Whatever You Think Of The Google WiFi Settlement, It's Bad That It Requires Google To Attack Open WiFi

from the that's-just-silly dept

We’re still a bit confused about why so many people freaked out a few years back when Google’s Street View cars gobbled up some open WiFi data — since anyone can do that on an open WiFi network. Various investigations did show that Google was a bit disorganized and had some poor controls in place, which perhaps meant that it should have caught the data collection sooner. So, if you think Google should be punished for that kind of thing, then the recent settlement with a group of state attorneys general perhaps made you happy.

That said, EFF is pointing out why the settlement is stupid — not for Google, but for open WiFi and security. First, these technologically clueless attorneys general are requiring Google to create videos and ads promoting WiFi encryption… with a focus on old and bad standards like WEP, which is like saying you should be locking your front door with a cheap chain lock. It’s a “lock,” but one that could be broken by pretty much anyone in seconds.

Even worse, though, is that the settlement requires Google to push the message that the only way to protect yourself is to lock up your WiFi. But that’s ridiculous. Open WiFi, by itself, is not a bad thing. Yes, unencrypted data could be exposed, but the better answer is to encrypt your data, such as by using a VPN. As EFF notes, end-to-end encryption is always going to make more sense than just encrypting your access point and hoping that keeps people out. And, yet, much of the settlement focuses on having Google push people to lock up their WiFi.

The solution to public surveillance problems should not involve discouraging people from providing public resources like open wireless, since this cuts against the general interest and takes away a common good. As we’ve explained elsewhere, wireless encryption provides few benefits compared to the much stronger end-to-end encryption, a technology that can thrive alongside environments with open wireless access. The settlement could have gone so much farther by educating people how to run open wireless networks safely and securely—for example, through open guest networks.

It is apparent that too little thought and analysis went into this settlement document, and, as a result, the requirements do the public a huge disservice by hurting the Open Wireless Movement.

Of course, this is the kind of thing you get when you let grandstanding politicians tell companies how they need to act concerning technology they don’t understand.

Filed Under: , , ,
Companies: google

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Whatever You Think Of The Google WiFi Settlement, It's Bad That It Requires Google To Attack Open WiFi”

Subscribe: RSS Leave a comment
39 Comments
Anonymous Coward says:

this is just another situation where those that are in the position to get someone else to do something, are doing so. these ‘attorney generals may well know how to manipulate the law and the courts so as to achieve the verdict they want, but when it comes to anything/everything else, they more or less are clueless. much like Congress really. they know what to do to be able to get their pockets lined and get campaign contributions, but have no idea at all how to use the technology they are doing their best to stifle or shut down or the effects their stupidity has on innovation and progress. the latest CFAA bill proposed amendments is a good example. even more so when half the law enforcement agencies that will be affected have no clue why the changes are proposed, other than to get additions that the DoJ wanted 2 years ago back on the table.

Anonymous Coward says:

Fun fact I was not aware of (slightly off-topic):

You can still sniff WPA2 “encrypted” traffic if you are on the same network as other ‘suckers’ without any special tricks (well, other than enabling promiscuous mode).

This has implications when you share a encrypted-but-still-public access point with others (like at my University): any dolt with access credentials can sniff your passwords as they travel through the air.

My point? WPA2 is not a silver bullet: you are still vulnerable to all sorts of ‘fun’ attacks by people that are inside your network (eavesdropping, man in the middle, arp poisoning, etc, etc).

Ima Fish (profile) says:

Re: Re:

To me the push to eliminate open WIFI actually has nothing to do with securing WIFI connections. It’s all about creating a person or entity liable for the connection.

If it’s open and child porn is being shared on it, there’s plausible deniability. “It wasn’t me, it was someone else.”

But once a connection point is required to be locked down, it’s the person or entity’s responsibility to ensure that it’s locked down. Even if someone “hacks” in, it’s still the owner’s fault for allowing it to happen.

It’s sort of like the DRM requirement of the DMCA. It’s not to stop people from copying, it’s to make people liable for allowing or facilitating copying.

pixelpusher220 (profile) says:

Re: Re: Re:

To use the obligatory car analogy:

If your car was seen being the get away car from a bank robbery, their going to come talk to you because, well, you’re responsible for your car.

As the person who opened the ISP account, you’re responsible for it’s use. Perhaps not ‘liable’, but responsible.

Obviously physical vs digital is a poor comparison, but if you left your wifi open and then someone started using ‘all’ your bandwidth…you’d pretty quickly decide that there was ‘harm’ being done to you…just like if someone stole your car and you were deprived the use of it.

The ‘connection’ is still a physical thing.

I’m in favor of open wifi, but it comes with responsibility.

