tired: securing your AP against freeloaders
wired: putting up a clickthrough captive portal that contains a few friendly house rules (please keep band area usage to less than a gigabyte per day, use Tor if you're doing something illegal, etc) and occasionally monitoring traffic metadata to make sure nothing terrible is happening

Follow

tired: using a hardened WPA2 Enterprise implementation to ensure that your network is not compromised
wired: using an outdated WEP implementation just to make sure that only other hackers get into your AP, and not just any rando out there with a phone

leaving a few dummy devices around that constantly drop, reconnect, and exchange traffic with the AP, just to make it easier to collect IVs

@freundTech yes thank you, no one has ever made this joke before, least of all in our mentions

Sign in to participate in the conversation
Cybrespace

cybrespace: the social hub of the information superhighway

jack in to the mastodon fediverse today and surf the dataflow through our cybrepunk, slightly glitchy web portal