13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

310<br />

Part IV: Using a <strong>Wireless</strong> Network<br />

Staying Secure in a Hot<br />

Spot Environment<br />

As we mention earlier in the chapter, most Wi-Fi hot spots, whether they be<br />

free or for pay, utilize no network security and encryption (this is simply<br />

because it’s easier for users to get online without trying to figure out WPA<br />

passphrases and the like). There are some exceptions (for example, T-Mobile<br />

uses WPA and 802.1x authentication on their hot spots), but the vast majority<br />

<strong>of</strong> hot spots are completely without encryption.<br />

What this means to you, as a user <strong>of</strong> a hot spot, is that everything that you<br />

send and receive from your laptop is “in the clear.” Anyone else in Wi-Fi range<br />

could intercept your transmissions and read them. If that doesn’t give you<br />

pause, it should!<br />

The lack <strong>of</strong> hot spot encryption also could lead to a situation where you<br />

unwittingly log onto a “fake” hot spot with a similar SSID to the one you’re<br />

trying to log onto. In this evil twin attack, some bad person sets up an access<br />

point with an SSID such as Starbucks right near the Starbucks where you<br />

think you’re logging into a T-Mobile hot spot. You log on and they capture<br />

everything you do online (for example, online banking and Webmail passwords).<br />

Not a good situation.<br />

You can do a few things to secure yourself in a hot spot environment. The<br />

first (and best) is to use a Virtual Private Network (or VPN). Using a VPN in a<br />

hot spot gives you three distinct benefits:<br />

� A VPN provides security even without airlink encryption (WPA or WEP)<br />

by encrypting all your inbound and outbound traffic. Even though someone<br />

could freely “read” and copy all your Wi-Fi signals, those signals<br />

would be protected by the VPN’s encryption and would be nothing but<br />

gibberish to the end user.<br />

� A VPN provides privacy and anonymity online (even beyond the bounds<br />

<strong>of</strong> the hot spot) by making your public “face” on the Internet an IP<br />

address in your VPN provider’s network rather than your own IP address.<br />

This means that any online tracking (both the benign and the malign<br />

kinds) that relies on your IP address would never be able to associate you<br />

with your actual IP address. This benefit could also apply at home or<br />

anywhere you go online.<br />

� A VPN provides you better access to the Internet in locations where<br />

certain Web sites or Internet applications (such as VoIP, discussed in<br />

Chapter 13) are imposed by the government or other organizations. For<br />

example, many western travelers in China find that they can’t access<br />

Web sites that they normally view (for example, some parts <strong>of</strong> Wikipedia<br />

are blocked). A VPN lets you “tunnel” through national firewalls and do<br />

what you want to do on the Internet without being blocked.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!