Skip to content

Month: October 2010

Distractions

It’s been a little quiet here due to some unexpected distractions.

– Baby, my brother’s dog, was attacked by another dog early Sunday morning. Most of that day was spent at the vet. It’s a morning I’d rather not relive.

– Since Sunday, we’ve been to the vet every day for follow-up visits for Baby with another later this afternoon.

– I’ve been working on an organization’s web site. The web site has been fighting me left and right and has taken up a lot of my time.

– Unexpected visits from customers for my dad’s store and his friends has led me to cooking dinner a couple of times.

I’m hoping to get back on track now as much as I can and continuing with blog posts, development information and more. Needless to say, it has not been a relaxing time over the last few days.

travistubbs.net: Powered by WordPress

Earlier this week, I had mentioned that my needs had outgrown what is provided by the free (and wonderful) Posterous simple blogging platform. I needed a little more flexibility in what I could do on my site. For that reason, I have moved back to the WordPress publishing platform.

Over the next few days (or weeks, or months), I’ll talk about my move to the WordPress platform and the tools that allow me to make this site functional. For the time being, if you happen to hit any problems, bugs, or other issues with the site, be sure to let me know.

Facebook Has Violated My Trust For The Last Time

Facebook has continued to show time and time again that it does not care about its users, their data, and the privacy of others. For that reason, I am done with Facebook.

From this point forward, I will only use Facebook as a promotional tool for my blog posts and projects. I will respond to comments left on posts on Facebook, but I will not be using it as a way to interact with others.

I will be available on other social networks, including Twitter and Google Buzz. You can find a list of all social networks I’m on over at http://travistubbs.me/. I understand that I’m essentially isolating myself from others by using networks that others may not be using, but at the same time, it’s not like you can’t get ahold of me still (phone networks and email still exist, last I checked). I’m not asking anyone else to abandon Facebook. In fact, I wished there was an alternative others can go to, but for the time being, there isn’t. But I’m rather not be part of a social network than take part with one that purposely violates the trust of its users. A more detailed blog post to highlight Facebook’s previous actions that led to my decision will be posted later. To help you understand a little bit into my decision, I recommend reading up on the following previous news posts about Facebook. These are just a sampling of Facebook’s disregard for the user.

Facebook alters info feature that angered users
[USA Today, September 2006 ]

The Facebook Ad Backlash Begins
[TechCrunch, November 2007]

Facebook’s New Terms Of Service: “We Can Do Anything We Want With Your Content. Forever.”
[Consumerist, February 2009]

User Backlash Prompts Facebook Change
[PC Magazine, March 2009]

Facebook ratchets up privacy controls (again)
[CNET, August 2009]

Facebook’s Instant Personalization Is the Real Privacy Hairball
[Salon, April 2010]

Facebook’s Eroding Privacy Policy: A Timeline
[Electronic Frontier Foundation, April 2010]

Facebook’s Huge Maze of Privacy Options Mapped Out
[Lifehacker, May 2010]

Facebook sent some user data to advertisers
[CNET, May 2010]

Discontent Grows With Facebook Places’ Ability To Tag Without Users’ Express Permission
[Crunchgear, August 2010]

Join my Facebook group? You can’t say ‘No’
[Houston Chronicle TechBlog, October 2010]

Facebook “Groups” Welcomes You To NAMBLA
[Consumerist, October 2010]

Secure Wi-Fi Covers the Landscape, Still Some Insecurity

While browsing the Android Market several nights ago, I came across the Wardrive application. Wardriving is the practice of finding wireless access points while on the move (in person or in a vehicle). The Wardrive app records any and all wireless access points it finds into a database with the location of those access points thanks in part to the GPS built into phones.

Since I had to make a trip to the grocery store in the morning, I figured I’d take the application for a spin and see what I could find. The results are alarming and unexpected at the same time. When you buy a wireless router, most of the time, the manufacturer teaches you nothing about safety and security. 

Much like the television airwaves, your wireless router it always sending out a signal over the air. This means that anyone can tell you have a wireless connection at your home or business. They don’t reach out the distance of a television signal, but they can still go far enough outside your home that others can easily jump onto your connection. This openness is great for those looking for the need to have access to the Internet while on the go, but these open wireless access points are dangerous for not just the homeowner but for those looking for “free” Internet as well. As the data flying through the air is open and unencrypted, most information you enter can be seen by anybody that knows what they’re doing.

The many open wireless access points on the drive to the grocery store.

Looking at the map above, you will notice another common thing: the name of the access points. “linksys”, “dlink” and “default” are all the generic names of access points as you get them from the manufacturer. Most likely, the people who bought these access points just took them out of the box, connected their Internet connection to it, and went right to work. This also most likely means that these people have not changed the password to their access point, meaning anyone could do whatever they wanted to their connection and their data.

To help thwart this unauthorized access, a wireless encryption protocol was created called WEP (Wired Equivalent Privacy). This setup requires that people connecting to the wireless access point enter a password in order to gain access to the network. Unfortunately, WEP was a very flawed protection method and was cracked within a few years. WEP passwords on wireless access points can now easily be decrypted within minutes.

Wireless Access Points using WEP Encryption

In the early 2000’s, the WPA (Wi-Fi Protected Access) standard was introduced to replace the WEP standard. The original WPA was a stop-gap measure to get people off WEP while WPA2 was the full implementation of the standard as it should be.

A lot of people are now using the more secure WPA protocol to protect their wireless data.

After reviewing the data, I was honestly surprised at the number of access points using the more secure WPA protocol. I’m rather happy to see that as I’m worried people would still be using the older WEP protocol or no security at all. That being said, those last two scenarios are still happening. The use of the older WEP protocol is understandable as some devices (such as the Nintendo DS) still don’t support WPA security. The number of open access points is still disappointing. In 2010, there should be ZERO open wireless access points in use by private businesses and home users.

Manufacturers have been doing a better job of helping customers protect themselves by shipping wireless routers already protected with WPA protection or automatically when configuring the router for the first time. Unfortunately, for those that have not bought a router recently, they are putting themselves at a major risk of a security breach.