Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932078Ab1D1Sue (ORCPT ); Thu, 28 Apr 2011 14:50:34 -0400 Received: from oproxy4-pub.bluehost.com ([69.89.21.11]:42951 "HELO oproxy4-pub.bluehost.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1757939Ab1D1Sub (ORCPT ); Thu, 28 Apr 2011 14:50:31 -0400 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=dlasys.net; h=Received:Subject:From:To:Cc:In-Reply-To:References:Content-Type:Organization:Date:Message-ID:Mime-Version:X-Mailer:Content-Transfer-Encoding:X-Identified-User; b=kggtCCk0QeX8coPIn2khzpiVZVOS1QK9kOqq08PmtpDVwZt1AAmY1m6JzOCGBnQis9OmlQXBV59LhZL0FwgOPRsuvO3SRixa1CwfPiGr20kpuQjW7TBWYaKWF3Jb5jYe; Subject: Re: EFF's Open Wireless Movement - solutions for Linux 802.11 APs From: "David Lynch Jr." To: Larry Finger Cc: "Luis R. Rodriguez" , linux-wireless , linux-kernel@vger.kernel.org, openwireless@eff.org In-Reply-To: <4DB9AEB2.4000807@lwfinger.net> References: <4DB9AEB2.4000807@lwfinger.net> Content-Type: text/plain; charset="UTF-8" Organization: DLA Systems Date: Thu, 28 Apr 2011 14:50:32 -0400 Message-ID: <1304016632.24745.127.camel@hp-dhlii> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Content-Transfer-Encoding: 7bit X-Identified-User: {2173:host200.hostmonster.com:dlasysne:dlasys.net} {sentby:smtp auth 75.97.65.48 authed with dhlii+dlasys.net} Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2130 Lines: 37 On Thu, 2011-04-28 at 13:15 -0500, Larry Finger wrote: > There is no doubt that the EFF means well; however, there is one situation that > they seem to ignore. If any part of my AP is unencrypted and some outsider uses > it to download child pornography, the IP address in any server logs is mine. If > the authorities recover those logs as part of a criminal investigation and > investigate the clients, they will immediately come to me. How do I prove that I > am innocent of the porno charge and only guilty of being a good citizen and > providing wireless access to the public? I do not relish the thought of becoming > a registered sex offender. If your WiFi is secured and someone cracks it - something that is fairly easy, and particularly easy for someone engaging in activities they do not wish to have traced back to them, now you are in a far worse state. Regardless of the technical realities, the defense of "somebody else downloaded child porn through my unsecured access point" has a far greater likelyhood of prevailing than that of "some evil doer cracked my WPA2 key and used my access point to download child porn". It is entirely possible that you will not even be allowed to present that defense without proving that it actually occured. My wife is a public defender handling criminal appeals. There is an ever increasing number of "sex offender" cases, most of which are far from the "child preditors" that we all fear. In many states urinating in public - even hidden behind a tree at an outdoor event where no facilites were provided could get you a conviction as a registered sex offender. We have been engaged in an argument that the risks associated with even a secured access point - and the risk may actually be greater with a secured one because the burden of proof shifts dramatically, is so great that it overshadows the value of WiFi. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/