Edited for line length and anonymity, though the latter is probably
too late.
NOTE: TechCrunch is part of "Oath" [Along with AOL and a whole raft
of other sub-companies] and they have about a trillion tracker and
other data-vacuuming "partners". You may be required to sign away your
rights to privacy if you go onto the site. Or you could "manage your
options", which would take about a year and much carpal tunnel
syndrome, they don't make it easy to bulk-block their "partners". I'm
not entirely convinced the "manage options" thing *works* and if it
did I'm not convinced it is sticky without allowing Oath to load a
septilliard cookies ["biscuits" to those speaking Real English]. I
have turned off my acceptance of biscuits so I *can't* do the "manage"
thing. If I bump into Oath websites, I just skip them. My automatic
response set includes terse terms relate to babies and breaking stuff.
I do like jammy dodgers with tea, though. Some biscuits are nice.
Of course, they may only be asking permission of E.U. subjects so you
USAliens may not be shown the "consent" page. Aren't you *lucky*?
>>
>>There is actually nothing new here security wise.
>>
>>What is new is simply the manner of sniffing/scanning the targets
>>wireless access points.
>>
>>Instead of needing to park in the parking lot (and expose oneself to
>>being noticed) this simply ships a remotely controllable sniffer via a
>>package delivery service.
They load software onto your router? Isn't that *malware*, and
"computer misuse" and a tiny tad unlawful?
And preventable?
>>
>>But the wi-fi exploits, they are all old and well known. Nothing new
>>at all being done there.
As I'm never going to read the damnable article, thank you for your
concise summary. :) and {{{{{Hugs}}}}}
>
>That is true, just a different method,
>so do not use it.
If, and I stress the conditional, this is a risk to computers, should
you not be posting in "comp.risks"?
"sci.crypt" is about the *software* not the hardware nor the risks to
the software nor hacking tools. Well, not hacking tools in use, more
the theory and mathematics of cryptological tools in general. And, of
course, Adacrypt which is the class clown used as an eternal example
of what *never* to do or be.
"comp.risks" is a fun group and well worth adding to your list.
Mand.