Ethics/legality of using other people's wireless networks

GEC: Discuss gaming, computers and electronics and venture into the bizarre world of STGODs.

Moderator: Thanas

User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Vendetta wrote:
Uraniun235 wrote:What does "without authorization" mean? Does it mean that I have to get explicit permission from the owner to access his network? Why doesn't that also apply to websites, then?
Funnily enough, yes, it means that you must be explicitly authorised by the owner of that network. If you access a privately owned wireless network without permission, you are committing a crime.

Websites are different because they are placed on an open network, which is not privately owned that we call the "Internet".

If you access parts of a webserver that are not presented by the website, you could still be criminally liable.
This is where I think the law is wrong. They're both network resources, and authorization is implied by the fact that the router granted your honest request for access to network resources.

Also, define "presented by the website". If someone neglects to set up an index page, and instead I get an auto-generated file list (Example) are you saying it's a crime to access resources presented in that fashion?
User avatar
Flagg
CUNTS FOR EYES!
Posts: 12797
Joined: 2005-06-09 09:56pm
Location: Hell. In The Room Right Next to Reagan. He's Fucking Bonzo. No, wait... Bonzo's fucking HIM.

Post by Flagg »

Uraniun235 wrote:
Flagg wrote:You say that a physical comparison isn't apt here, but I disagree.
"I'm only interested in advancing my own moral position so I'm going to intentionally use an inferior analogy to argue my case."
Is it inferior because it doesn't fit the parameters, or because it makes you look like a theft approving retard?
That's some good arguing there, chief. Why don't you try attacking the analogy I've advanced before trying to hinge your argument on yet another godawful analogy with physical objects which generally doesn't apply to computing?
Because it's practically the same analogy you dimwit. Mine just makes the illegal act alot clearer. According to you, if no barrier or security is put in place, then you have free rein. I say you're full of shit, and the example I used proves it.
What's next, a retarded car analogy?
Bend over and I'll jam a steering wheel up your ass.
Ladies and gentleman, I give you a retarded car.
What you described is basically finding your neighbors apartment door wide open, taking an extension cord from your apartment, and hooking it up to one of his outlets in order to run some of you appliances.
US residential internet providers charge a per-month fee for access, and for the most part there are no additional fees levied for however much bandwidth you choose to use. Hence, if I go on vacation for a month, I still get billed the same as if I'd stayed at home and maxed out the connection with Yugoslavian pornography the whole time.
For the most part. And so what if it doesn't financially harm the person you are stealing from? It's still theft, and it's still wrong.
This is distinctly disanalogous to physical public utilities like electricity or water, in which the rates are assessed by the amount of usage. Hence, where tapping into someone else's water or electric system could incur significant additional costs to that person, tapping into someone else's internet connection is unlikely to incur additional costs in the US.

Try again.
But that's not always the case, and you admit that fact. But I guess that if 99 times out of 100 it doesn;t hurt anyone, it must be OK. :wanker:
It's stealing, pure and simple.
Just like we're stealing Mike Wong's bandwidth whenever we access SDN without asking for his permission?
Mike Wong invited us here. But if you can't even make that basic distinction then you're not just a fucking dirtbag apologist for thieves, you're a mentally retarded fucking dirtbag apologist for theives.
We pissing our pants yet?
-Negan

You got your shittin' pants on? Because you’re about to
Shit. Your. Pants!
-Negan

He who can,
does; he who cannot, teaches.
-George Bernard Shaw
User avatar
Glocksman
Emperor's Hand
Posts: 7233
Joined: 2002-09-03 06:43pm
Location: Mr. Five by Five

Post by Glocksman »

IANAL, but I believe that legal authorization or permission must come from the owner of the hardware, not a router that's left unsecured through the owner's ignorance.
Leaving the network unsecured through ignorance is no more 'authorization' to use the network than leaving my bicycle unlocked at a mall is 'authorization' for some asshole to steal it.
If the owner doesn't explictly authorize you to access their network, you aren't legal even if the hardware itself 'authorizes' you because it was left unsecured.
Hence, if I go on vacation for a month, I still get billed the same as if I'd stayed at home and maxed out the connection with Yugoslavian pornography the whole time.
Speaking of porn, having kiddie porn downloads traced back to your IP is one damn good reason to secure your WiFi network.
It'd suck to have the FBI hauling you away in handcuffs because your perv neighbor didn't want it traced back to him.
Last edited by Glocksman on 2006-04-16 03:05pm, edited 2 times in total.
"You say that it is your custom to burn widows. Very well. We also have a custom: when men burn a woman alive, we tie a rope around their necks and we hang them. Build your funeral pyre; beside it, my carpenters will build a gallows. You may follow your custom. And then we will follow ours."- General Sir Charles Napier

