Using unsecured Wi-Fi for long-term use?

Golden Kiwi

New Member
Messages
4
I just moved into a new apartment and someone in the building has an unsecured connection which I’ve been using with no issues (except slower speed) since I moved in a couple days ago. I’m wondering what risks I would be taking if I was to use this connection instead of just setting up my own connection. The thought of saving $60+/mo is appealing but I’m concerned about security issues in regard to paying bills, bank transfers, stock trades, etc. I do have a secure connection elsewhere which I could use for that sort of thing if it would be a risk using it at home. Should I just bite the bullet and get my own service set up?
 

My Computer

System One

  • OS
    Windows 8.1
The first thing you should not be doing on an unsecured Public wifi. Is doing banking type transactions. You need to use either a VPN connection through the Public hotspot. Or just pay for your own secured personal Internet connection.

Too easy for someone to put a packet sniffer on the public hotspot and grab traffic as it goes through it.
 

My Computer

System One

  • OS
    Linux Mint 17.2
    Computer type
    Laptop
    System Manufacturer/Model
    Toshiba Satellite C850D-st3nx1
    CPU
    AMD E1-1200 APU with Radeon (tm) HD Graphics 1.40 GHZ
    Memory
    12GB
    Graphics Card(s)
    AMD Radeon™ HD 7310 Graphics
    Sound Card
    Realtek HD
    Monitor(s) Displays
    LCD
    Screen Resolution
    1366 x 768
    Hard Drives
    Crucial M500 240GB SSD
    Mouse
    Logitech M525
    Internet Speed
    45/6 - ATT U-Verse
    Browser
    Google Chrome
    Antivirus
    None needed. It is Linux.
    Other Info
    Arris NVG589 Gateway; Router - Cisco RV320; Switch - Netgear GS108 8-Port Switch & Trendnet TEG-S50g 5-Port Switch; Access Points - Engenius ECB350, Trendnet TEW-638APB; NAS - Lenovo ix2-4; Printer - Brother HL-2280DW; Air Print Server - Lantronix XPrintServer

    A/V UPS - Tripp-Lite Smart 1500LCD 1500 Va/900 W.
I think the OP nailed it (unsecured connection)
 

My Computer

System One

  • OS
    Win 8.1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    HP Envy 700z
    CPU
    AMD 4.1 GHz quad-core
    Motherboard
    MSI
    Memory
    8 GB
    Graphics Card(s)
    Integrated Radeon HD 8670D
    Sound Card
    Integrated Sound, Envy Audio; Beats Audio
    Hard Drives
    1TB 7200 RPM SATA
    PSU
    460 watt
    Keyboard
    wired USB
    Mouse
    wired USB
    Browser
    IE11 / Chrome
    Antivirus
    Windows Defender aka MSE
There are grade-school hackers who would have no problem capturing your every key stroke. Up to you.
 

My Computer

System One

  • OS
    Windows 8.1 Pro 64-bit
    Computer type
    Laptop
    System Manufacturer/Model
    Acer V3 771G-6443
    CPU
    i5-3230m
    Motherboard
    Acer VA70_HC (U3E1)
    Memory
    8GB DDR3 PC3-12800 (800 MHz)
    Graphics Card(s)
    HD4000 + GeForce GT 730M
    Sound Card
    Realtek High Definition Audio
    Monitor(s) Displays
    17" Generic PnP Display on Intel HD Graphics 4000
    Screen Resolution
    1600x900 pixels
    Hard Drives
    Samsung SSD 850 EVO 250 GB
    ADATA SSD SP900 128GB
    PSU
    90 watt brick
    Mouse
    Bluetooth
    Antivirus
    Comodo
    Other Info
    Asus RT-AC56R dual-band WRT router (Merlin firmware). Intel 7260.HMWWB.R dual-band ac wireless adapter.
The person that owns that Wi-Fi may be trying to sucker people into using it to steal their information. Everyone assumes its an idiot that didn't secure their Wi-Fi, so do you feel lucky.:confused:

