this post was submitted on 27 Aug 2024
41 points (97.7% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54577 readers
255 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Not sure if I used the correct terms but what is the difference in security and privacy between downloading from a public wifi (or a closed wifi; with password) and mobile hotspot (sharing 4G/5G data from your phone to your computer)? Which one is recommended or does it not matter?

you are viewing a single comment's thread
view the rest of the comments
[–] qprimed@lemmy.ml 3 points 2 months ago (10 children)

most properly configured public wifi will enable client separation, of course that potentially still leaves lower level protocol and radio attacks.

[–] Tetsuo@jlai.lu 3 points 2 months ago (9 children)

I have no idea what this client separation is.

As far as I know there isn't really any client separation on wifi. It's a shared medium.

At least I don't see anything preventing you from reading someone else traffic. So anything unencrypted on a wifi is also accessible to any other clients.

I had tools more than 10 years ago that could automatically hijack session cookies on wifi for anybody connected and not using https.

[–] qprimed@lemmy.ml 5 points 2 months ago* (last edited 2 months ago) (7 children)

no worries.

the net effect of client separation is that your device sees no other layer 2 devices on the wlan besides the gateway. this would typically be enforced at the frame level by the APs and is separate from any radio privacy cryptography.

a properly configured wireless setup would assume every client is compromised and would also disallow local client-client via source routing or proxy ARP or any other escape options. 100% secure? probably not, but its a non trivial barrier that would have to be circumvented.

as with e.g. broken WEP years ago, there are still options to mess with clients at ~Layer 1 but I dont believe its currently as trivial as it used to be.

[–] tgxn@lemmy.tgxn.net 2 points 2 months ago* (last edited 2 months ago)

Good explanation, a note that most public WiFi will use client separation. Macca's, starbucks, airplanes etc you will only ever see your device and the gateway. (More for other people that are reading, I assume you know this 😄)

load more comments (6 replies)
load more comments (7 replies)
load more comments (7 replies)