trouble for the rest of us. People can use his connection to send out those penis-enlarging e-mails to the rest of us. And as mentioned above, the FBI isn't likely to be amused by his defense if he becomes the hub for a child-porn ring.
"Security through apathy". Yeah, right.
Some "security" is based on zigs instead of zags (Score:5, Interesting)
See, stealthing is the idea of simply not answering the door when somebody unwanted knocks on it, instead of answering "I'm here but I'm not letting you in." which is what happens when a port is "closed" instead.
It was a great idea when port scanners didn't expect it. The idea being if the first request for a connect never gets a negative reply, the scanner will assume there's no computer at that IP and move onto the next possible victim. It worked against the port scanning threats of the time.
However, today's worms aren't so nice. TCP, by its nature, attempts to retry when a connection request is ignored, figuring the packets got lost in the Internet cloud somewhere. However, if you send the "I don't accept that kind of traffic!" message, the attacking server hears that, and that sends the attacker on to its next potential victim with no further waste of your incoming bandwidth.
"Stealth" is the new "Closed". Yeah, it's one of those fashion things where what's cool to do is just what everybody else isn't doing at the moment. So, keep watching, eventually it'll flip back.
Let's play the substitution game, kids! (Score:3, Insightful)
OK, now let's make a substitution:
"by making my gun available to any and all who happen upon it, I have no way to be certain who will be shot by other people using my gun. And more important, the police have no way to be certain if it's me."
Yes indeedy (Score:3, Funny)
Yes, in the same way that lighting yourself on fire will (eventually) make you impervious to flames! The fact that you will be a smoking pile of ashes would be a drawback however.
That's not security, (Score:2)
uhh how about no? (Score:2)
Like WEP is secure? (Score:3, Interesting)
Open or closed, your wireless access point has plausible deniability.
Keeping the connection open just makes it much more convienent to access for the vast majority of people who are doing nothing illegal.
The author contradicts himself. (Score:3, Interesting)
Last week, I turned off all the security features of my wireless router. I removed WEP encryption, disabled MAC address filtering and made sure the SSID was being broadcast loud and clear
and then a few paragraphs later:
Don't get me wrong. I'm not deliberately opening my network to hackers and miscreants bent on downloading copyrighted material. I'm simply choosing not to secure it.
Clearly, the author contradicts himself when he first describes exactly how he went about disabling all those security features, and then later stating that he is not deliberately opening his network.
The Return of Jon Katz (Score:2)
Ah, Jon Katz, bathtub philosopher- we had almost forgotten about you.
A pyrrhic victory (Score:2, Insightful)
Are people so desperate when it comes to computer security these days they're willing to commit suicide like this? His problem in the first place was with his ISP, so why not switch to a different one instead of applying his brand of twisted logic?
Seems like a pyrrhic victory if you ask me. He may be safe from lawsuits from his ISP, which he should have stopped using in the first place, but all the while his
Let Comcast Handle This Dork (Score:5, Funny)
$ wget -O - http://www.salon.com/tech/feature/2004/05/18/safe
Well, that is what a search warrent is for anyway. (Score:2)
Now I won't hold my breath that search warrents will never be issued, but in the normal civil ca
It's irrelevant that they can't tell. (Score:5, Insightful)
But they will have no problem holding you accountable by the terms of usage agreement.
End of discussion.
Once, you could log into Stallman's account (Score:5, Interesting)
So that's where this all came from.
That is not Security (Score:3, Interesting)
That has nothing to do with security, and may remove some protections you otherwise might have to keep people from breaking into your own computers.
You are looking for lawsuit immunity, which is very different than security. How well that might work is going to depend on when somebody is actually willing to go toe-to-toe against the **AA in court. So far it hasn't happened. They blackmail -- you pay. I don't expect if you just say, "Hey, I had an open Internet connection. Could have been anybody," is going to have them reply, "Oh, sorry, we're dropping our suit immediately." Their case might be weak in court since it would be very hard for them to prove it was actually you unless they served a search warrent against you, siezed your computers, and did forensic analysis on your hard drives and any CD/DVD - R/RW's they got along the way, but that's only after you get to court against their deep-pockets.
