View Single Post
Old 08-04-2005, 01:20 AM   #3
hacker
Technology Mercenary
hacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with others
 
hacker's Avatar
 
Posts: 617
Karma: 2561
Join Date: Feb 2003
Location: East Lyme, CT
Device: Direct Neural Implant
Quote:
Originally Posted by wshwe
After someone has gained access to your broadband the next step is identity theft.
Uhm, no. How can access to someone's wireless router allow them to steal your identity?

If you mean by sniffing their network traffic, that same "hole" exists on any network where there are packets travelling across it other than your own.

Besides, anyone who is using their "identity" on the Internet should be using it over secure connections (like a bank, PayPal, whatever). Those who are not, deserve anything they get, especially if they don't secure their wireless.

I'm actually quite surprised these WAP devices don't come with a strong password by default, which the user is forced to change through the initial setup configuration, before they can use it.
hacker is offline