Protecting Public Hotspots from Hackers,
                  Lawyers, and Other Ne’er-do-wells:
                            ...
Public and Secure?

                • Physical Security
                • Liability
                • Network Security
   ...
Physical Security

                • Theft Prevention
                • Environmental Hazards
                • Human Erro...
Liability




Thursday, February 5, 2009
Network Security

                • Platform Choice
                • Traffic Shaping/Filtering
                • Limiting ...
Maintaining Accessibility

                • No Cumbersome Authentication
                • No Advertising
               ...
Open Security in Implementation:
                   Flying Blowfish

                • What it is:
                  - A di...
Open Security in Implementation:
                   Flying Blowfish


                • Prior Art/Props:
                  ...
Open Security in Implementation:
                   Flying Blowfish

                • How it differs:
                  - ...
The Future of Secure
                       Public Access

                • Next generation authentication/public
       ...
How to Make a
                             Flying Blowfish
                • 1 shot vodka (pref. Gray Goose)
              ...
Upcoming SlideShare
Loading in …5
×

Protecting Public Hotspots

3,347 views

Published on

An ancient and somewhat embarrassing presentation to the ToorCon hacker conference in 2003. I was barely a freshman in college...

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
3,347
On SlideShare
0
From Embeds
0
Number of Embeds
29
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide





















  • Protecting Public Hotspots

    1. 1. Protecting Public Hotspots from Hackers, Lawyers, and Other Ne’er-do-wells: Concept and Implementation Philip Leif Bjerknes Director Tangerine Unwired Inc. Alexander “al3x” Payne Student, Information Security Consultant Thursday, February 5, 2009
    2. 2. Public and Secure? • Physical Security • Liability • Network Security • Maintaining Accessibility Thursday, February 5, 2009
    3. 3. Physical Security • Theft Prevention • Environmental Hazards • Human Error • Maintaining Power and Connectivity Thursday, February 5, 2009
    4. 4. Liability Thursday, February 5, 2009
    5. 5. Network Security • Platform Choice • Traffic Shaping/Filtering • Limiting Services • Intrusion Detection? Thursday, February 5, 2009
    6. 6. Maintaining Accessibility • No Cumbersome Authentication • No Advertising • Effective Use of Encryption • Load Balancing/Traffic Management? Thursday, February 5, 2009
    7. 7. Open Security in Implementation: Flying Blowfish • What it is: - A distribution of OpenBSD for Soekris embedded “communication computers” - Designed to be an “openly secure” public wireless access point Thursday, February 5, 2009
    8. 8. Open Security in Implementation: Flying Blowfish • Prior Art/Props: - OpenSoekris - Flashdist - M0n0wall Thursday, February 5, 2009
    9. 9. Open Security in Implementation: Flying Blowfish • How it differs: - Wireless purposed - Crafty PF ruleset - No unnecessary services - Traffic monitoring/statistics Thursday, February 5, 2009
    10. 10. The Future of Secure Public Access • Next generation authentication/public access clash • Anonymity and “extrusion detection” Thursday, February 5, 2009
    11. 11. How to Make a Flying Blowfish • 1 shot vodka (pref. Gray Goose) • 1 shot tequila • 1 shot lime • 1 shot sugar syrup Shake, pour over ice in glass. Fill to top with Red Bull. Stir. Garnish with one Theo de Raadt. Enjoy securely. Thursday, February 5, 2009

    ×