Besides, if you do open your connection intentionally, you are probably in violation of the terms of your ISP.
Your argument is essentially the same as any Freenet user has -- and that has yet to be tested as well.
Moron (Score:3, Informative)
The guy says that he's done this so that if his ISP ever accuses him of downloading illegal stuff, he can say "my connection was not secure; it could have been anybody". The fact is, he's posted an article on a publicly available site which tells everybody that he is doing this deliberately. "Well", says the ISP, "you are too stupid to have an internet connection". Snip go the scissors on his line. If this is not in their terms of service, I'm sure they can withdraw it with just a little financial compensation e.g. refund a couple of months of fees. But basically, they will not want anybody who exhibits such deliberate antisocial behaviour as a customer. (Antisocial because, for instance, a spammer could use his connection to send spam).
He's doing this so he can tell the ISP that it's not his fault if they detect somebody from his IP downloading illegal stuff. He has neglected the fact that if his connection was secure, nobody would be able to download illegal stuff from his IP...
hmmmmmmm.....
Would people stop mixing... (Score:4, Interesting)
You rented a car, the car got stolen? You don't get sued for violating the contract saying you couldn't turn it over to anyone else (you might have to pay for the car/insurance, but that's in their contract, not a violation of it).
Criminal law is a different matter. You either have to commit, be an accessory to or facilitator of the crime. Normally you could have trouble by being grossly neglient, like having an unsecured well, but again: People are so computer illiterate it won't fly.
To qualify as an accessory or facilitator of, you'd have to either actively contribute or actively avoid knowing about it. Here's the clue-by-four: Electronic communication is invisible. People have tons of spyware, viruses, open relays and so on. Open wireless is just one more type.
The ignorance defence works. Where I think it'll fall down is if you try to use it as a cover for committing crimes yourself. For anyone to care about your claim that wardrivers/aliens/gremlins did it, they'd have to actually look at your setup.
And if they got to that point, they'd probably recover more than enough information from your hard drive to take you down hook, line and sinker. Unless you do religious encryption, wiping and so on, in which case they'll slam your ass for details because "he probably deserves a lot more".
So if they're going after you based on IP address alone and you want to bluff (note: Falsifying evidence, perjury are serious crimes), install an open wireless afterwards. If you're doing something bad enough the FBI raids your ass and examines your computer, it won't do you any good anyway.
What have you gained by opening it up now? As far as I can tell, nothing more than the good chance your ISP will cut you off, or the FBI raid your ass based on what someone else has been doing. I'd rather take my chances as a casual pirate than a casual pirate whose wireless network was used to release kiddie porn or the latest windows worm, all things considered...
Kjella
where did I see that before? (Score:3, Interesting)
Strange, I don't see many replies here crying faul and shouting that it is 'supporting childporn'. What? Keeping no log will provide a safehaven for all those myriads of baby-rapists out there, no?
Ah well...maybe one should forbid that too, then. And wile we're at it, all 'hot spots' should be forbidden too.
Shows how absurd those arguments were.
And furthermore, those people that claim that ISPs, as a carrier, have protections while we have not, don't know what they are talking about. If you use your puter/server as a carrier, then, by definition, you fall under the same protections (at least where I live). There is nothing in the law that says end-users can't have carrier-protection when they act as a carrier, but companies can.
You could still be violating your TOS, however, that is true. Though, it should be noted that some ISPs allow it, and in any case, a TOS-violation isn't that big a deal within a free market-economy where ISPs battle for marketshare.
Re:Go view the salon day pass.. then read this (Score:2, Insightful)
Yes you Honor, the police found a girl's dead body in the trunk of my car, but then, I leave the doors open and the key on the ignition all the time, so how can you be certain it was me?
Come on, this must be a joke...
Re:Ignorance defence will not work. (Score:4, Insightful)
The problem here is that for some activities, the liability quotient is strict liability, that is, liability without fault. If the material is not stored on his computer, he has no liability. If someone stores kiddie porn on his computer, generally there is no defense available; it's presumed you knew it was there unless you can get a jury to believe you didn't download it. Now whether failing to secure his network makes him liable (or relieves him from liability) is another issue.
Paul Robinson >Postmaster@paul.washington.dc.us [mailto]>