tired: securing your AP against freeloaders
wired: putting up a clickthrough captive portal that contains a few friendly house rules (please keep band area usage to less than a gigabyte per day, use Tor if you're doing something illegal, etc) and occasionally monitoring traffic metadata to make sure nothing terrible is happening

tired: using a hardened WPA2 Enterprise implementation to ensure that your network is not compromised
wired: using an outdated WEP implementation just to make sure that only other hackers get into your AP, and not just any rando out there with a phone

Follow

leaving a few dummy devices around that constantly drop, reconnect, and exchange traffic with the AP, just to make it easier to collect IVs

Sign in to participate in the conversation
Cybrespace

cybrespace: the social hub of the information superhighway

jack in to the mastodon fediverse today and surf the dataflow through our cybrepunk, slightly glitchy web portal