My understanding is that the Comcast "free" wifi is a separate SSID connecting to a separate VLAN. This means that only Comcast customers can leech off other Comcast customers (supposedly the traffic is not counted against the modem customer's cap but the extra traffic could affect the customer) and some level of attribution is possible. Of course, you could pull off Marcus' idea by sniffing wifi traffic of real Comcast customers looking for that SSID, changing your server's MAC to match the Comcast customer, and then running Tor. I would expect that using the Comcast leech service would require some sort of login - but I know of two common methods to bypass that hurdle. Sometimes I never even see the login requirement because I don't use http and even then it should be possible to get Comcast customers to give you their userids and passwords (hopefully the one they use to control their account) through spoofing the Comcast leech SSID.
Ray Parks Consilient Heuristician/IDART Program Manager V: 505-844-4024 M: 505-238-9359 P: 505-951-6084 NIPR: [email protected]<mailto:[email protected]> SIPR: [email protected]<mailto:[email protected]> (send NIPR reminder) JWICS: [email protected]<mailto:[email protected]> (send NIPR reminder) On Jun 11, 2014, at 11:16 AM, Marcus G. Daniels wrote: On Wed, 2014-06-11 at 10:54 -0600, Roger Critchlow wrote: Oh, that's why they've been pitching their awesome WiFi all these months, because it has this trapdoor in it. Everyone can run Tor servers over these neighborhood hotspots. Let the FBI send their subpoenas to Comcast. Win, win. Marcus ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