Jim
 

My Computer

System One

  • OS
    Windows 7 HP 64bit, Windows 8.1 Pro w/Media Center 64BIT
    Computer type
    PC/Desktop
    System Manufacturer/Model
    ASUS - Home Built
    CPU
    AMD Phenom II X6 1100T
    Motherboard
    ASUS M5A99X EVO
    Memory
    Crucial Balistic DDR-3 1866 CL 9 (8 GB)
    Graphics Card(s)
    MSI R6850 Cyclone IGD5 PE
    Sound Card
    On Chip
    Monitor(s) Displays
    ASUS VE258Q 25" LED with DVI-HDMI-DisplayPort
    Screen Resolution
    1920 x 1080
    Hard Drives
    Two WD Cavier Black 2TB Sata 6gbs
    WD My Book Essential 2TB USB 3.0
    PSU
    Seasonic X650 80 Plus GOLD Modular
    Case
    Corsair 400R
    Cooling
    Antec Kuhler H2O 620, Two 120mm and four 140mm
    Keyboard
    AVS Gear Blue LED Backlight
    Mouse
    Logitech Marble Mouse USB, Logitech Precision Game Pad
    Internet Speed
    15MB
    Antivirus
    NIS, Malwarebytes Premium 2
    Other Info
    APC UPS ES 750, Netgear WNR3500L Gigabit & Wireless N Router with SamKnows Test Program,
    Motorola SB6120 Gigabit Cable Modem.
    Brother HL-2170W Laser Printer,
    Epson V300 Scanner
One word: Tor.
 

My Computer

System One

  • OS
    Windows 8.1 Pro x64
    Computer type
    PC/Desktop
    CPU
    Intel Core i7 4790k @ 4.6 GHz
    Motherboard
    MSI Z97 U3 Plus
    Memory
    8 GB 1333 MHz DDR3
    Graphics Card(s)
    AMD Radeon R9 285 (2 GB GDDR5), and Intel HD 4600
    Sound Card
    Integrated HD audio
    Monitor(s) Displays
    ASUS VW246H 24.6 inch
    Screen Resolution
    1920x1080 (natve)
    Hard Drives
    512 GB Crucial SSD (SATA-III)
    PSU
    800W NZXT PP-800
    Case
    CoolerMaster HAF 932 Advanced Edition (Steel fulltower)
    Cooling
    Liqtech 240
    Keyboard
    Razer Lycosa
    Mouse
    Logitech G35
    Internet Speed
    11 Mbps download
    Browser
    Mozilla Firefox
    Antivirus
    AVG free (and common sense :P)

My Computer

System One

  • OS
    Windows 8.1 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Home made
    CPU
    AMD Ryzen7 2700x
    Motherboard
    Asus Prime x470 Pro
    Memory
    16GB Kingston 3600
    Graphics Card(s)
    Asus strix 570 OC 4gb
    Hard Drives
    Samsung 960 evo 250GB
    Silicon Power V70 240GB SSD
    WD 1 TB Blue
    WD 2 TB Blue
    Bunch of backup HDDs.
    PSU
    Sharkoon, Silent Storm 660W
    Case
    Raidmax
    Cooling
    CCM Nepton 140xl
    Internet Speed
    40/2 Mbps
    Browser
    Firefox
    Antivirus
    WD
Hi there

"The Count" has nailed it precisely -- it doesn't matter what the complexity of passwords etc is if every key stroke can be captured -- even a secure VPN isn't safe if it's being accessed from an UNSECURED or OPEN Wi-Fi access point since any hacker could replicate your key strokes to get in.

For Banking transactions etc set up a temporary Internet access point with your MOBILE PHONE. While not 100% secure most decent mobile phone providers on 3 / 4G networks have a reasonable level of security built in and data is decently encrypted at most points in the process.

What amazes me that usually just with a simple PIN number you can access a lot of Banking type stuff. A more secure way would be for a random type of question to be put to you before the final login. Any Hacker therefore wouldn't know the question being posed so even if he / she had the plain text of your session they wouldn't know what the random question would be and therefore unlikely to be able to logon. This type of approach though would be very difficult to implement as each user would have to perhaps set up 30 or 40 "random questions" when creating the account in the first place -- and this data also is not 100% safe from "miscreants" either.

Cheers
jimbo
 

My Computer

System One

  • OS
    Linux Centos 7, W8.1, W7, W2K3 Server W10
    Computer type
    PC/Desktop
    Monitor(s) Displays
    1 X LG 40 inch TV
    Hard Drives
    SSD's * 3 (Samsung 840 series) 250 GB
    2 X 3 TB sata
    5 X 1 TB sata
    Internet Speed
    0.12 GB/s (120Mb/s)
Long, long , time ago (here I go again), almost "Once upon a time", I had a Timex-Sinclair ZX81 computer with a program for running production in our company. That program required a password but not an ordinary one. This one took into account how fast and with which time interval letters or numbers are punched in. Someone could hack password but there was no easy way to find and replicate timing. Surprised nobody is using that gimmick any more.
 

