TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What we give away when we log on to a public Wi-Fi network

262 pointsby rickstaover 10 years ago

17 comments

jMylesover 10 years ago
Here&#x27;s what I wrote last time this was posted (<a href="https://news.ycombinator.com/item?id=8457167" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8457167</a>), with some edits to respond to other comments made in this thread:<p>An interesting read, but sparse enough on details to be basically useless. Additionally, there&#x27;s nothing that I can discern to be new here. The following is demonstrated, all of which are known (and in fact obvious) to people with even an elementary understanding of how wifi and TLS work:<p>* That wifi probes are public<p>* That wifi devices, by default, expose reasonably reliable evidence about their type and origin via their MAC address<p>* That many OS&#x27;s automatically connect to &#x27;trusted&#x27; wifi networks, regardless of their apparent physical location<p>* That many websites don&#x27;t have TLS by default (or at all)<p>* That, if a user connects to a network you control and requests a URL not beginning with &quot;https,&quot; it is trivial to present them with a fake page looking like the one to which they thought they were browsing (of course they won&#x27;t see a lock) --(note: if the website has HTTP Strict Transport Security enabled and the user has previous visited that website with a supporting browser, then this part is non-trivial)<p>* That, if a user transmits unencrypted plain text over a wifi network to which you have access, it&#x27;s trivial to glean the content of their transmission.<p>None of this is news, and it&#x27;s all that this article seems to point out. Even more bizarre is that, almost without exception, it merely leaves these items implied, failing to describe the mechanism of action.
评论 #8478221 未加载
评论 #8479529 未加载
评论 #8479940 未加载
sktrdieover 10 years ago
How was the hacker able to get Facebook credentials? Facebook uses HTTPS and so does Live.com. Even if I&#x27;m connected to a malicious router, only me and Facebook know about the data we&#x27;re sending each other.<p>Am I missing something or should the author of this article provide more evidence on the type of attack?
评论 #8476300 未加载
评论 #8476582 未加载
评论 #8477990 未加载
评论 #8476282 未加载
评论 #8479001 未加载
ambrop7over 10 years ago
Most people don&#x27;t understand the WPA PSK security model and its insufficiency for anything but private networks where every device is trusted. When you give someone the PSK, you give them the capability to impersonate the access point.<p>That being said, is there any better solution for public networks? One where giving someone a password doesn&#x27;t let them impersonate you. I&#x27;m not sure how good support for EAP-TLS is on common client devices. To actually make it secure the device would not only need to support it but also validate the AP&#x27;s public key some way.
评论 #8480019 未加载
评论 #8477518 未加载
tunapover 10 years ago
Interesting but dated info for techies. I was hoping for something more along the lines of how retailers triangulate &amp; track your movements inside their brick &amp; mortar sites. Or how public providers scrape your browsing habits whilst on their net. I was even more interested in learning what other tricks they employ that I am not yet aware of.<p>With the ubiquity of broadband mobile I recommend avoiding public wifi whenever possible because the items listed in TFA are ubiquitous at most Starbucks, airports and other hi-profile public spots. I also highly recommend disabling any equipments&#x27; wifi by default, the world is full of liars, cheats &amp; thieves smarter than myself. When you go for &quot;free&quot;, what you get never is.
评论 #8477285 未加载
fredstedover 10 years ago
Are my devices really broadcasting the SSIDs they have been connecting to?
评论 #8476310 未加载
评论 #8476309 未加载
评论 #8476271 未加载
评论 #8477257 未加载