PRMan (profile) says:

Re: Re: Re: Re:

And if you left that car on the street (let’s say it’s an old car) with a sign that says: “Drive it whenever you want, just bring it back today,” and somebody uses it as a getaway car in a bank robbery and parks it back at your house, you better believe you’re going to have a tough time convincing the cops that it wasn’t you.

I disagree with Mike. The liability is too high for an individual to offer free wifi.

pixelpusher220 (profile) says:

Re: Re: Re:

And to back up your point…the RFID chips being put in Credit Cards are exactly to limit the liability of the card issuer – not the user.

They can then say, well your card was clearly there because we read the RFID chip. Completely ignoring that those things can be cloned.

It ain’t for you, it’s for them, just like what you say about locked wifi. Though I’d disagree about the ‘if they hacked in its your fault’ argument. You’d need to prove it, but if you locked your doors it’s good faith you tried to stop it.

Anonymous Coward says:

Re: Re: Re:

“It’s all about creating a person or entity liable for the connection.”

They are looking for responsibility in the wrong node of the network.

It used to be true that you could reasonably place the blame on the account owner, because there was really only one device attached to the network, but that ship has sailed a long time ago.

Slap a half-decent router on that connection, and now you can have hundreds of computers sharing the same access point.

It is no longer reasonable to hold the owner of that connection (or the router operator) for what goes on on that connection. He/she should merely be treated as an ISP would: do some local discovery, request the logs and work on that.

(There are probably a few caveats that I am missing, but I think this is reasonable)

out_of_the_blue says:

@ "Open WiFi, by itself, is not a bad thing."

Well, neither is potassium cyanide. It’s when you get bad actors into the mix that problems arise.

I keep mentioning that Mike NEVER sees even a possibility of bad actors existing. That’s the ODD point.

I don’t think locking up your WiFi is an incomprehensible or unreasonable precaution to take against bad actors who might use your generosity to get YOU into trouble. Why would you take even a slight risk for the benefit of strangers?

Now, on the “VPN” (Dare I venture even writint those letters with all the fanboys ready to yet again say I just don’t understand it? Sure. What have I got to lose?) — How can you use a VPN and still have it be Open WiFi? — Yes, I know you can split it or give out keys, but WITHOUT risk as above? You’re right I don’t see that. ‘Splain, then.

Anonymous Coward says:

Re: @ "Open WiFi, by itself, is not a bad thing."

“Why would you take even a slight risk for the benefit of strangers?”

That’s actually an interesting philosophical question.

Why do you have an army? Or police? Why would those people stick their necks out for you?

I believe that there are some among us that are willing to suffer when “shit gets tough” so that others may gain access to things they would not have otherwise: Freedom and security in case of police and army (debatable, but let’s leave that for another time).

Or, as in the case of open-wifi, something much simpler and mundane: internet access for when you are in the middle of a city without mobile internet. It has certainly been useful to me once, and I am still thankful to that anonymous person.

Digitari says:

Re: @ "Open WiFi, by itself, is not a bad thing."

this is just like when I log into the “work” network, my wife can still surf the net even though I am using a VPN.

I have a neighbor that has 6 children and a disabled wife, he works 38 to 40 hours a week @ 7.25 an hour. I have open wifi so his CHILDREN can use the laptop i gave them to do school work….

think of the children OOTB…

(yes my wifi is open but I have MAC filtering on)

Anonymous Coward says:

Re: Re: @ "Open WiFi, by itself, is not a bad thing."

You have swallowed the government line that you can’t trust your neighbour, let alone strangers. This makes it much more difficult to deal with the problems, because you cannot organise any political opposition to the existing government.

pixelpusher220 (profile) says:

Not quite.

“Yes, unencrypted data could be exposed, but the better answer is to encrypt your data, such as by using a VPN.”

So have locked safe that anyone can copy and attack locally at their location?

Encryption is important, but not leaving your front door open is the first step to security; and yes not with WEP but other more secure protocols.

Anonymous Coward says:

Re: Not quite.

Actually, I would say locking your front door is good, but an even better idea is to have an open shed. A guest network that is separate from the private LAN is basically giving people what they want so they don’t bother hacking into your personal network. Even WPA2 can be hacked, it’s takes a bit longer and needs traffic to be active but it’s already been compromised.

tomxp411 (profile) says:

How about teaching people how radio actually works?

Put out a series of PSA’s that teaches people how radio works.

Explain that their WiFi hotspot is like a little radio station.

Explain that anybody can listen to that radio station, and that it’s even legal to do so.

Personally, I think leaving your home WiFi open is a bad idea; you’re leaving some doors pretty wide open for abuse. But businesses like Starbucks and McDonald’s use WiFi hotspots as an inducement to get people to shop there. People need to know that their packets CAN be sniffed while they’re browsing Facebook at McDonald’s or email at Starbucks.

