Forgot your password?
typodupeerror

Inverting Images for Uninvited Users 277

Posted by timothy
from the beggars-choosers-and-chiropractors dept.
Yesterday's story about a creative approach to dealing with uninvited (and unwanted) users on a private wireless network -- by intercepting and modifying the images received downstream -- provoked some thoughtful comments on open wireless networks, and a storm of analogies about networks and property generally. Read on for some of the most interesting comments in the Backslash summary of the conversation.

Several readers offered comments on the methods of network interference suggested in the examples linked from the story, or offered other creative ways to impede network freeloaders. First, reader blantonl offers some insight into implementing the same image-flipping technique:

For those that are struggling to understand how the author of this article is accomplishing his approach, here is some further information.

The author obviously has a Linux server in his house, that is running DHCPD

To selectively send some clients to some locations, and others to the normal internet, he assigns an IP address on a different network to clients that don't have MAC Addresses that he knows about.

Forwarding on to sites of his choice is done by using IPTables, which is a utility that allows you to configure the packet filtering components of the Linux TCP/IP Stack. In this instance, the Linux box is just functioning as a firewall, and he is selectively sending requests from certain IP addresses to different hosts of his choosing.

Finally, the Up-side-down and blurry-image conversions is accomplished by sending page requests from those before-mentioned IP addresses to a proxy server, which in this case is Squid — and then allowing the proxy server to run a script which calls an ImageMagick command called mogrify which allows you to resize an image, blur, crop, despeckle, dither, draw on, flip, join, re-sample, and much more.

(Writing "I'm paranoid - I work in information security," reader hab136 points out some potential vulnerabilities in the system as described.)

As to the actual methods of annoyance, jpellino writes

Upside down is cute, but blurry is just too fantastic. You know they were on the horn to the vendor after punching every monitor control and several loud screaming matches and an expensive service call for a monitor that then worked just fine on the bench... As a webmaster I can now say April 1 just got very far away...

Reader Sloppy also admires the "blurry-net" approach ("That's subtle and I love it"), but suggests that image manipulation is only for starters

The next step is to spy on them and see what websites they visit, and then insert some fake content one day. For example, if they use it to read CNN, insert a casual story about a nuclear weapon getting used in the Middle-East or South Asia, or a story about the president of USA selecting a new vice-president due to the assassination last week ("What?! I didn't hear about that!"), or the CDC in Atlanta is investigating the recent rash of improbable claims about the dead returning to life to feast on the flesh of the living, etc. If they visit Slashdot, then the jig is probably up, but maybe it would be great to have a story where a security study found Windows98 to kick OpenBSD's ass and then a bunch of comments where everyone agrees that the findings pretty much match their own experience, along with complains about "how is this news for nerds?!"

And perhaps the ultimate in annoyance-as-warning, reader Midnight Thunder writes

I suppose you could also add a frame to every page and then sell advertising space. Since you probably know a bit about your neighbour it is much easier make targeted advertising. Of course you could always make the top frame read:

"This is borrowed bandwidth. Have you thought about getting your own connection."

Oh and make sure it is flashing. Actually you could make it so that the whole content flash.

Not all uninvited users are actually unwanted users, though, at least for some readers. Reader Elektroschock writes

Sorry, I am a supporter of open networks. I think the freifunk olsr-protocol approach of open wireless networks is best. We don't need internet providers and we don't need internet providers which leak our communication data to the governments and endanger the freedom of the net. The net should be a net and wireless technology is great for the creation of a real P2P internet.

I cannot support any action against people who use your network. It is against my understanding of hacker ethics. When you don't like it then close your network. But no childish games please.

I may even say that I find it unethical to exclude your neighbours from using your network but I respect your opinions. When your network is open it means: Be free to use it. Not: You can use it but I will fuck up or intercept your communication.

