I'm glad mine has a pretty good password and nobody in range:
http://arstechnica.com/tech-policy/2...-wifi-network/
SWAT team throws flashbangs, raids wrong home due to open WiFi network
Printable View
I'm glad mine has a pretty good password and nobody in range:
http://arstechnica.com/tech-policy/2...-wifi-network/
SWAT team throws flashbangs, raids wrong home due to open WiFi network
Whoops! I've felt the effects of an FB, those things suck! Video games kinda come close, but it hurts so bad- and I have tinnitus so it makes for the ringing to last even longer and worse. Pretty crazy, but glad no one was hurt. I always secure my connection using a complex 16 character encrypted password! [Beer]
Those swat douchebags
I leave a open wifi hotspot running with minimal bandwidth and some (easily avoided) site blocking. I'll take the risk. Given I've blocked mac addresses due to torrent use I think I have other much larger risks than a swat team. The bigger concern there is that a SWAT team raided someone based solely on computer use traced back to an IP used by that house. A) since when does computer use warrant swat response? B) shouldn't there be some evidence beyond an IP address? (especially before swat is involved)
It's long overdue for SWAT teams to have clearly established Rules of Engagement. When they have all that cool ninja equipment and do all the training there must be an overwhelming desire to try it out.
It can be done. Years ago the police would just jump into high speed chases. It led to a lot of dead people in accidents caused by this. Over time they came of with rules for this and other ways to dealing with it. SWAT raids need to be limited to where a real danger is shown.
Steve
Make sure your WiFi has WPA (WPA2) and not WEP either...[Beer]
I white list MAC addresses. It's a pain but it ensures even if someone is brute forcing my key, they can't do anything once they've wasted days getting it.