Oderint dum metuant
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Flagg wrote:Is it inferior because it doesn't fit the parameters, or because it makes you look like a theft approving retard?
It's inferior because it does not model the situation at hand as closely as mine does. It also doesn't help your case that you didn't even attempt to address my analogy before presenting your own.

But thanks for playing!
Because it's practically the same analogy you dimwit. Mine just makes the illegal act alot clearer. According to you, if no barrier or security is put in place, then you have free rein. I say you're full of shit, and the example I used proves it.
No, it doesn't, because computer networks are not analogous to a house, especially not networks which are broadcasting signals into my own house. When will people learn that physical analogies are horribly imprecise at best and inapplicable at worst?
But that's not always the case, and you admit that fact. But I guess that if 99 times out of 100 it doesn;t hurt anyone, it must be OK.
I guess if something is ever harmful that must mean it's always wrong to do it, circumstances be damned. Absolutism for the win!
Mike Wong invited us here.
Really? I didn't get an email invite to come check out his awesome STvSW website. :( Does that make me a bandwidth thief? :(

What about other websites?
But if you can't even make that basic distinction then you're not just a fucking dirtbag apologist for thieves, you're a mentally retarded fucking dirtbag apologist for theives.
Oh no! Not an apologist! Don't call me that, please! Surely I could never withstand that deadliest of insults!
Last edited by Uraniun235 on 2006-04-16 03:07pm, edited 2 times in total.
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Glocksman wrote:IANAL, but I believe that legal authorization or permission must come from the owner of the hardware, not a router that's left unsecured through the owner's ignorance.
Leaving the network unsecured through ignorance is no more 'authorization' to use the network than leaving my bicycle unlocked at a mall is 'authorization' for some asshole to steal it.
If the owner doesn't explictly authorize you to access their network, you aren't legal even if the hardware itself 'authorizes' you because it was left unsecured.
In North Carolina that would seem to be an interpretation of the law by lawyers who are probably not well-versed in how computer networking works. I'm not disputing that it would be considered illegal but I do dispute the interpretation which they used to come to that conclusion.
User avatar
Flagg
CUNTS FOR EYES!
Posts: 12797
Joined: 2005-06-09 09:56pm
Location: Hell. In The Room Right Next to Reagan. He's Fucking Bonzo. No, wait... Bonzo's fucking HIM.

Post by Flagg »

Uraniun235 wrote:
Flagg wrote:Is it inferior because it doesn't fit the parameters, or because it makes you look like a theft approving retard?
It's inferior because it does not model the situation at hand as closely as mine does. It also doesn't help your case that you didn't even attempt to address my analogy before presenting your own.

But thanks for playing!
Read the bolded section, dicksnot:
Because it's practically the same analogy you dimwit. Mine just makes the illegal act alot clearer. According to you, if no barrier or security is put in place, then you have free rein. I say you're full of shit, and the example I used proves it.
That's your entire argument, you fucking twit.
No, it doesn't, because computer networks are not analogous to a house, especially not networks which are broadcasting signals into my own house. When will people learn that physical analogies are horribly imprecise at best and inapplicable at worst?
Seems pretty accurate to me. Just makes you look like an asshole.
But that's not always the case, and you admit that fact. But I guess that if 99 times out of 100 it doesn;t hurt anyone, it must be OK.
I guess if something is ever harmful that must mean it's always wrong to do it, circumstances be damned. Absolutism for the win!
1) It's wrong wether you are going to hurt someone or not because you are essentially taking something that doesn't belong to you.
2) You make the assumption that the person you are stealing from doesn't have a set per month bandwidth limit, when it's certainly possible that they do, and if they do, you're causing them financial harm.
Mike Wong invited us here.
Really? I didn't get an email invite to come check out his awesome STvSW website. :(

What about other websites?
It's an open invitation because it's a public website intended to be viewed, you dishonest little cunt.
We pissing our pants yet?
-Negan

You got your shittin' pants on? Because you’re about to
Shit. Your. Pants!
-Negan

He who can,
does; he who cannot, teaches.
-George Bernard Shaw
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

That's your entire argument, you fucking twit.
No, you apparently don't understand how computer networking works, because it is not at all analogous to "hurr hurr i left my door open".

