Quote:
Originally Posted by JoeD
For many years ISPs shipped routers to their customers that were pre configured with open WiFi, customers had no idea it was insecure. Others knew enough to turn on WEP but not enough to know people could break the security of it in a few minutes. Those who knew about WEP were smart enough to turn on WPA (which if they've failed to keep up with geeky tech news, they'll not know it is also breakable in a minute or so and should be running WPA2)
This is one of the reasons I think the first wave of letters is a very good idea. People need to be aware there's a possible problem and either know how to configure the security of their device to fix it OR pay someone to do so. The letter would ensure they're aware and can take the steps needed to check/sort it.
Now chances are the current WPA2 will be eventually broken and hopefully by then there's a new flavour out we can all move to temporarily, but if/when it is, there's going to be a lot of vulnerable wifi connections because people won't know it's broken. Those people should not be responsible for someone cracking and abusing their network and been fined on evidence of nothing more than their IP been used.
|
There is another security measure in place in router firmware these days. MAC address filtering should be used. That way, someone would have to have an authorized MAC address to be able to access the router.