Then show them how to fix it: use a VPN. Use https when it’s available.

People are upset because they lack knowledge. They didn’t know that this kind of sniffing was not only possible but legal.

Give them the knowledge they need, and they won’t need to be angry, because they’ll be able to take care of themselves.

Mr. Applegate says:

“Open WiFi, by itself, is not a bad thing. Yes, un-encrypted data could be exposed, but the better answer is to encrypt your data, such as by using a VPN.”

The government would never encourage encryption, then they can’t see what you are doing. Similarly, they need to encourage you to secure your WIFI so they can more easily identify likely users of the system.

IPV 6 is the wet dream of the DOJ and MAFIAA, but people aren’t implementing it fast enough to suit them, so…

I honestly, don’t think the politicians are as stupid as you think. They are pandering to the likes of the DOJ and the MAFIAA. Before long it will be a crime not to secure your WIFI and not to keep logs for it as well. As has been pointed out here on TechDirt 6 Strikes will close many open WIFI connections. That is meant to have the same effect, make it easier to nail someone to the wall.

Because… Piracy… Terrorism… Hackers! Oh and it is for the children.

JarHead says:

Open WiFi, by itself, is not a bad thing. Yes, unencrypted data could be exposed, but the better answer is to encrypt your data, such as by using a VPN.

…but..but when everyone is encrypting their data streams, that’ll be contra-productive to our surveillance efforts, you know, with all those terrorist, pirates, cyber-something all abound. And let’s not forget child porn/molesters/rapist. If you don’t care about all that, surely you’ll care about children.

Ninja (profile) says:

I’ve been to the US in 2009. And in 2012. It was much harder to find open wi-fi in 2012 (I did go to completely different places though). Overall this is bad for the public. And as a tourist I can tell how open wi-fi are important and help with all sorts of things such as checking the surroundings map online, getting directions, searching for points of interest or simply uploading pics so your friends can share the moment with you.

It’s very easy to point the dangers of open wi-fi being exploited and ignore the good sides that simply push these bad uses to a second and unimportant place. Shall we start pushing for the elimination of planes because they can crash and kill hundreds at a time? What about banning genetic engineering because it can be used to produce biological weapons? Hell, ban chemistry since it’s used to produce chemical weapons and explosives!

Gene Cavanaugh (profile) says:

Encryption

Totally agree about open WIFI, but on encrypting email – okay, I am going to email my sister to say “Hi” – encrypt! Wait, why? Well, I am going to send an email about how someone is doing – ENCRYPT! Wait, why?
Maybe we can agree that open WiFi is okay, AND unencrypted email is okay (depending on how sensitive the data is, of course).

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...
Older Stuff
09:00 Awesome Stuff: Monitor Everything (5)
09:00 Awesome Stuff: Cool Components (1)
12:42 Tech Companies Ask European Commission Not To Wreck The Internet -- And You Can Too (4)
09:00 Awesome Stuff: Play & Listen (1)
09:00 Awesome Stuff: Beyond Chiptunes (12)
09:00 Awesome Stuff: Updated Classics (3)
09:00 Awesome Stuff: Celebrating Cities (1)
09:00 Awesome Stuff: Crafts Of All Kinds (5)
09:00 Awesome Stuff: One Great Knob (13)
09:00 Awesome Stuff: Simple Geeky Toys (2)
09:00 Awesome Stuff: Gadgets For The New Year (18)
09:00 Awesome Stuff: A Post-Holiday Grab Bag (0)
13:34 How Private-Sector Innovation Can Help Those Most In Need (21)
09:00 Awesome Stuff: Towards The Future Of Drones (17)
09:00 Awesome Stuff: Artisanal Handheld Games (5)
09:00 Awesome Stuff: A New Approach To Smartphone VR (5)
09:00 Awesome Stuff: Let's Bore The Censors (37)
09:00 Awesome Stuff: Open Source For Your Brain (2)
09:00 Awesome Stuff: The Final Piece Of The VR Puzzle? (6)
09:00 Awesome Stuff: The Internet... Who Needs It? (15)
09:00 Awesome Stuff: The Light Non-Switch (18)
09:00 Awesome Stuff: 3D Printing And Way, Way More (7)
13:00 Techdirt Reading List: Learning By Doing (5)
12:43 The Stagnation Of eBooks Due To Closed Platforms And DRM (89)
09:00 Awesome Stuff: A Modular Phone For Makers (5)
09:00 Awesome Stuff: Everything On One Display (4)
09:00 Awesome Stuff: Everything Is Still A Remix (13)
09:00 Awesome Stuff: Great Desk Toy, Or Greatest Desk Toy? (6)
09:00 Awesome Stuff: Sleep Hacking (12)
09:00 Awesome Stuff: A Voice-Operated Household Assistant (19)
More arrow