My Computer

System One

  • OS
    Windows 8.1 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Home made
    CPU
    AMD Ryzen7 2700x
    Motherboard
    Asus Prime x470 Pro
    Memory
    16GB Kingston 3600
    Graphics Card(s)
    Asus strix 570 OC 4gb
    Hard Drives
    Samsung 960 evo 250GB
    Silicon Power V70 240GB SSD
    WD 1 TB Blue
    WD 2 TB Blue
    Bunch of backup HDDs.
    PSU
    Sharkoon, Silent Storm 660W
    Case
    Raidmax
    Cooling
    CCM Nepton 140xl
    Internet Speed
    40/2 Mbps
    Browser
    Firefox
    Antivirus
    WD
Hi there.

I've seen the same thing on some VPN's -- you get a key "randomizer" and when you login you simply type the value displayed on the randomizer -- this connects you to the normal login screen of the VPN.

Now apart from some stuff it doesn't really matter if a hacker gets your keystroke since they won't be able to login to the VPN in the first place. Of course don't give away passwords or other stuff that the hacker could access by logging in to a different application though !!!.

perhaps this type of technology could be built into routers and ISP's so you wouldn't need to have large numbers of these key fobs.

Cheers
jimbo
 

My Computer

System One

  • OS
    Linux Centos 7, W8.1, W7, W2K3 Server W10
    Computer type
    PC/Desktop
    Monitor(s) Displays
    1 X LG 40 inch TV
    Hard Drives
    SSD's * 3 (Samsung 840 series) 250 GB
    2 X 3 TB sata
    5 X 1 TB sata
    Internet Speed
    0.12 GB/s (120Mb/s)
Get your own Internet connection. Be aware that in most locales accessing a network without the permission of the owner is illegal. That is precisely what you are doing. The fact that the connection is unsecured does not grant permission. Many people have set up unsecured networks for the express purpose of monitoring those who access it and use the information for their own gain.
 

My Computer

System One

  • OS
    Windows 7
    Computer type
    PC/Desktop
As LMiller7 said it may be illegal I live in Canada and found this on Wikipedia

Legality of piggybacking - Wikipedia, the free encyclopedia

[h=2]Australia[edit][/h]Under Australian Law, "unauthorized access, modification or impairment" of data held in a computer system is a federal offence under the Criminal Code Act 1995.[SUP][2][/SUP] The act refers specifically to data as opposed to network resources (connection).
[h=2]Canada[edit][/h]In Canadian law, unauthorized access is addressed by Section 342.1 of the Criminal Code of Canada. According to Section 342.1, "Every one who, fraudulently and without colour of right" obtains "computer services" from an access point is subject to criminal charges. (See Criminal Code of Canada, RSC 1985, c. C-46, s. 342.1 (1) (a))
Section 326 may also be used to address unauthorized access of a computer network. '(1) Every one commits theft who fraudulently, maliciously, or without colour of right', '(b) uses any telecommunication facility or obtains any telecommunication service.'
In Toronto in 2003, a man was arrested with a Wi-Fi enabled laptop in his car, partially undressed. He was tapping into unprotected wireless networks to download child pornography. Ultimately, however, he was charged not for piggybacking, but for the pornography instead.
In Morrisburg, Ontario in 2006, a man was arrested under section 326 of the Criminal Code of Canada. Ultimately the arrest was poorly reported, there does not seem to be any information available with regards to conviction.
[h=2]United Kingdom[/h]The Computer Misuse Act 1990, section 1 reads:
(1) A person is guilty of an offence if—
(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;(b) the access he intends to secure is unauthorised; and(c) he knows at the time when he causes the computer to perform the function that is the case.​
In London, 2005, Gregory Straszkiewicz was the first person to be convicted of a related crime, "dishonestly obtaining an electronics communication service" (under s.125Communications Act 2003). Local residents complained that he was repeatedly trying to gain access to residential networks with a laptop from a car. There was no evidence that he had any other criminal intent. He was fined £500 and given a 12-month conditional discharge.
In early 2006, two other individuals were arrested and received an official caution for "dishonestly obtaining electronic communications services with intent to avoid payment."
[h=2]United States[/h]There are federal and state laws (in all 50 states) addressing the issue of unauthorized access to wireless networks.[SUP][1][/SUP] The laws vary widely between states. Some criminalize the mere unauthorized access of a network, while others require monetary damages for intentional breaching of security features. The majority of state laws do not specify what is meant by "unauthorized access". Regardless, enforcement is minimal in most states even where it is illegal, and detection is difficult in many cases.
Some portable devices, such as the Apple iPad and iPod touch, allow casual use of open Wi-Fi networks as a basic feature, and often identify the presence of specific access points within the vicinity for user geolocation.
 