A closer physical analogy would be a guy standing watch at the front door. If the network is secured, he'll ask you for a password or some ID before he'll let you into the house. If the network is unsecured, he'll open the door for you regardless of who you might be.
1) It's wrong wether you are going to hurt someone or not because you are essentially taking something that doesn't belong to you.
What 'thing' would that be? There's no physical object which is being removed.
2) You make the assumption that the person you are stealing from doesn't have a set per month bandwidth limit, when it's certainly possible that they do, and if they do, you're causing them financial harm.
Web servers can have bandwidth limits, too.
It's an open invitation because it's a public website intended to be viewed, you dishonest little cunt.
Oh no! Not a cunt! I'd never want to be one of those. I hear they bleed a lot. :(

How do I know the wireless network I'm picking up isn't intended to be accessed? Why are you advocating a lack of responsibility on the part of the network administrator? On what basis do you assert that acceptable use is dependent on an invitation?
User avatar
Glocksman
Emperor's Hand
Posts: 7233
Joined: 2002-09-03 06:43pm
Location: Mr. Five by Five

Post by Glocksman »

Uraniun235 wrote:
Glocksman wrote:IANAL, but I believe that legal authorization or permission must come from the owner of the hardware, not a router that's left unsecured through the owner's ignorance.
Leaving the network unsecured through ignorance is no more 'authorization' to use the network than leaving my bicycle unlocked at a mall is 'authorization' for some asshole to steal it.
If the owner doesn't explictly authorize you to access their network, you aren't legal even if the hardware itself 'authorizes' you because it was left unsecured.
In North Carolina that would seem to be an interpretation of the law by lawyers who are probably not well-versed in how computer networking works. I'm not disputing that it would be considered illegal but I do dispute the interpretation which they used to come to that conclusion.
Well, the lawmakers' interpretation *is* the one the that counts in court.
You can haul out your CS class networking textbooks and pound on the definition of 'authorization' in a networking sense all that you want, but it doesn't mean a thing to a Judge.
Besides, the law as interpreted doesn't prohibit you from sharing your neighbor's wireless connection, it just makes you get their explict permission to do so instead of assuming that you have it simply because they forgot (or don't know how) to enable security.
"You say that it is your custom to burn widows. Very well. We also have a custom: when men burn a woman alive, we tie a rope around their necks and we hang them. Build your funeral pyre; beside it, my carpenters will build a gallows. You may follow your custom. And then we will follow ours."- General Sir Charles Napier

Oderint dum metuant
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

I realize that. Don't get me wrong; I'll neither have cause to, nor would I wish to try that argument in court.
User avatar
Flagg
CUNTS FOR EYES!
Posts: 12797
Joined: 2005-06-09 09:56pm
Location: Hell. In The Room Right Next to Reagan. He's Fucking Bonzo. No, wait... Bonzo's fucking HIM.

Post by Flagg »

Uraniun235 wrote:
That's your entire argument, you fucking twit.
No, you apparently don't understand how computer networking works, because it is not at all analogous to "hurr hurr i left my door open".

