ain't no party like an I.P party

Data that travels over the air and how to protect (or decipher) it

ain't no party like an I.P party

Post by pretentious on Thu Jan 23, 2014 6:54 am
([msg=79065]see ain't no party like an I.P party[/msg])

judge rules that in this case, ip address can't identify defendant. It's hard to do any research on my phone but I suppose a precident would make life interesting. "my wlan has range. u can't prove I downloaded the child porn!"

-- Thu Jan 23, 2014 11:03 pm --

http://boingboing.net/2014/01/22/fed-ju ... ore-281967 and the url is..
I should really look into that mobile app :D
Goatboy wrote:Oh, that's simple. All you need to do is dedicate many years of your life to studying security.

IF you feel like exchanging ASCII arrays, let me know ;)
pretentious wrote:Welcome to bat country
User avatar
pretentious
Contributor
Contributor
 
Posts: 653
Joined: Wed Mar 03, 2010 12:48 am
Blog: View Blog (0)


Re: ain't no party like an I.P party

Post by Breaker on Thu Jan 23, 2014 1:10 pm
([msg=79070]see Re: ain't no party like an I.P party[/msg])

I am glad they ruled this way. Also, if some baddie were to use your wlan for criminal purposes (its negligent to leave it open, but whatever...), they can use forensic tools to find out who it is. Then again, they may not be bright and use the same mac address to connect to your wlan every time.

Anyway, yay for the govt ruling. :D
Breaker
New User
New User
 
Posts: 2
Joined: Fri Aug 22, 2008 9:57 pm
Blog: View Blog (0)


Re: ain't no party like an I.P party

Post by Goatboy on Thu Jan 23, 2014 7:39 pm
([msg=79074]see Re: ain't no party like an I.P party[/msg])

One of the first rules of computer forensics is that you can't place a person behind the keyboard without a decent amount of evidence. In some cases you can be a strong suspect, but there are very few cases of guilty until proven innocent.
Assume that everything I say is or could be a lie.
1UHQ15HqBRZFykqx7mKHpYroxanLjJcUk
User avatar
Goatboy
Expert
Expert
 
Posts: 2819
Joined: Mon Jul 07, 2008 9:35 pm
Blog: View Blog (0)


Re: ain't no party like an I.P party

Post by pretentious on Sat Jan 25, 2014 12:41 am
([msg=79092]see Re: ain't no party like an I.P party[/msg])

Goatboy wrote:One of the first rules of computer forensics is that you can't place a person behind the keyboard without a decent amount of evidence. In some cases you can be a strong suspect, but there are very few cases of guilty until proven innocent.

What's considered decent? Say you get a van within range of an unsecured( hell, crack a secured one) wireless network, spoof the MAC, download the torrent then drive off. does anyone get arrested?
Goatboy wrote:Oh, that's simple. All you need to do is dedicate many years of your life to studying security.

IF you feel like exchanging ASCII arrays, let me know ;)
pretentious wrote:Welcome to bat country
User avatar
pretentious
Contributor
Contributor
 
Posts: 653
Joined: Wed Mar 03, 2010 12:48 am
Blog: View Blog (0)


Re: ain't no party like an I.P party

Post by Goatboy on Sat Jan 25, 2014 2:25 am
([msg=79095]see Re: ain't no party like an I.P party[/msg])

pretentious wrote:
Goatboy wrote:One of the first rules of computer forensics is that you can't place a person behind the keyboard without a decent amount of evidence. In some cases you can be a strong suspect, but there are very few cases of guilty until proven innocent.

What's considered decent? Say you get a van within range of an unsecured( hell, crack a secured one) wireless network, spoof the MAC, download the torrent then drive off. does anyone get arrested?

If it is their MAC, and they have no logs showing a break-in, then it would rely on the torrent being found on their computer. I'm not a legal expert I should mention, just going off what I learned in college. Though a good prosecutor can get around most legal hurdles.
Assume that everything I say is or could be a lie.
1UHQ15HqBRZFykqx7mKHpYroxanLjJcUk
User avatar
Goatboy
Expert
Expert
 
Posts: 2819
Joined: Mon Jul 07, 2008 9:35 pm
Blog: View Blog (0)



Return to Networking

Who is online

Users browsing this forum: No registered users and 0 guests