This is absolutely ridiculous. Imagine some fuckers just coming into your room while you’re with your SO making love or something.

  • gencha@lemm.ee
    link
    fedilink
    arrow-up
    11
    ·
    2 months ago

    Just FYI, you need very little skill to clone the WiFi access gateway of a hotel WiFi, and then blast their SSID from your router, to lure close guests into your honeypot. Once people are on your malicious gateway, the fun starts.

    In a hotel with hundreds of hackers on alcohol, it’s not unlikely for people to fuck around.

    There is also no requirement to be a “good guy” to attend the conference.

    • AAA@feddit.org
      link
      fedilink
      arrow-up
      3
      ·
      2 months ago

      There is also no requirement to be a “good guy” to attend the conference.

      Correct. But it’s kind of the inevitable outcome that only “good guys” attend. Why would any bad actor go there and risk being exposed / caught…

      • TheGalacticVoid@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        2 months ago

        Defcon is a useful resource for networking and learning. It being run by and for good guys doesn’t mean bad guys don’t find the event useful. The vague risk of “getting caught” is probably worth taking, regardless of whether that risk is tangible, especially if they follow proper security practices.

    • Maggoty@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      Isn’t also a game at defcon to spread a harmless package to as many devices as possible?

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Hopefully that would get flagged. If you start broadcasting that will show up under rouge ap detection

      • gencha@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        Right. And then they locate it and search the rooms nearby. Exactly what their disclaimer is about