A closer physical analogy would be a guy standing watch at the front door. If the network is secured, he'll ask you for a password or some ID before he'll let you into the house. If the network is unsecured, he'll open the door for you regardless of who you might be.
You mean, some kind of barrier?
1) It's wrong wether you are going to hurt someone or not because you are essentially taking something that doesn't belong to you.
What 'thing' would that be? There's no physical object which is being removed.
You are using a service that someone else paid for without obtaining permission from that person. That's theft. Or is stealing cable OK with you too?
2) You make the assumption that the person you are stealing from doesn't have a set per month bandwidth limit, when it's certainly possible that they do, and if they do, you're causing them financial harm.
Web servers can have bandwidth limits, too.
Which is completely beside the point because web sites hosted on the servers are there to be viewed, dipshit.
It's an open invitation because it's a public website intended to be viewed, you dishonest little cunt.
Oh no! Not a cunt! I'd never want to be one of those. I hear they bleed a lot. :(
Calling you a cunt was obviousely out of line. After all, cunts are useful.
How do I know the wireless network I'm picking up isn't intended to be accessed?
Well sure, that's a way you can try to justify theft.
Why are you advocating a lack of responsibility on the part of the network administrator?
Nice strawman you got there. And another lame brained attempt at justification for the immoral and probably illegal activity you're advocating.
I never advocated irresponsibility, in fact I called a network administrator that "leaves the door open" an idiot. Of course what you are advocating is taking advantage of someones ignorance, stupidity, and/or niavete. You're no better than some piece of shit con artist that goes around bilking 70 year olds.
On what basis do you assert that acceptable use is dependent on an invitation?
On the basis that you don't use other peoples things without their permission, however easy it may be to access them.
We pissing our pants yet?
-Negan

You got your shittin' pants on? Because you’re about to
Shit. Your. Pants!
-Negan

He who can,
does; he who cannot, teaches.
-George Bernard Shaw
User avatar
Lord MJ
Jedi Council Member
Posts: 1562
Joined: 2002-07-07 07:40pm
Contact:

Post by Lord MJ »

How do you counter the argument of "The signals are entering MY HOUSE therefore I can use them?"
User avatar
Stark
Emperor's Hand
Posts: 36169
Joined: 2002-07-03 09:56pm
Location: Brisbane, Australia

Post by Stark »

Her signals are entering their router? That's the worst logic ever. Does she own other people's mobile transmissions too? Fucking dumb bitch.
User avatar
Lord MJ
Jedi Council Member
Posts: 1562
Joined: 2002-07-07 07:40pm
Contact:

Post by Lord MJ »

Stark wrote:Her signals are entering their router? That's the worst logic ever. Does she own other people's mobile transmissions too? Fucking dumb bitch.
Playing Devil's advocate using both her knowledge as a lawyer to be, and my knowledge as a Computer Scientist.

Mobile transmissions are not readily accessible even if they enter your house, and hacking into phone traffic to eavesdrop is already illegal under other laws.

However an unsecured wireless network is accessible, and if its wide open so that the public can get to it, there is no problem accessing the open network espescially since the signals are entering her house.

Fortunately, the NC law seems to be enough, even though she would probably argue that she isn't commiting unauthorized access to a computer network she's simply accessing the internet via an open network.
User avatar
Flagg
CUNTS FOR EYES!
Posts: 12797
Joined: 2005-06-09 09:56pm
Location: Hell. In The Room Right Next to Reagan. He's Fucking Bonzo. No, wait... Bonzo's fucking HIM.

Post by Flagg »

Lord MJ wrote:How do you counter the argument of "The signals are entering MY HOUSE therefore I can use them?"
The same way you would counter the argument that descrambling a cable TV signal that enters your house is fine because the outlet is on your property.
We pissing our pants yet?
-Negan

You got your shittin' pants on? Because you’re about to
Shit. Your. Pants!
-Negan

He who can,
does; he who cannot, teaches.
-George Bernard Shaw
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

You mean, some kind of barrier?
A doorman who lets anyone in isn't much of a barrier, is he?

But yeah, fine, we'll say that it's dependent on there being a barrier, are you happy?
You are using a service that someone else paid for without obtaining permission from that person. That's theft.
The router (doorman) says I have permission.
Which is completely beside the point because web sites hosted on the servers are there to be viewed, dipshit.
That's what the router (doorman) says, too.
Calling you a cunt was obviousely out of line. After all, cunts are useful.
you're hurting my feelings :(
Nice strawman you got there. And another lame brained attempt at justification for the immoral and probably illegal activity you're advocating.
I never advocated irresponsibility, in fact I called a network administrator that "leaves the door open" an idiot. Of course what you are advocating is taking advantage of someones ignorance, stupidity, and/or niavete. You're no better than some piece of shit con artist that goes around bilking 70 year olds.
Right, doing something that may never have a noticeable impact is equivalent to scamming elderly people out of their life savings. You sure are riled up about this aren't you?

The whole thrust of my argument is that if the router allows access then I must be authorized. It's up to the administrator to set up a barrier of some kind, even the most basic and simple one (i.e. requiring a password) so that people who attempt to connect to a wireless network can know that it is not a public network.

