Half a croissant, on a plate, with a sign in front of it saying '50c'
h a l f b a k e r y
We got your practicality ... right here.

idea: add, search, annotate, link, view, overview, recent, by name, random

meta: news, help, about, links, report a problem

account: browse anonymously, or get an account and write.

user:
pass:
register,


   

Please log in.
Before you can vote, you need to register. Please log in or create an account.

Hotspot Hacker Spotter

Find WiFi criminals by pinpointing signal
  (+1)
(+1)
  [vote for,
against]

Let's say you're at the [coffee shop/mall/airport], and your [phone/tablet/notebook/netbook/Father's Day tie/laptop/Macbook] gets hacked. I'm going to surmise by the proliferation of WiFi usage agreements, you may have some recourse with the WiFi provider absent an agreement to the contrary. Perhaps to avoid a public relations scandal, they offer their surveillance videos to accompany your hopeless police report. Was it the kid with the tape on his glasses carrying a 2U NAS around with him on a suitcase dolly running on a car battery duct-taped to a UPS? Was it the quiet old lady with a USB cord running suspiciously from her iPhone to her purse? Was it Colonel Mustard in the conservatory with the lead pipe?

In the proposed attempt to heighten wireless security (or at least deter attempts to thwart it), receive-only stations would be placed around the area of interest. Using either triangulation (like old aviation navigational radios) or signal timing (like GPS systems), MAC addresses would be assigned physical coordinates against a predetermined datum of both space and time. This information could later be married against network logging and surveillance videos to pinpoint criminals (or direct advertisements unfortunately).

kevinthenerd, Aug 13 2013

[link]






       This will be useful if the adversary is in the room, but isn't it more common that the WAP itself has been compromised and the attacker is long gone (if he was ever physically present in the first place), perhaps having handed over control to some eastern European cybercrime gang?
swimswim, Aug 13 2013
  
      
[annotate]
  


 

back: main index

business  computer  culture  fashion  food  halfbakery  home  other  product  public  science  sport  vehicle