Explore the ethical dilemmas and technical aspects of neighborhood network security in this thought-provoking conference talk from BSides Rhode Island 2013. Delve into the speaker's personal experiences and moral quandaries surrounding security research in residential areas. Learn about various techniques such as switchbox proxying, regular expressions, image manipulation, and wireless network analysis. Examine the legal and ethical implications of these practices, including the use of Squid Proxy laws and traffic indication mapping. Gain insights into the differences between wired and wireless security, and understand the importance of responsible security research. Discover how to balance curiosity and technical skills with respect for privacy and legal boundaries in the field of cybersecurity.
Overview
Syllabus
Intro
Not a normal talk
Not a full person
My dilemma
My neighbors
Security research
What do you do
Is it legal
Upside Down Turn
I Love My Neighbors
Switchbox Proxy
Regular Expressions
Image Manipulation
Wireless Network
Neighbor Script
Neighbor Plugins
Victor TIMCO
SSL
Traffic Indication Map
Blur
Kidwater
Squid Proxy Laws
No Google
Plugins
Wired vs Wireless