And I personally see nothing inherently wrong with profiting off of stupidity.
On the basis that you don't use other peoples things without their permission, however easy it may be to access them.
But the router says I have permission. Image



The real point of contention here is that you're taking the stance that a network is like an extension of someone's physical property, and that connecting to that network is equivalent to walking into their house. I disagree completely, as nobody is ever "on" or "in" anywhere; it's all just communication between computers.

And technically, I'm pretty sure using someone else's internet connection would probably constitute 'piracy', not 'theft'.

Furthermore, my argument isn't specifically in support of using other people's internet connections, it's in support of the notion that connecting to someone else's wireless connection is not necessarily wrong. If I really wanted to piss you off I'd try arguing that my ability to access the internet due to your incompetent administration makes the violation of your TOS with the provider your fault, but I don't even believe in that.
Stark wrote:Her signals are entering their router? That's the worst logic ever. Does she own other people's mobile transmissions too? Fucking dumb bitch.
She doesn't own them, but she does have a right to set up a scanner and listen to whatever signals enter her home.

Privacy? That's what encryption's for.
The same way you would counter the argument that descrambling a cable TV signal that enters your house is fine because the outlet is on your property.
Cable TV signals are, last I heard, encrypted such that you normally must decrypt by means which the cable provider gives you. As such, while listening to encrypted signals would be OK in my book (yeah I'm sure the cable company would be real upset with someone watching a bunch of garbled crap on their screen), breaking that encryption for personal gain would not.

Alternatively, if you take the view that the coaxial cable running to your property is actually the property of the cable company, then connecting to that cable without authorization could probably be considered wrong.
User avatar
Hyperion
Village Idiot
Posts: 1648
Joined: 2002-10-06 03:51am
Location: A Dying Nation
Contact:

Post by Hyperion »

To start with, it's my understanding that in the law as long as you are not breaking into a secured WiFi system (EG: WEP or WAP encrypted), then it is legal.

Personally, I have no moral issues with jacking into someone's WiFi if they're too stupid to implement security measures. I do so all the time, but I mostly use it for mapping/navigation purposes when I'm out on the road for a service call. (Get lost, whip out the laptop and fire up netstumbler, find an AP, jack in, hit google maps, check email for directions, etc. get directions, turn off laptop, keep on going.)

I do have issues with people who deliberately jack into other people's WiFi just to avoid paying for their internet, or to simply abuse the heck out of it with downloading to avoid getting their own connection shut off. In my own apartment we had this issue because our AP was acting up, so one of my roomates was jacking into the neighbor's WiFi and abusing it with BitTorrent to the point that we think that person's DSL line was shut off for overage on bandwidth. That isn't ok, and we did remedy the problem by replacing our AP and router. Though all 3 of us jack into that AP when our Comcast line drops, which is pretty often, the neighbor has Qwest DSL, and that's pretty much always up.

Basically here's what I think of jacking into someone else's WiFi: If you're not at home and need temporary access and the AP is not secured, go for it, don't abuse it, but feel free to use it for normal stuff, not downloading. If it's secure, leave it alone.
"Freak on a leash! Freak on a leash!"
User avatar
Perseid
Padawan Learner
Posts: 357
Joined: 2005-03-10 09:10am
Location: Somewhere between Here and There

Post by Perseid »

I think the point is that a WiFi AP is on someones private network, and in order to access the Internet via that AP then you are accessing that persons private network (regardless of if it's secured or not). As a result it would be illegal to access an unsecured router for Internet access unless you have the permission of the person that owns the AP.

I've had some experience with this myself, my parents had an unsecure AP for some tenants in the flats they own, because some asshole decided to start accessing from across the road they asked me to lock it up.

OT this is an ideal situation for making a bit of cash on the side, since you know how to secure the persons AP offer to lock it down for them for a nice cheap price.
Image
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

SOrry for the delay in getting my sources, but ArsTechnica reports that a man in Illinois was fined $250 and a man was convicted of a third-degree felony in Florida last year.
User avatar
Stark
Emperor's Hand
Posts: 36169
Joined: 2002-07-03 09:56pm
Location: Brisbane, Australia

Post by Stark »

Lord MJ wrote:Playing Devil's advocate using both her knowledge as a lawyer to be, and my knowledge as a Computer Scientist.