Similarly, trewornan writes

I chose to leave my wireless network open so that if someone nearby needed a connection it would be available for them. If someone was to impose an unreasonable load on the network I might do something about it but so far (12 months) I've had about half a dozen people connect and download relatively small amounts of data - my guess is they were checking email. Why would I object to that? No . . . why would *you* object to that? The way I see it it's a chance to do something nice for other people, why not get yourself some good karma.

Even without that sort of altruism, many readers feel that, as geekoid puts it,

[By]leaving it open he is inviting other people to connect.

Some computer says to the router "Hey, can I come in?" and the router says "Sure." Now, the moment you put something up, like needing a password, then you are no longer inviting people in.

  • Computer says "Hey, can I come in" router says "Sure, if you know the password."
  • Or you can encrypt it; Computer says "Hey, can I come in?" the router says "KE*jd7638JDEJE*834899(&^&#nd&#&bd*e#"
Not so fast, goes an argument exemplified in another comment from R2.0:

Yes, the computer is "asking" the router "permission," and the router is "granting permission" — the only problem is, the words we use to describe these actions may appear to be descriptive of thinking and volition, but they really mean neither. Computers and routers simply CANNOT give "permission" in any legal or moral sense.

To use the yard analogy that seems to be popular for these threads, lets supposed your neighbor's massively retarded child asks your massively retarded child for permission for his Daddy to use your yard, and your child agrees. Neighbor then comes over and stages a cookout on your lawn, or for that matter just walks across it.

When you confront him, he says "But my kid asked your kid, and he said yes." This is binding? Common sense and the law would say no, yet you would allow devices with an order of magnitude less analytical power than a retarded child to give and receive similar permissions.

Repeat after me folks: devices cannot give and receive permission for human actions without those permissions expressly being granted via some other means.

A traffic light doesn't give you permission to cross the street; the government (that you studied to get your license) gives you permission to cross the intersection when a light is green, and denies it when red.

Your ID badge doesn't ask permission to enter your building, and the security system doesn't grant permission; YOU ask for permission by presenting the badge, and your employer grants it by programming said system to accept your request.

Closer to the typical small-time network admin, perhaps, bennomatic writes

If I leave my bike outside unlocked for 10 minutes, am I giving explicit permission to anyone who sees it that they can take it? No. Am I allowing it to happen through negligence? Sure, but call it what it is; it's still stealing, or at least trespassing.

Even something as amorphous as bandwidth is a limited resource. To paraphrase the head of the commerce committee, an open wireless connection is not a dump truck you can just load up with as much as you like; it's a tube!

Various forms of the same disagreement surfaced in various corners of the discussion: squiggleslash, for instance, writes

[I]t makes sense that no implied permission is given by simply having your router be unsecured, given "unsecured" is the default configuration of most off-the-shelf routers.)

It really isn't an issue in practice. If you want to use someone else's network, all you have to do is ask them. With 802.11, you're close enough to be able to do so. There's no reason not to ask, other than knowing that "No" is likely to be the answer. And I think that's why people tell themselves the myth that somehow they have implied permission simply because the "door" was left unlocked.

The figurative "visibility" of an open wireless network also isn't enough to convince reader R2.0 that it's fair game for passers by. He writes:

So the router is "visible," with an option to make it invisible. Big deal. My garden is visible from the street, but I can put a tarp around it to obscure its existence. What you are saying is that, unless I put a tarp up around my garden, everyone has a right to use it.

Wireless networks may make themselves conspicuous, but that does not confer an invitation to use them. The connection between "visible" and "inviting" is not legally or morally valid. (I am excepting the concept of "attractive nuisance," but I don't think open routers will come under that area of liability)

Reader 4e617474 fired the next volley in this battle of analogies:

No, actually we're saying that if your garden pelts us with carrots and peas as we walk past on the public street, we're at liberty to catch them and consume them. Only if you place anti-vegetable-flight netting around your garden (or stop planting vegetables that lend themselves to comparison to an unsecured WAP) does it become incumbent upon us to behave as good citizens.

