Well, if you are sitting outside of Lowe's aiming a vagi at the building it
really can't be seen as accidental, but yeah. 
On a tangent, there is a *nix program out there that creates a AP with the
same name as access point foo and acts as a proxy to the "real" AP - the
premise is that wireless zero conf will switch over people's connections to
hit the fake AP (stronger signal strength is kind of a requirement, but. .
.) so you can snag usernames and passwords and other such interesting stuff.
The name escapes me. 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Thursday, July 01, 2004 9:41 AM
To: [EMAIL PROTECTED]
Subject: Re: [nycwireless] Confessions of a War Driver

This is a good point ... Joe Hacker's claim ... "Microsoft made me do it."  

Ive already personally seen it, people running around surfing the web and 
checking their personal setting to find out their are connected to Linksys 
vs. nycwireless.org ... kinda makes you wonder about the right people to 
really blame.

- Jon

> >I would suggest that if you deploy wireless network which has open auth 
> >by design that it's not illegal to associate with the access points. 
> 
> Wireless zero config might connect you automatically. 

-- 
pgp key: http://www.jonbaer.net/jonbaer.asc
fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47
--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to