Mobile transmissions are not readily accessible even if they enter your house, and hacking into phone traffic to eavesdrop is already illegal under other laws.

However an unsecured wireless network is accessible, and if its wide open so that the public can get to it, there is no problem accessing the open network espescially since the signals are entering her house.

Fortunately, the NC law seems to be enough, even though she would probably argue that she isn't commiting unauthorized access to a computer network she's simply accessing the internet via an open network.
Wah wah wah it's okay to steal. Fuck you and your pathetic stingy friend. I mean, it's already illegal: your arguments are like saying it's okay to steal someones bike, because there's no authorisation involved :roll:

And sorry, if you had a mobile reception soft, the user wouldn't have to 'do' anything to eavesdrop on private communication. Still illegal! Someone using a wireless soft is infact decrypting private communication - the US uses laughable mobile encryption, and regular wireless is hardly sent in a form you can intercept with a fucking crystal set. By pointing your wireless networking at someone elses stuff, you're intentionally using the paid resources of other people. It's one thing to accidentally attach to someone elses' network... it's quite another for your disgustingly pathetic 'friend' (who isn't you, lol) to do it intentionally and with forethought.
User avatar
Pu-239
Sith Marauder
Posts: 4727
Joined: 2002-10-21 08:44am
Location: Fake Virginia

Post by Pu-239 »

Er, again, keep in mind that broadband in the US is usually flat-rate. Of course, you're still cheating the ISP, but I'll guess a significant % of those so venomous about internet freeloaders use P2P networks themselves (like it or not, people feel less bad about sticking the bill to a large corp instead of an individual - not defending it or anything, and ignoring legalities).

Anyway, personally I pay for my own cable, but I'll occasionally hop over when mine goes down (which is pretty frequent- called the cable company (which has a monopoly on broadband in the area) over to fix it, they didn't and also decided to leave me w/ a bill, so fuck them (well, not really, since I'm at their mercy)).

ah.....the path to happiness is revision of dreams and not fulfillment... -SWPIGWANG
Sufficient Googling is indistinguishable from knowledge -somebody
Anything worth the cost of a missile, which can be located on the battlefield, will be shot at with missiles. If the US military is involved, then things, which are not worth the cost if a missile will also be shot at with missiles. -Sea Skimmer


George Bush makes freedom sound like a giant robot that breaks down a lot. -Darth Raptor
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Someone using a wireless soft is infact decrypting private communication - the US uses laughable mobile encryption, and regular wireless is hardly sent in a form you can intercept with a fucking crystal set. By pointing your wireless networking at someone elses stuff, you're intentionally using the paid resources of other people.
So... wait, how does the illegality and the immorality of breaking the encryption on cell phone conversations support your contention of the illegality and immorality of connecting to an unencrypted wireless network?
User avatar
Perseid
Padawan Learner
Posts: 357
Joined: 2005-03-10 09:10am
Location: Somewhere between Here and There

Post by Perseid »

Uraniun235 wrote:
Someone using a wireless soft is infact decrypting private communication - the US uses laughable mobile encryption, and regular wireless is hardly sent in a form you can intercept with a fucking crystal set. By pointing your wireless networking at someone elses stuff, you're intentionally using the paid resources of other people.
So... wait, how does the illegality and the immorality of breaking the encryption on cell phone conversations support your contention of the illegality and immorality of connecting to an unencrypted wireless network?
Beacause your accessing the Internet via a connection that someone else has paid for without their permission, just because they haven't secured their WiFi (whether through ignorance or stupidity) doesn't mean it's ok to go accessing it.
For example if you found someones cell phone in the corridor of your appartment block and you knew whose phone it was would you use it or would you hand it back to them?
Knowingly accessing someone elses WiFi without permission is still stealing, even if they are charged a flat rate and have no usage limits.
Image
User avatar
LordShaithis
Redshirt
Posts: 3179
Joined: 2002-07-08 11:02am
Location: Michigan

Post by LordShaithis »

What the fuck is with all these theft analogies? For simplicity's sake, let's say the network has two possible states.

A) Let in everyone who feels like it.
B) Do not let in everyone who feels like it.

