lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <FBF77CAA2771D31188580008C79182F213CBC97B@usphlx16.phl.sap.corp>
From: craig.soderland at sap.com (Soderland, Craig)
Subject: Wireless ISPs

Just to throw my .02 in here wasn't there a FCC ruling (for those of you in the US) that stated that you as a private citizen have the right to receive "any" broadcast radio signal. 

If this is the case then you would in essence have the right to listen in on any un-encrypted radio traffic. 



----------------------------------------------------
This mailbox protected from junk email by Matador
from MailFrontier, Inc. http://info.mailfrontier.com

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-
> admin@...ts.netsys.com] On Behalf Of Frank Knobbe
> Sent: Tuesday, May 11, 2004 4:32 PM
> To: D B
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] Wireless ISPs
> 
> On Tue, 2004-05-11 at 13:33, D B wrote:
> > All transactions done via secure websites are secure,
> 
> No, they are not. It's just harder to intercept the data.
> 
> > A wired internet connection
> > limits the number of people who have access to this
> > data simply by the nature of the internet putting it
> > within acceptable risk.
> 
> Same can be said for wireless. (Except that the perimeter of the attack
> arena is defined by the wireless emissions instead of cable runs.)
> 
> > It is legal according to US law to eavesdrop on
> > wireless connections.
> 
> Maybe, INAL. But it is illegal to commit fraud with the data gathered by
> eavesdropping.
> 
> > 2. Encrypt all wireless transmissions at least making
> > someone who gains access to this data prosecutable.
> 
> Uhm... someone that accesses and uses the data is already prosecutable.
> 
> > Please direct all flames to /dev/null
> 
> Neat. Never heard that before... :)
> 
> 
> -Frank


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