Pelican Parts Forums

Pelican Parts Forums (http://forums.pelicanparts.com/)
-   Off Topic Discussions (http://forums.pelicanparts.com/off-topic-discussions/)
-   -   iPhone & WiFi - What Can "They" See? (http://forums.pelicanparts.com/off-topic-discussions/692110-iphone-wifi-what-can-they-see.html)

onewhippedpuppy 08-01-2012 11:40 AM

iPhone & WiFi - What Can "They" See?
 
Im aware of the concerns surrounding the transmitting of private data while on public wifi, as it's easy for hackers to steal your passwords, account numbers, etc. I'm curious about using a device like an iPhone on a public network, and how much data is transmitted by the phone while connected. For instance, can the network owner see private information such as phone number and the name assigned to the phone? It occurred to me as I was browsing the Internet in a restaurant with free wifi, how much could an unscrupulous network admin find out about me just by being connected?

GH85Carrera 08-01-2012 11:46 AM

That is a good question. It will be interesting to see any facts. I suspect you will hear from the tin foil hat group that "they" can see everything.

I find myself using the 3G service on my phone more than many free internet connections for any sensitive things. I figure AT&T has better security than a local sandwich shop. No doubt AT&T could see everything on my phone already.

Rick V 08-01-2012 12:19 PM

Just look at your phone by accessing your router (on another device) that should answer your question.
I name my devices strange things so that anybody looking at my on the wifi gets a real wtf.
For instance I am typing on the Porn-O-Matic-XL-7000 right now

onewhippedpuppy 08-01-2012 12:20 PM

Let's narrow down "they" to the network admin/resident IT guy. The real "they" gather data by black helicopter, everybody knows that!:D

pitargue 08-01-2012 12:29 PM

Should of went to defcon. (http://www.defcon.org/) One of my guys went. He now powers everything down on his cell phone and knows that his phone is not secure, especially in the arena of it being used by someone else to do things w/o your knowledge.

And this is the stuff that people are willing to talk about. There's so much more that is never discussed; true cutting edge stuff.

Z-man 08-01-2012 12:35 PM

Well, for starters, look at the log on your home wireless router. In the least, they can see that same information (websites visited per device IP).

Keep in mind that https:// websites only encrypt from the physical router out. So anything travelling in the air between your device and the router is theoretically accessable, unless you have some form of encryption between the device and the router (WEP or WPA, for example)

-Z

Rick V 08-01-2012 12:37 PM

Quote:

Originally Posted by Z-man (Post 6887860)
Well, for starters, look at the log on your home wireless router. In the least, they can see that same information (websites visited per device IP).

Yeah but when I say that it doesn't sound all official and stuffSmileWavy

mikester 08-01-2012 12:40 PM

If you're talking about your average IT admin - most couldn't figure out an SSID unless it was actually broadcasting the SSID name.

If you're talking about someone above average or exceptional then I wouldn't connect to any OPEN wifi - they are absolutely not secure on the local network and everyone within listening range can capture everything you do and see it in clear text.

If they are using a password to secure things then you want to make sure it is a WPA connection at the very least. If they use TKIP encryption then it is crackable but if they use AES you're better off and pretty secure.

WPA2 is better.

If it is WEP with a password it might as well be open.

From a wifi perspective the encryption is between the end station (your phone) and the router. The packets can still be captured but with the right encryption (AES) they are pretty safe. The keys are random and generated individually between the end station and the wifi access point or router.

If you want to talk about black hat stuff where some guy in the coffee shop has turned his laptop into an access point and he is catching everything including the key generation then you're screwed. He/She has it all and you can't really tell.

That's the reader's digest version. Let me know if you would like me to do more.

If you have a windows computer and spend any time at a starbucks or what not using their wifi - download netstumbler and just run it to see what is going on from a wifi perspective around you.

Heck, do it at your house to see how many of your neighbors are stupid. Then find the ones with open wifi networks - find their printers and print out some girls in bikinis for them.

red-beard 08-01-2012 01:08 PM

Quote:

Originally Posted by mikester (Post 6887871)
Heck, do it at your house to see how many of your neighbors are stupid. Then find the ones with open wifi networks - find their printers and print out some girls in bikinis for them.

I have enough trouble remembering to print things to the local printer instead of the office, when I'm at home.

onewhippedpuppy 08-01-2012 01:49 PM

So does a device like the iPhone transmit the device name, phone number, your name, or device SN?

masraum 08-01-2012 02:06 PM

Quote:

Keep in mind that https:// websites only encrypt from the physical router out. So anything travelling in the air between your device and the router is theoretically accessable
-Z
What?!? No, https connections are encrypted between your browser and the server. Wi-Fi routers don't have the horsepower to terminate a bunch of encrypted connections to the net.

mikester 08-01-2012 02:09 PM

Quote:

Originally Posted by masraum (Post 6888359)
What?!? No, https connections are encrypted between your browser and the server. Wi-Fi routers don't have the horsepower to terminate a bunch of encrypted connections to the net.

Good point - HTTPS Sessions should be secure assuming there is no man in the middle situation going on. Those are secure between the client browser and the website in question.

Assuming the cert is not compromised...

RWebb 08-01-2012 02:48 PM

it sounds like they could potentially grab enuff info to get into your machine and grab any info on it -- difficult? maybe easier if you go to the same coffeeshop all the time?

I have no idea whether they access you and then be able to see Uranus

krystar 08-01-2012 02:51 PM

Quote:

Originally Posted by onewhippedpuppy (Post 6888332)
So does a device like the iPhone transmit the device name, phone number, your name, or device SN?

that's what your itune cloud sync is doing. sending your music,videos,apps, and contacts to the apple cloud. device name is inconsequential...as it's just a superficial name. everything operates on MAC or IMEI.

WPA2 has been shown to be cracked in reasonable time.

if yer at defcon, yea turn everything off.

stealthn 08-01-2012 03:00 PM

Quote:

Originally Posted by krystar (Post 6888465)

WPA2 has been shown to be cracked in reasonable time.

Care to back that one up with facts?

Z-man 08-01-2012 03:05 PM

Quote:

Originally Posted by masraum (Post 6888359)
What?!? No, https connections are encrypted between your browser and the server. Wi-Fi routers don't have the horsepower to terminate a bunch of encrypted connections to the net.

OK - I was conveying something a network guy (who may not know it all) said...

That said, when the first handshake occurs between the https site and the end device, the encryption key is passed to the device. If a sniffer is there to capture the key, then it doesn't matter how secure the website is...

So - surfing Pelican on a public wifi - I will do. Banking or credit card transactions I won't.

-Z

scottmandue 08-01-2012 03:06 PM

I'm looking at your phone now and you are a very naught naughty boy!

onewhippedpuppy 08-01-2012 03:32 PM

Quote:

I'm looking at your phone now and you are a very naught naughty boy!
And I keep the good stuff on my home pc!:)

HardDrive 08-01-2012 05:39 PM

At minimum, the local wi-fi hot spot would have your MAC address. It could be used to prove that you were in the area. So make sure you don't dump the bodies there, mkay?

slodave 08-02-2012 01:01 AM

Quote:

Originally Posted by stealthn (Post 6888479)
Care to back that one up with facts?

It's not exactly WPA2 that's being cracked, but there's an exploit with WPS that can get you into WPA/WPA2 protected wifi systems.


All times are GMT -8. The time now is 02:22 PM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0
Copyright 2025 Pelican Parts, LLC - Posts may be archived for display on the Pelican Parts Website


DTO Garage Plus vBulletin Plugins by Drive Thru Online, Inc.