Is it really opening the door to blatant robbery just to state that if you leave your network set up to allow anyone who wants, then anyone who wants can get in? When you set up a device that broadcasts "Look, here's a network!" signals to my computer in my home, and have that device configured in such a way as to accept return signals, what the fuck do you have to complain about?
If Religion and Politics were characters on a soap opera, Religion would be the one that goes insane with jealousy over Politics' intimate relationship with Reality, and secretly murder Politics in the night, skin the corpse, and run around its apartment wearing the skin like a cape shouting "My votes now! All votes for me! Wheeee!" -- Lagmonster
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Mr CorSec wrote: Beacause your accessing the Internet via a connection that someone else has paid for without their permission, just because they haven't secured their WiFi (whether through ignorance or stupidity) doesn't mean it's ok to go accessing it.
For example if you found someones cell phone in the corridor of your appartment block and you knew whose phone it was would you use it or would you hand it back to them?
Knowingly accessing someone elses WiFi without permission is still stealing, even if they are charged a flat rate and have no usage limits.
There is no 'because' there; your points are completely irrelevant to my response.

Permission is implied by the fact that the router granted me access. It's how computer networking works. If my computer sends a signal asking for access, and the computer on the other end grants access, then I can only assume that I'm authorized to access those resources.

The same cannot be said for a cell phone that someone has left on the ground, because that cell phone thinks that I am the owner of the cell phone when I am not.

This situation is disanalogous to a computer network because unlike a network, only one person can use a cell phone at a time, and so the cell phone makes the reasonable assumption that whomever is using the cell phone is the owner or someone the owner has given permission to use; requiring authentication every time you wanted to use your cell phone would border on the paranoid. A wireless network on the other hand is designed to (if desired) provide access to network services to multiple people simultaneously.

Furthermore, technically my use of someone else's wireless network to access their internet connection is not stealing from them, but is in fact (probably - there are public wireless networks which exist and which provide internet access) a violation concerning the ISP. If I really wanted to piss people here off I'd take the stance that the person who ineptly set up their wireless network and unwittingly granted access to their internet connection was the one who should be held responsible for the violation of their Terms of Service, but there isn't a Image in the world big enough to adequately express the feeling I'd get from doing so, so I'm quite content to consider that anyone who used someone else's private wireless network for internet access is probably quite aware that said internet connection operates under the usual restrictions that a residential ISP does and that therefore the person who consciously did so is really the party responsible for the violation.

Furthermore, your statement, "Knowingly accessing someone elses WiFi without permission is still stealing," betrays your lack of knowledge on the subject. It is entirely possible to operate a wireless network which does not connect to the internet in any fashion, and as such there would be no service provider whose terms of service would be violated, and as such there could be no "theft of service". In fact, even with a wireless network connected to the internet, it would be entirely possible to access and browse the network without accessing the internet connection, and again no theft would take place.

Although I allowed myself to get carried away exploring the avenues of using someone else's wireless network for their internet connection, and while I will readily concede that doing so is probably wrong from the standpoint of the burden it places on the ISP, I remain convinced of my position that the mere act of connecting to and browsing an unsecured wireless network is not wrong.
LordShaithis wrote:Is it really opening the door to blatant robbery just to state that if you leave your network set up to allow anyone who wants, then anyone who wants can get in? When you set up a device that broadcasts "Look, here's a network!" signals to my computer in my home, and have that device configured in such a way as to accept return signals, what the fuck do you have to complain about?
But, but, but, it's like they're coming into your house! Do you want strangers in your house taking things and making it so you could never use those things again? How dare you suggest that computer networking is not totally analogous to physical objects! Image
User avatar
Alyeska
Federation Ambassador
Posts: 17496
Joined: 2002-08-11 07:28pm
Location: Montana, USA

Post by Alyeska »

Uranium, grow the fuck up. Your approaching this from a ME MOST IMPORTANT perspective and outright ignoring the realities of the situation.

BTW Flagg, Uranium once argued that unsecured wireless networks grant you explicit permission to alter any accesable files over the network and do whatever you want. Access was granted, therefore it is allowed.
"If the facts are on your side, pound on the facts. If the law is on your side, pound on the law. If neither is on your side, pound on the table."

"The captain claimed our people violated a 4,000 year old treaty forbidding us to develop hyperspace technology. Extermination of our planet was the consequence. The subject did not survive interrogation."
Post Reply