About

This page contains a single entry from the blog posted on January 8, 2011 11:46 AM. The previous post in this blog was It *can* be done. The next post in this blog is Underdog bandwagon. Many more can be found on the main index page or by looking through the archives.

E-mail, Feeds, 'n' Stuff

Saturday, January 8, 2011

Pictures of Lily

When you look at an image on the internet, do you "possess" or "control" it? How about all the thumbnails on a Google image search page? Does it matter what you searched for? Does it matter whether you know how to get at your web browser's temporary files? Don't you have to own up to what's in the zip files on your computer? This week's two Oregon Supreme Court rulings on child pornography make for some highly interesting reading.

Comments (6)

I took a drive around my house the other night with my laptop and a WiFi program. I went 3 blocks in each direction. I detected 542 Secure (password protected) Access points (ability to go on the internet)and 164 unsecured. Of the open AP's, over 100 were private residences that unknowingly provide the general public with the ability to go into the Local Area Network of their home. Possibly to store things like the above on the homes computer, but at least be able to download Music, Movies and yes Child pornography.

This is not hacking. This is just like sitting in a local coffee shop. Over the last couple of years I have found people out side, leaning on the telephone pole or sitting in a car, using the free WiFi provided by the "Gated Community" across the street.

Exactly, dman. That's a problem with even simple wireless routers; they are visible to any user within range with a properly equipped computer. In my case, I have a strong PW but frankly, I am wired almost all the time so it's been on my plate to investigate the possibility of disabling wireless entirely. Guest is disabled but i still am concerned.

On another front, I notice that FF offers "private browsing", which, if invoked, informs you that no record of any visits remains on the computer unless you actually download. It does go on to state that the IP address can be used in an investigation to trace your viewing.

I frequently make use of an applet called CC Cleaner, which neatly erases all the files, cookies etc, which the user can select for disposal. Keeps the computer running well.

Continuing on, As Jack painfully knows, "script kiddies" can plant nastys that can take over your puter by just visiting a web site.

It would be ever so easy and a whole lot less detectable to simply send along some child porn to those visiting a religious or Far Right Conservative web site that would settle unseen in the Cache until found by the Geek squad at your local puter shop.

Last month a new breakthrough was announced that a new program could scan hard drives for flesh tones to find the skin shots!

This is not hacking. This is just like sitting in a local coffee shop.

Not exactly. They give you permission to use their network. Under Oregon law it is illegal to use someone else's without their permission.

See #4.

https://www.oregonlaws.org/ors/164.377

That said, some people believe that leaving your wireless connection unprotected is giving permission to use it. I would tend to agree.

You are right Jon. And you cite another instance where the law can't keep up. The new phones and a lot of laptops are set to use "any available Access Point." almost seamlessly picking up and dropping connections as you bike along.

It's a lot like saying you can walk along the side walk, but illegal to use the light coming from stores and front porches to see.

It is confusing at the least. There are free wireless nodes available in various parts of the country, in which you can seamlessly go from point to point. We almost had one here. So, as you move along, and encounter an open connection, how can you sufficiently know that this particular connection is one from an unwary source? Maybe a SWAG, but not much more.




Clicky Web Analytics