deerseeker001
Super Member
- Joined
- Jul 20, 2011
- Messages
- 5,699
- Location
- Central wisconsin
- Tractor
- International 2500a with Loader
good reason not to have smart Phones
That story was a load of hooey... The devices (referenced here: ACLU wants to know how Michigan cops use 'data extraction devices' | Crave - CNET ) require that the officer have physical possession of your phone.I read a news story a while back that said the MI State police and other forces have this device in their cruisers that can read your phone while they follow you. They supposedly use it to see if you are texting while driving. As i recall it was a poorly written story and not much detail. the tip was to turn off your phone if you are being pulled over.
Ayep. Could just as easily the the guy at the next table with a laptop, or the guy walking around with a briefcase, backpack, etc.Nice scare article there.
Its a common man in the middle attack. Existed long before "drones" were ever though up, although saying drones sure makes it sound "scarier". The next time your in McD's soaking up that sweet, sweet free wifi with your $0.50 coffee, remember you're vulnerable to the same attack.
HTTPS, HTTPS, and/or HTTPS.Enable basic security like asking to join networks is a good first step. Assume that anything you send over a public wifi WILL be intercepted, ie: passwords, credit card info. so dont do it. Even "secure" sites.
Getting names and locations of networks is no big deal (they played it up in the article). Any wifi device will show you that same data.
Nice scare article there.
Its a common man in the middle attack. Existed long before "drones" were ever though up, although saying drones sure makes it sound "scarier". The next time your in McD's soaking up that sweet, sweet free wifi with your $0.50 coffee, remember you're vulnerable to the same attack.
Enable basic security like asking to join networks is a good first step. Assume that anything you send over a public wifi WILL be intercepted, ie: passwords, credit card info. so dont do it. Even "secure" sites.
Getting names and locations of networks is no big deal (they played it up in the article). Any wifi device will show you that same data.
Its a common man in the middle attack. Existed long before "drones" were ever though up, although saying drones sure makes it sound "scarier". The next time your in McD's soaking up that sweet, sweet free wifi with your $0.50 coffee, remember you're vulnerable to the same attack.
Enable basic security like asking to join networks is a good first step. Assume that anything you send over a public wifi WILL be intercepted, ie: passwords, credit card info. so dont do it. Even "secure" sites.
Getting names and locations of networks is no big deal (they played it up in the article). Any wifi device will show you that same data.
The only way I see this happening would be to have a fake non-SSL site that they got redirected to by the fake access point.I just don't see how they are steeling passwords on amazon etc with a man in the middle attack unless the user decides to trust a untrustworthy certificate authority. Unless I'm missing something, they haven't broken ssl. Now if you get one of those popups on your banks website all of a sudden that asks you if you want to trust the site and you say yes, now you are vulnerable.