Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

I hope everyone here has strong encryption on their wireless routers

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
berni_mccoy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:27 PM
Original message
I hope everyone here has strong encryption on their wireless routers
And uses serious firewall protection on their cable modems. I know most people do not. In fact I can see 3 of my neighbors' WLANs and I'm pretty sure they aren't protected.

Just think of NSA white vans driving around with computers that are sniffing your internet traffic. :scary:
Printer Friendly | Permalink |  | Top
AntiFascist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:29 PM
Response to Original message
1. Umm, they can break strong encryption n/t
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:31 PM
Response to Reply #1
4. Not in a trillion years, with the most powerful supercomputer
Since they can easily get a pen and trace wiretap from your ISP, why bother with a brute force attack anyway?
Printer Friendly | Permalink |  | Top
 
berni_mccoy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Reply #1
13. And you would know this how exactly?
Do you have computer science expertise? On a static site that doesn't rotate keys, they may be able to break it given enough computation power, but certainly not in a mobile unit and not without some idea of the content being encrpyted (granted that wouldn't be hard on most people's home WLANs). And even then, it depends on the bit-strength of the encryption... at 2048 bit encryption it can be pretty damn physically impossible to break.
Printer Friendly | Permalink |  | Top
 
AntiFascist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:39 PM
Response to Reply #13
18. What kind of cheap router or computer system has 2048 bit....

encryption?! Maybe I'm behind the times, but all I know is that they use those huge supercomputers of theirs to break strong encryption. And if you've seen one of those trailers with all those antennas on top, they probably have a means for piping the data stream directly to the supercomputer.

Also, I wouldn't be at all surprised if manufacturers or software providers have built-in back doors. Isn't this even documented somewhere about Microsoft?
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:45 PM
Response to Reply #18
23. Whilst debugging either a program or Windows itself, some
overseas persons found two keys (back doors)... one was if memory serves labeled NSA... the other I don't know.
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:37 PM
Response to Reply #1
16. Define "strong encryption"
WEP isn't (see my post below) The problem is, there are a lot of people who (incorrectly) think WEP = Strong. Those people are wrong.

Bad security measures are worse than no security measures at all, because someone who thinks they're secure will drop their guard.
Printer Friendly | Permalink |  | Top
 
obxhead Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:29 PM
Response to Original message
2. The NSA can hack the best of them anyway... eom
Edited on Tue Dec-20-05 07:30 PM by obxhead
Printer Friendly | Permalink |  | Top
 
LiberalArkie Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:49 PM
Response to Reply #2
27. And it does not take much effort
Last week I tied in the NetOptics ethernet tap into the Wireless 3G network, The previous week I tied in 8 DS-1's into some Calea boxes. It not much effort for them. Encrypt all you want, it has be decrypted when it hits the network taps. Now if you want to use a ST-III set, it might take 5 minutes or so to grab the key.
Printer Friendly | Permalink |  | Top
 
mandyky Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:30 PM
Response to Original message
3. I refuse to encrypt - come and get me
If you think I am a threat for upholding the Constitution - GO FOR IT!
Printer Friendly | Permalink |  | Top
 
Kralizec Donating Member (982 posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Reply #3
9. talk about it.
all bets are off when they start getting pissy about our rights.
Printer Friendly | Permalink |  | Top
 
abluelady Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Reply #3
11. Yes, this little grey haired grandma
is a tremendous threat to national security.:rofl:
Printer Friendly | Permalink |  | Top
 
andyhappy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:31 PM
Response to Original message
5. I doubt thats how they do it....
with the patriot act can't they go right to the service providers and see what everyone is checking out?
Printer Friendly | Permalink |  | Top
 
SPKrazy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:31 PM
Response to Original message
6. While I object to them doing it
I also have nothing to hide
Printer Friendly | Permalink |  | Top
 
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:32 PM
Response to Original message
7. What you need to worry about...
Is the teenagers in the Ford Festivas.
Printer Friendly | Permalink |  | Top
 
andyhappy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:32 PM
Response to Reply #7
8. festivas?
for the rest of us?

Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:35 PM
Response to Reply #8
15. Kids driving around
looking for unsecured wireless connections, then making mischief using those connections. It's called "wardriving".
Printer Friendly | Permalink |  | Top
 
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 09:47 PM
Response to Reply #15
32. Exactly...
And that is the real threat
Printer Friendly | Permalink |  | Top
 
rinsd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Original message
10. LOL....
Do you think that commerically available encryption and firewalls will stop the NSA from snooping in your computer?
Printer Friendly | Permalink |  | Top
 
zippy890 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Original message
12. doesn't scare me
UP AGAINST THE WALL AGENT MIKE

Having a bit of flashback to the 70s - I wasn't scared then & I'm not intimidated now.

Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:33 PM
Response to Original message
14. Agreed
One thing to point out: if you think you're protected because you're using WEP, you're not. The WEP encryption scheme is completely useless due to a well-publicized vulnerability in the key-exchange mechanism. It has been demonstrated that WEP can be broken in as little as 3 minutes using using automated freely-downloadable tools.
Printer Friendly | Permalink |  | Top
 
acmejack Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:38 PM
Response to Reply #14
17. To further buttress your case.
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:42 PM
Response to Reply #17
20. Making it worse:
WPA, the other encryption scheme implemented in commercially-available wireless LAN gear, also has it's problems, as detailed here: http://www.drizzle.com/~aboba/IEEE/

802.11i is better, but it's not widely implemented yet - you can't go to WorstBuy and get a wireless access point that supports it, for example.

(I do information security for a living, FWIW)
Printer Friendly | Permalink |  | Top
 
berni_mccoy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:43 PM
Response to Reply #14
22. I Use WPA-PSK TKIP
64 byte pass key plus rotating encryption keys.
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:50 PM
Response to Reply #22
29. then, you're probably fine
But, Grandma can't set that up. The problem with most security measures is that it assumes a certain degree of nerdiness to get it working.
Printer Friendly | Permalink |  | Top
 
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:40 PM
Response to Original message
19. Wireless would be easier at my house
but I said no way and went through the trouble of stringing CAT5 cable. 1000ft/$29, connectors 20-$3.95, crimping tool $6.95. Was worth it to me. I wasn't worried about the G-men but the kiddies driving around looking for hot-spots.
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:46 PM
Response to Reply #19
25. Faster, too
100MB max theoretical speed as opposed to 54mb for wireless, under perfect conditions.

The problem with do-it-yourself Cat 5 installation is that it's pretty easy to screw it up - like running it parallel to a flourescent light ballast, for example. And, even under those circumstances, it'll still work, but you'll be sitting there wondering why it's so effing slow.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:51 PM
Response to Reply #19
30. Wiring is faster anyway.
G is what, 50-100 megabit? Plus latency and added overhead for the transmission protocols, and constant retransmission errors due to interference? Wireless is easier for some locations, and it's a MUST if you have a laptop, but good old Cat-5 is still the best solution for desktop PC networks where performance is important. Wireless is only a valid option when convenience is more important that performance (it's funny how the ads fail to mention that).

FWIW, my house has both. My two desktops are hardwired to my DSL line with gigabit ethernet between them for gaming. I also have an 11b network running for my laptop...I used to have Cat5 strung all over my house so I could plug it in anywhere. My wireless lan allowed me to get rid of four mini-hubs and hundreds of feet of cable.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:43 PM
Response to Original message
21. Oh, the Internet is far easier than that to monitor.
Believe it or not, there are less than 30 transcontinental fiber-cables in the United States responsible for carrying 100% of our Internet traffic. The NSA would never bother wardriving to look for millions of unknown WLAN's, when they can simply tap those backbones and monitor EVERYONE at once. If they only want to intercept traffic entering and leaving the country, it's far simpler...there's only about a dozen international connections, and the last time I checked they all routed through FIVE switching centers. Monitoring those centers would be childs play.

The Internet was never designed to be spy proof, and is amazingly easy to monitor if you have the resources to get it done. The main stumbling block to monitoring Internet traffic is the sheer volume of it and the massive amount of computing power that monitoring a network this size would require. We're talking about the NSA though, so they're one of the few agencies in the world that actually have the technology to do it.
Printer Friendly | Permalink |  | Top
 
CatholicEdHead Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:45 PM
Response to Original message
24. Have mine turned off
Since I live in an apartment complex. I do not want the neighbors stealing my bandwidth.
Printer Friendly | Permalink |  | Top
 
sakabatou Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:47 PM
Response to Original message
26. I'm not using my wireless
using the yellow LAN cable through the box only.
Printer Friendly | Permalink |  | Top
 
ddeclue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:49 PM
Response to Original message
28. Yeah but they can probably crack that consumer stuff...
with half their highly parallel distributed processing supercomputers tied behind their backs...

:hide: :hide:

Doug D.
Orlando, FL
Printer Friendly | Permalink |  | Top
 
w13rd0 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-20-05 07:51 PM
Response to Original message
31. I leave mine wide open...
...and it's attached to a blue zone that's throttled to like 6k or something absurd. And it goes through a proxy that reports everything and has some nifty countermeasure routines. I have no problem with people "stealing my bandwidth" as long as they realize I'll be watching everything they do...very slowly...
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sun May 12th 2024, 01:15 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC