tag:blogger.com,1999:blog-2096776708897685863.post4001935685697194525..comments2024-02-23T04:39:49.329-05:00Comments on Conversations in Klal: Free or Felonious?ProfKhttp://www.blogger.com/profile/17954446826821665314noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-2096776708897685863.post-60412727036396520262008-06-22T20:48:00.000-04:002008-06-22T20:48:00.000-04:00Thanks anonymous for the link. The full article c...Thanks anonymous for the link. The full article can be seen at http://www.time.com/time/magazine/article/0,9171,1813969,00.html <BR/><BR/>What I found interesting was that there is an actual law against "borrowing" someone else's Wifi. Should those who have Wifi be password protecting themselves? Yes. But it's analagous to someone's leaving a vault in their home unlocked. Just because they left it unlocked does not mean that we can waltz in and help ourselves to the content. Stealing is not dependent on the security of the item being stolen--locked away or open a theft is a theft.ProfKhttps://www.blogger.com/profile/17954446826821665314noreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-4499314049142311842008-06-22T20:13:00.000-04:002008-06-22T20:13:00.000-04:00More discussion took place the previous day: Confe...More discussion took place the previous day: <A HREF="http://rss.slashdot.org/~r/Slashdot/slashdot/~3/315468457/article.pl" REL="nofollow">Confessions of a Wi-Fi Thief</A> [slashdot.org]Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-3463442532813397342008-06-22T14:27:00.000-04:002008-06-22T14:27:00.000-04:00I should point out that if the person who controls...I should point out that if the person who controls the open WiFi point is malicious, they can do a great deal of damage to you, depending on what you do using that network.<BR/><BR/>Just something to keep in mind.Davehttps://www.blogger.com/profile/04391023891253673160noreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-55054947840267151712008-06-22T11:07:00.000-04:002008-06-22T11:07:00.000-04:00I asked this shaila to my Rav. I was living in an...I asked this shaila to my Rav. I was living in an apt building and my computer was picking up someone else's signal instead of my own wireless router. Since it is so easy to encrypt a wireless connection, I was told that if the other person left it open, I could let my computer connect to it. Every time I have ordered high speed internet, I am told by the ISP that everyone should password protect their wi-fi. If someone doesn't, he can't blame other people for using his wi-fi.SaraKhttps://www.blogger.com/profile/08053908720926177402noreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-7441158811881994092008-06-21T23:30:00.000-04:002008-06-21T23:30:00.000-04:00I'm with the above posters. Most of the networks t...I'm with the above posters. Most of the networks that show up on my computer are password protected, as is my own. If it's not protected, that's like a declaration that it's free-for-all. I don't see how there could be an issue of stealing in this case.Bas~Melechhttps://www.blogger.com/profile/01511197551248863790noreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-10353844672760670322008-06-20T17:25:00.000-04:002008-06-20T17:25:00.000-04:00I agree that using someones internet service witho...I agree that using someones internet service without permission is stealing. However, there are a number of problems:<BR/><BR/>1. Many places provide free WiFi, stores, coffee shops, restaurants, airports, etc. The way they signify that the service is free is by not requiring a WEP key and not requiring a login when connecting.<BR/><BR/>2. Therefore, most PCs will scan the vicinity to see which WiFi networks are available. Furthermore, most PCs will connect to any of them, and some use the strongest signal available. One time last year, my computer kept trying to connect to my neighbor because it saw it as the strongest signal for some reason, but I stopped it by using different software that allows *me* to specify the order and which ones to disallow.<BR/><BR/>So, if it is generally accepted that the way to signify free service is to provide an open system, and since the PCs are designed for such access, there is a real question here. Especially considering that:<BR/><BR/>a. It is extremely easy to setup a password for ones WiFi access point. It takes literally less than 5 minutes, and *every* wireless router on the market supports it. And if you need help, your ISP will willingly help, they do it every day. Also, once you set it up, and once you setup the PCs permitted to access it, it remembers it forever.<BR/><BR/>b. For legal reasons, only a very imprudent person would leave an open WiFi signal available without clearly posting it and absolving (at least trying to absolve - no cases have yet been brought to disprove this) oneself of liability. An open wifi signal is an invitation for criminals (some very nasty ones) to ply their trade completely anonymously and possibly have it blamed on you!<BR/><BR/>MarkAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-81934912512845719262008-06-20T15:40:00.000-04:002008-06-20T15:40:00.000-04:00It should be fairly easy, if you have a wireless c...It should be fairly easy, if you have a wireless connection, to call up your ISP and have them turn it into a secure connection which requires a password login. In addition to preventing thieves, this is goo for another reason. Ever internet connection has it's own unique identifying IP address. If someone is not only stealing your internet, but also using it to, say, download child pornography, then your home's IP address would be what law enforcement traced the downloader to. It's good sense to protect yourself.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2096776708897685863.post-35603807784931509982008-06-20T14:52:00.000-04:002008-06-20T14:52:00.000-04:00I am not so sure: 1) There is often a lot of unus...I am not so sure: <BR/><BR/>1) There is often a lot of unused bandwidth. I have a wireless in my house, and I don't care that others occasionally tap in. I have sometimes noticed others using the connection when I have monitored, but never noticed my use impaired by it. I do not run banking data through it ever, however, as that is asking for trouble.<BR/><BR/>2) If the Wi-fi provider is concerned about it, he can easily encrypt the router so free loaders cannot tap in.<BR/><BR/>Given that, it may well be that tapping into the Wi-Fi is "zeh ne'heneh v'ze lo chaser" (This party benefits, and it costs the other party nothing)<BR/><BR/>I do not tap in to others' Wi-fi, but if there were some reason to, I'd at least ask a shaila. Saving the $39.00 the wireless router cost me is not a reason to tap in. And certainly when the Wi-Fi is made available as a public service by, say, the town, it is permissible to use it.Anonymousnoreply@blogger.com