评论 #8477519 未加载
risover 10 years ago
Hm. So are there any 802.11_ proposals for cryptographically &quot;signed&quot; SSIDs? Using public key cryptography, this is surely doable in a way that is &quot;anonymous&quot; too, right? (i.e. doesn&#x27;t reveal the identity of the AP you&#x27;re probing for)
xamolxixover 10 years ago
Considering how ridiculously cheap an anonymous VPN service is these days I am surprised how many people do not use them.
评论 #8476468 未加载
评论 #8476382 未加载
评论 #8476296 未加载
评论 #8476365 未加载
评论 #8477538 未加载
byoung2over 10 years ago
<i>All names in this article are fictitious, except for Wouter Slotboom’s</i><p>I thought for sure that name was fake!
评论 #8476637 未加载
z92over 10 years ago
Login into a public WiFi and turn on your VPN. Problem solved.<p>VPN accounts are cheaper than ever before. You can also install one on a cheap DO box.
VexXtremeover 10 years ago
I see a lot of comments here presenting HSTS as some kind of silver bullet for preventing MITM attacks. While it does help, it&#x27;s not impenetrable. If a website hasn&#x27;t been preloaded into the STS preloaded list, then the HSTS header can be stripped on the first visit and the client will never upgrade to SSL.<p>The only foolproof way to make sure you&#x27;re not being MITMd is to visually verify that the domain checks out and that you are indeed connected using SSL.
tiatiaover 10 years ago
Don&#x27;t like your MAC? get a new one...<p>import random<p>import os<p>mac=&#x27;&#x27;<p># os.system(&#x27;&#x2F;etc&#x2F;init.d&#x2F;networking stop&#x27;)<p>os.system(&#x27;ifconfig wlan1 down&#x27;)<p>os.system(&#x27;ifconfig eth1 down&#x27;)<p>for i in range(0,3):<p>r=random.randint(16, 256)<p>mac=mac+&quot;:&quot;+str(hex(r))[2:]<p>mac=&quot;00:07:E9&quot;+mac<p>print mac<p>os.system(&#x27;ifconfig wlan1 hw ether &#x27;+mac)<p>os.system(&#x27;ifconfig eth1 hw ether &#x27;+mac)<p>os.system(&#x27;ifconfig wlan1 up&#x27;)<p>os.system(&#x27;ifconfig eth1 up&#x27;)<p># os.system(&#x27;&#x2F;etc&#x2F;init.d&#x2F;networking stop&#x27;)<p>os.system(&#x27;&#x2F;etc&#x2F;init.d&#x2F;networking start&#x27;)<p>os.system(&#x27;ifconfig&#x27;)<p>print &quot;echo &#x27;MAC changed...&quot;<p>print &quot;new random MAC &quot;+mac
JoshGlazebrookover 10 years ago
I&#x27;ve read about this kind of thing before, so when I&#x27;m in public, or even at school I prefer to fire up my phone&#x27;s personal hotspot instead of using any public wifi available.
评论 #8477265 未加载
tetraodonpufferover 10 years ago
why aren&#x27;t &#x27;know networks&#x27; gps-geofenced on smartphones? You have GPS, if your previous &#x27;known network&#x27; (say, home) was in location X, it should not automatically connect (or even <i>try</i> to connect) to it at X + 20 miles.<p>This way you should be able to keep your phone from connecting automatically to (or even looking for) a network that shouldn&#x27;t be there in that location in the first place, and if you always tether to it it would work for your laptop too...
评论 #8479614 未加载
评论 #8483974 未加载
tcdentover 10 years ago
How is he able to get them to trust the network? Is it common for software to connect to known SSIDs without verifying any other information?
评论 #8476290 未加载
评论 #8476287 未加载
goblin89over 10 years ago
I wonder if it&#x27;s true that iOS 8 only randomizes device&#x27;s MAC when the SIM cart is not installed[0]. Was stoked to learn about this feature, too bad it apparently doesn&#x27;t work as you&#x27;d expect it to.<p>[0] <a href="http://9to5mac.com/2014/09/26/more-details-on-how-ios-8s-mac-address-randomization-feature-works-and-when-it-doesnt/" rel="nofollow">http:&#x2F;&#x2F;9to5mac.com&#x2F;2014&#x2F;09&#x2F;26&#x2F;more-details-on-how-ios-8s-mac...</a>
yuhongover 10 years ago
I wonder if anyone has tried to use CloudCracker to sniff MS-CHAPv2 VPN traffic.
ColinWrightover 10 years ago
<a href="https://news.ycombinator.com/item?id=8461206" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8461206</a>