SlideShare a Scribd company logo
1 of 11
Protecting Public Hotspots from Hackers,
                  Lawyers, and Other Ne’er-do-wells:
                             Concept and Implementation



                                                     Philip Leif Bjerknes
                                                                 Director
                                                 Tangerine Unwired Inc.

                                                 Alexander “al3x” Payne
                                Student, Information Security Consultant


Thursday, February 5, 2009
Public and Secure?

                • Physical Security
                • Liability
                • Network Security
                • Maintaining Accessibility

Thursday, February 5, 2009
Physical Security

                • Theft Prevention
                • Environmental Hazards
                • Human Error
                • Maintaining Power and Connectivity

Thursday, February 5, 2009
Liability




Thursday, February 5, 2009
Network Security

                • Platform Choice
                • Traffic Shaping/Filtering
                • Limiting Services
                • Intrusion Detection?

Thursday, February 5, 2009
Maintaining Accessibility

                • No Cumbersome Authentication
                • No Advertising
                • Effective Use of Encryption
                • Load Balancing/Traffic Management?

Thursday, February 5, 2009
Open Security in Implementation:
                   Flying Blowfish

                • What it is:
                  - A distribution of OpenBSD for Soekris
                             embedded “communication computers”

                     - Designed to be an “openly secure” public
                             wireless access point




Thursday, February 5, 2009
Open Security in Implementation:
                   Flying Blowfish


                • Prior Art/Props:
                  - OpenSoekris
                  - Flashdist
                  - M0n0wall

Thursday, February 5, 2009
Open Security in Implementation:
                   Flying Blowfish

                • How it differs:
                  - Wireless purposed
                  - Crafty PF ruleset
                  - No unnecessary services
                  - Traffic monitoring/statistics

Thursday, February 5, 2009
The Future of Secure
                       Public Access

                • Next generation authentication/public
                      access clash

                • Anonymity and “extrusion detection”


Thursday, February 5, 2009
How to Make a
                             Flying Blowfish
                • 1 shot vodka (pref. Gray Goose)
                • 1 shot tequila
                • 1 shot lime
                • 1 shot sugar syrup
                 Shake, pour over ice in glass. Fill to top with
                 Red Bull. Stir. Garnish with one Theo de Raadt.
                 Enjoy securely.


Thursday, February 5, 2009

More Related Content

Similar to Protecting Public Hotspots

Presentation
PresentationPresentation
Presentation
Mohd Arif
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
Mike Murray
 
Testing as Communication, Real-World Techniques
Testing as Communication, Real-World TechniquesTesting as Communication, Real-World Techniques
Testing as Communication, Real-World Techniques
ActsAsCon
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
 

Similar to Protecting Public Hotspots (18)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
FETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons LearnedFETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons Learned
 
Presentation
PresentationPresentation
Presentation
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
The Dark Arts of Hacking.
The Dark Arts of Hacking.The Dark Arts of Hacking.
The Dark Arts of Hacking.
 
App Walking
App WalkingApp Walking
App Walking
 
App Walking
App WalkingApp Walking
App Walking
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Testing as Communication, Real-World Techniques
Testing as Communication, Real-World TechniquesTesting as Communication, Real-World Techniques
Testing as Communication, Real-World Techniques
 
fingertips
fingertipsfingertips
fingertips
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security IndustryUnsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry
 
Risk Analysis and RFC 1149 (IP on Avian Carriers)
Risk Analysis and RFC 1149 (IP on Avian Carriers)Risk Analysis and RFC 1149 (IP on Avian Carriers)
Risk Analysis and RFC 1149 (IP on Avian Carriers)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
IPv6 Security - Where is the Challenge
IPv6 Security - Where is the ChallengeIPv6 Security - Where is the Challenge
IPv6 Security - Where is the Challenge
 
Network security
Network securityNetwork security
Network security
 
Eskwela Openstandard V1.1
Eskwela Openstandard V1.1Eskwela Openstandard V1.1
Eskwela Openstandard V1.1
 

More from Alex Payne

Splitting up your web app
Splitting up your web appSplitting up your web app
Splitting up your web app
Alex Payne
 
The perils and rewards of working on stuff that matters
The perils and rewards of working on stuff that mattersThe perils and rewards of working on stuff that matters
The perils and rewards of working on stuff that matters
Alex Payne
 
The Interaction Design Of APIs
The Interaction Design Of APIsThe Interaction Design Of APIs
The Interaction Design Of APIs
Alex Payne
 

More from Alex Payne (18)