Hey! Analogies are fun! Somebody compare Internet privacy law to hunting and fishing licenses!

Readers like ShawnDoc make a case persuasive for discouraging bandwidth borrowing on the basis of enlightened self-interest.

If someone uses your connection for illegal activity (downloading Meet the Fockers, kiddie porn) it will be your IP address that the RIAA/MPAA/FBI will trace. Good luck convincing them it wasn't you. You might be able to do it, but it will take up time and money (lawyers) to clear your name. And in the case of kiddie porn or other criminal act, expect every computer, PDA, and cell phone in your home to be confiscated to be analyzed for incriminating data. The second problem is you are allowing strangers access to not only your Internet connection, but also your LAN. I have multiple computers and put files in shared folders so I can access them from different machines. I don't want some strange to have access to those files, or worse, have their computer be infected with a worm/virus that propagates across the network.


Thanks to all the readers whose comments informed this conversation, and in particular to those whose comments are quoted above.

This discussion has been archived. No new comments can be posted.

Inverting Images for Uninvited Users

Comments Filter:
  • Re:Analogies Broken (Score:3, Interesting)

    by aussersterne (212916) on Friday July 28, 2006 @03:52PM (#15801443) Homepage
    This is exactly the point that so many "property analogies" miss. If it is in the air I breathe when I am not on your property, then it is mine, period, until the day on which airspace itself becomes private property. Until then, whether you encrypt your signal or not, YOU are FORCING it upon ME even when I am standing across the street. You lose all property rights to it the moment it leaves your property.

    For those who use the bike analogy (if I leave my bike in a public place unlocked, does that make it yours?) well, no. But if you toss your bike into my yard, as far as I'm concerned it does. And if you toss your bike into my yard without my permission and six weeks later you come around to collect it after I've already bought a lock and have been riding it to work, I'm going to fight you all the way to say that your tossing the bike into my yard and then forgetting about it for weeks was your express method for disposing of it (i.e. giving it to me without compensation).

    If you're going to claim that a signal is your property, you'd better to something to ensure that you're not forcing it upon everyone else OFF of your property. Or to create my own analogy, can I record a record, play it out my window in the direction of your house, and then sue you for piracy since you listened to it without ever buying a copy?
  • by LiquidCoooled (634315) on Friday July 28, 2006 @04:09PM (#15801567) Homepage Journal
    Thats where you are wrong, the infrastructure for major international corporations would still need to exist (like google etc are just going to roll over and give up).
    There will still be high bandwidth international pipes around just like we currently do.
    The only difference is that businesses with a vested interest in your custom will be the ones supplying the core bandwidth.

    Once the mesh takes off, home users shouldn't need a specific ISP anymore.
  • by mcrbids (148650) on Friday July 28, 2006 @05:16PM (#15802081) Journal
    The thing is, in that P2P fantasy world where everyone shares their connection and gives back to the community and there are no evil corporations charging us monthly fees, major latency would be the norm and the internet would become much more regionalised than it is now. Online gaming, for example, would all but die, surviving only in tightnit local groups.

    The march of technology makes the cost of providing N bandwidth drop every year, following a near exponential curve. Following this trend, it's easy to see how the cost of providing bandwidth drops to the point where individuals can afford to provide quality connections that now cost thousands.

    Perhaps you don't remember the day when a 128k connection cost $1,000 per month or more? Now, such bandwidth is available for under $20/month in many contexts.

    That P4 under your desk probably has more comptational power than existed worldwide in 1980. Certainly true for 1970. Yet, you can replace the Mobo and chip for less than a day's wages. [pricewatch.com]

    Why is it unrealistic to think that long-range, cheap, P2P broadband isn't possible, yet alone likely, in just a few more decades?

The first Rotarian was the first man to call John the Baptist "Jack." -- H.L. Mencken

Working...