My Computer

System One

  • OS
    Windows 10 Pro + 8.1 pro and 7 Utimate
    Computer type
    PC/Desktop
    CPU
    i3 2.53GHz
People want something for nothing these days. Just a 150 years ago stealing a horse could get you hung. Oh, the good old days. :p
 

My Computer

System One

  • OS
    Windows 8.1 Pro 64-bit
    Computer type
    Laptop
    System Manufacturer/Model
    Acer V3 771G-6443
    CPU
    i5-3230m
    Motherboard
    Acer VA70_HC (U3E1)
    Memory
    8GB DDR3 PC3-12800 (800 MHz)
    Graphics Card(s)
    HD4000 + GeForce GT 730M
    Sound Card
    Realtek High Definition Audio
    Monitor(s) Displays
    17" Generic PnP Display on Intel HD Graphics 4000
    Screen Resolution
    1600x900 pixels
    Hard Drives
    Samsung SSD 850 EVO 250 GB
    ADATA SSD SP900 128GB
    PSU
    90 watt brick
    Mouse
    Bluetooth
    Antivirus
    Comodo
    Other Info
    Asus RT-AC56R dual-band WRT router (Merlin firmware). Intel 7260.HMWWB.R dual-band ac wireless adapter.
Get your own Internet connection. Be aware that in most locales accessing a network without the permission of the owner is illegal. That is precisely what you are doing. The fact that the connection is unsecured does not grant permission. Many people have set up unsecured networks for the express purpose of monitoring those who access it and use the information for their own gain.
Exactly.

This kind of thinking and actions never stop amazing me. "I thought I'd save some money and steal what I need from my neighbor, instead of paying for it. Am I safe?"

A real showcase of stupidity at its best.

Kari
 

My Computer

System One

  • OS
    Windows 8.1 Pro with Media Center
    Computer type
    Laptop
    System Manufacturer/Model
    HP ENVY 17-1150eg
    CPU
    1.6 GHz Intel Core i7-720QM Processor
    Memory
    6 GB
    Graphics Card(s)
    ATI Mobility Radeon HD 5850 Graphics
    Sound Card
    Beats sound system with integrated subwoofer
    Monitor(s) Displays
    17" laptop display, 22" LED and 32" Full HD TV through HDMI
    Screen Resolution
    1600*900 (1), 1920*1080 (2&3)
    Hard Drives
    Internal: 2 x 500 GB SATA Hard Disk Drive 7200 rpm
    External: 2TB for backups, 3TB USB3 network drive for media
    Cooling
    As Envy runs a bit warm, I have it on a Cooler Master pad
    Keyboard
    Logitech diNovo Media Desktop Laser (bluetooth)
    Mouse
    Logitech MX1000 Laser (Bluetooth)
    Internet Speed
    50 MB VDSL
    Browser
    Maxthon 3.5.2., IE11
    Antivirus
    Windows Defender 4.3.9431.0
    Other Info
    Windows in English, additional user accounts in Finnish, German and Swedish.
People want something for nothing these days. Just a 150 years ago stealing a horse could get you hung. Oh, the good old days. :p
Nowadays it's a virtual horse. how to virtually hang somebody ? A "Hangman game" ?
 

My Computer

System One

  • OS
    Windows 8.1 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Home made
    CPU
    AMD Ryzen7 2700x
    Motherboard
    Asus Prime x470 Pro
    Memory
    16GB Kingston 3600
    Graphics Card(s)
    Asus strix 570 OC 4gb
    Hard Drives
    Samsung 960 evo 250GB
    Silicon Power V70 240GB SSD
    WD 1 TB Blue
    WD 2 TB Blue
    Bunch of backup HDDs.
    PSU
    Sharkoon, Silent Storm 660W
    Case
    Raidmax
    Cooling
    CCM Nepton 140xl
    Internet Speed
    40/2 Mbps
    Browser
    Firefox
    Antivirus
    WD
Back
Top