- Theft of service
- The insecurity of wireless networks, which in hotspot applications are typically not encrypted.
- Use by customers for launching attacks (cracking, DDoS).
- Use by customers for "war spamming."
- Etc.
Thursday, August 26, 2004
WiFi Hotspots
We may be getting into the WiFi hotspot business in some capacity. My boss therefore asked me to look into the security implications of this, as well as the associated legal liability implications. Off the top of my head, I can think of several potential issues we'd need to address, e.g,:
Subscribe to:
Post Comments (Atom)
1 comment:
You should also take a look at the NoCatAuth project, and my simpler TrollBridge project for controlling access to a network from a wireless gateway (actually it can also be used for wired access as well).
http://www.trollbridge.net
I plan on getting a new release out in about a week that will include timeouts and iButton authentication.
Brian
Post a Comment