Comment Re:Don't wait for Google policy. (Score 1) 157
Sometimes it's not necessarily what you're communicating to a server that is interesting, but which servers you are communiating with!!
Sometimes it's not necessarily what you're communicating to a server that is interesting, but which servers you are communiating with!!
I happen to be typing this from a Dutch Hotel.
This particular one has free wireless, and there is no way to identify a particular system accessing the net to a room. In fact, without staying here I could still probably sit in the car park or hotel lobby and access the internet from there. There's even a PC in the lobby with anonymous access from it.
Granted it does use a "Hotspot" login page (just need to check a checkbox and click login), so I suppose that could be modified to have someone provide a room number or PIN etc...
Changing the way things work though will invariably be a pain though, especially if you need to access the Internet over the weekends and the authentication system breaks down or something else goes wrong... (as seems to be quite common with the systems in many hotels). Reception tend to look at you with rather blank faces when this happens, and it usually isn't fixed until a weekday.
Leave the university and do a "code rewrite", as long as they can't prove you copy and pasted the work that you did under their employment, they have little legal standing and unless this is a real programming gem I doubt they will send the lawyers after you... just look at what happenned to SCO.
Ditto
Or maybe just one person logged onto each of the un-encrypted ones and turned on the encryption.
I remember I had some issues in my old apartment (too many wifi's around me and mine seemed to have trouble getting a channel), I logged onto each of the unprotected routers and reduced their transmit power until I couldn't find them anymore.
"I've seen it. It's rubbish." -- Marvin the Paranoid Android