Splitting up your web app
Splitting up your web appSplitting up your web app
Splitting up your web app
 
The perils and rewards of working on stuff that matters
The perils and rewards of working on stuff that mattersThe perils and rewards of working on stuff that matters
The perils and rewards of working on stuff that matters
 
Emerging Languages: A Tour of the Horizon
Emerging Languages: A Tour of the HorizonEmerging Languages: A Tour of the Horizon
Emerging Languages: A Tour of the Horizon
 
The Why and How of Scala at Twitter
The Why and How of Scala at TwitterThe Why and How of Scala at Twitter
The Why and How of Scala at Twitter
 
Building Distributed Systems in Scala
Building Distributed Systems in ScalaBuilding Distributed Systems in Scala
Building Distributed Systems in Scala
 
Speedy, Stable, and Secure: Better Web Apps Through Functional Languages
Speedy, Stable, and Secure: Better Web Apps Through Functional LanguagesSpeedy, Stable, and Secure: Better Web Apps Through Functional Languages
Speedy, Stable, and Secure: Better Web Apps Through Functional Languages
 
Mind The Tools
Mind The ToolsMind The Tools
Mind The Tools
 
Strange Loop 2009 Keynote: Minimalism in Computing
Strange Loop 2009 Keynote: Minimalism in ComputingStrange Loop 2009 Keynote: Minimalism in Computing
Strange Loop 2009 Keynote: Minimalism in Computing
 
The Business Value of Twitter
The Business Value of TwitterThe Business Value of Twitter
The Business Value of Twitter
 
Twitter API 2.0
Twitter API 2.0Twitter API 2.0
Twitter API 2.0
 
The Interaction Design Of APIs
The Interaction Design Of APIsThe Interaction Design Of APIs
The Interaction Design Of APIs
 
Why Scala for Web 2.0?
Why Scala for Web 2.0?Why Scala for Web 2.0?
Why Scala for Web 2.0?
 
The Twitter API: A Presentation to Adobe
The Twitter API: A Presentation to AdobeThe Twitter API: A Presentation to Adobe
The Twitter API: A Presentation to Adobe
 
Twitter at BarCamp 2008
Twitter at BarCamp 2008Twitter at BarCamp 2008
Twitter at BarCamp 2008
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
 
Why Scala?
Why Scala?Why Scala?
Why Scala?
 
Designing Your API
Designing Your APIDesigning Your API
Designing Your API
 
Scaling Twitter - Railsconf 2007
Scaling Twitter - Railsconf 2007Scaling Twitter - Railsconf 2007
Scaling Twitter - Railsconf 2007
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Protecting Public Hotspots

  • 1. Protecting Public Hotspots from Hackers, Lawyers, and Other Ne’er-do-wells: Concept and Implementation Philip Leif Bjerknes Director Tangerine Unwired Inc. Alexander “al3x” Payne Student, Information Security Consultant Thursday, February 5, 2009
  • 2. Public and Secure? • Physical Security • Liability • Network Security • Maintaining Accessibility Thursday, February 5, 2009
  • 3. Physical Security • Theft Prevention • Environmental Hazards • Human Error • Maintaining Power and Connectivity Thursday, February 5, 2009
  • 5. Network Security • Platform Choice • Traffic Shaping/Filtering • Limiting Services • Intrusion Detection? Thursday, February 5, 2009
  • 6. Maintaining Accessibility • No Cumbersome Authentication • No Advertising • Effective Use of Encryption • Load Balancing/Traffic Management? Thursday, February 5, 2009
  • 7. Open Security in Implementation: Flying Blowfish • What it is: - A distribution of OpenBSD for Soekris embedded “communication computers” - Designed to be an “openly secure” public wireless access point Thursday, February 5, 2009
  • 8. Open Security in Implementation: Flying Blowfish • Prior Art/Props: - OpenSoekris - Flashdist - M0n0wall Thursday, February 5, 2009
  • 9. Open Security in Implementation: Flying Blowfish • How it differs: - Wireless purposed - Crafty PF ruleset - No unnecessary services - Traffic monitoring/statistics Thursday, February 5, 2009
  • 10. The Future of Secure Public Access • Next generation authentication/public access clash • Anonymity and “extrusion detection” Thursday, February 5, 2009
  • 11. How to Make a Flying Blowfish • 1 shot vodka (pref. Gray Goose) • 1 shot tequila • 1 shot lime • 1 shot sugar syrup Shake, pour over ice in glass. Fill to top with Red Bull. Stir. Garnish with one Theo de Raadt. Enjoy securely. Thursday, February 5, 2009

Editor's Notes