|
2007-12-12
, 20:27
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#22
|
|
2007-12-13
, 07:25
|
Posts: 3,401 |
Thanked: 1,255 times |
Joined on Nov 2005
@ London, UK
|
#23
|
|
2007-12-13
, 09:05
|
|
Posts: 574 |
Thanked: 166 times |
Joined on Oct 2007
@ BC, Canada
|
#24
|
The Following User Says Thank You to technut For This Useful Post: | ||
|
2007-12-13
, 09:39
|
Posts: 156 |
Thanked: 44 times |
Joined on Dec 2007
|
#25
|
Without giving too many details, can you explain how this is achieved? My N800 isn't as far as I know accessible via WiFi unless I initiate the connection, so are you suggesting someone can establish a connection to my device over WiFi once I've brought up the WiFi interface? I wouldn't have thought this was possible as I'm not running an ad-hoc WiFi connection, and I would have thought my N800 will only accept connections via the access point to which I am authenticated.
|
2007-12-13
, 10:08
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#26
|
the bad certificate warning mentioned above.
|
2007-12-13
, 17:26
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#27
|
|
2007-12-13
, 18:08
|
Posts: 3,401 |
Thanked: 1,255 times |
Joined on Nov 2005
@ London, UK
|
#28
|
If you install SSH, it allows anyone to connect remotely to your device if they know your password. The password is widely known for the root account ("rootme"), so anyone who does ssh root@1.2.3.4 (being the IP of the tablet) can use that password to get in.
If you are connected to the same wireless AP as someone, or on the same network as someone they can do this. An assumption was made that if there was a hotspot in the vicinity you'd be on it (being an Internet tablet user and all).
If you do have SSH installed, login as root, and change the root password. If you don't have SSH installed, stop worrying.
|
2007-12-13
, 21:35
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#29
|
OK that makes sense - all users on the same AP are most likely visible to all other users of the same AP unless the AP takes precautions to prevent users from communicating with each other. I had kind of assumed that a public access point wouldn't allow associated computers to communicate with each other as it's a fairly obvious security risk - does anyone know if public access points provide this level of protection? Of course even if some did, it wouldn't be advisable to depend on such protection as you're bound to end up connecting to some cheap @rse access point that leaves you wide open.
|
2007-12-13
, 22:38
|
Posts: 190 |
Thanked: 21 times |
Joined on Sep 2006
|
#30
|
If you can't get an SSL connection, and you're paranoid about how dead-easy it is to traffic sniff on wifi, you can set up an encrypted tunnel using SSH.
I explain how to set up the MicroB browser to use this tunnel (as a SOCKS5 proxy) here. Note that your traffic can be sniffed once it leaves the other end of the tunnel for the Internet, but I have a much higher (probably false) sense of security on the wired Internet.