Questions tagged [snooping]

29 questions
13
votes
2 answers

Can google read my mind?

I had just been looking, in a plain text file, using a VI-ish editor, at my notes about garlic. I did not use the clipboard. The file is on my HD; nothing is 'in the cloud'. In the editor, I had searched for both 'garlic' and 'fertil'. After…
George
  • 279
  • 2
  • 4
12
votes
2 answers

Sniffing, Snooping, Spoofing

Could somebody please explain to me the differences between the following attacks? sniffing snooping spoofing My professors used them all in his documents, but I'm not sure, if those are 3 different attacks or just synonyms.
user1170330
  • 223
  • 1
  • 2
  • 4
12
votes
4 answers

Can someone use WiFi snooping to see data I send through Tor Browser when I'm not using SSL?

(NOTE: I've read other similar questions, but I'm not at all certain about this, therefore I'm asking.) I travel a lot, and I generally use public WiFi spots and hotels/hostels/boarding houses etc. access points. I'm a reporter. Sometimes I send my…
victor
  • 121
  • 1
  • 3
11
votes
3 answers

Is it safe to log into my bank website over a public wifi?

Is it safe to log into my bank website over a public wifi (like a coffee shop)? I realize that the connection between the browser and bank servers should be encrypted, however I'm wondering if there are any other "gotchas"?
Chris Dutrow
  • 211
  • 1
  • 2
  • 5
6
votes
5 answers

Does WPA2 Enterprise protect against evasdropping from within the network?

At home, I have a simple ISP supplied router where I have set up a WPA2-PSK wireless network for our laptops and other devices. While I played around with Wireshark, I noticed that I could use my laptop to see what my tablet is doing in the…
Martin Ueding
  • 658
  • 6
  • 17
6
votes
2 answers

Can free Wi-Fi hotspot providers snoop on HTTPS communications?

Every article (and post on this website) I find on public Wi-Fi safety is mostly concerned with other people connected to the same network snooping on our communications. As far as I understand it, we’re mostly secure as long as we’re connecting…
user137369
  • 693
  • 5
  • 9
5
votes
2 answers

Unknown ports shown on Nmap scan...and other strange behavior

My local network has been exhibiting some inexplicable behaviour. Firstly connecting to my websites domain name from inside the lan redirected me to my router's login page. I checked again with 3g and found that it didn't happen from outside the…
xeuari
  • 51
  • 3
3
votes
2 answers

Wi-Fi Pineapple Device - is it that easy to steal people's info?

I've been doing research on the internet relating to cybersecurity and I came across an article talking about a "Wi-Fi Pineapple". The article made it seem like anyone can buy this and basically steal peoples information in a Plug-and-play type…
Alex Valdez
  • 33
  • 1
  • 4
3
votes
1 answer

(Theoretically) intercepting GCHQ's smartphone exploit

In the lastest Snowden interview, it was revealed that GCHQ used an exploit sent via SMS to gain access to smartphones, and that this 'exploit' goes unnoticed to the handset user. I was wondering if it might be possible to somehow setup a smartphone…
user88566
2
votes
1 answer

Understanding Hearthbleed attacks

In order for a Heartbleed attack to happen and for someone to grab the SSL private key and even spy they have to be on the local network with a router, switch or server, correct? Or can this be done to any server directly over the internet? I always…
Jason
  • 3,086
  • 4
  • 20
  • 24
2
votes
3 answers

For security reasons, can I block ping response on my router without disabling my network?

I seem to have a serious problem of being attacked and after looking up the attack source, 99% come from China, then Korea, Hong Kong etc. Here is a fraction of the report from my Router, which is a Cisco WRVS4400N router. 1 2014-01-06 14:53:32…
DeKoss
  • 131
  • 1
  • 1
  • 3
2
votes
1 answer

DNS cache snooping protection

Is it possible to protect against DNS cache snooping on ISC bind and PowerDNS servers? If not, is there a similar DNS server software which can't protect agains snooping?
jwalker
  • 33
  • 2
2
votes
3 answers

Susceptibility of 7z encrypted archive files to man in the middle attacks

Given: A file (assume 1 GB in size) is encrypted along with filenames using 7zip into a 7z archive using AES-256 The file is uploaded to a cloud storage service such as those offered by Google, Amazon, or Microsoft The file is downloaded by a peer…
Rob
  • 68
  • 1
  • 6
2
votes
3 answers

What is this Polish IP doing on my internal WiFi?

Lately I've seen many strange events in the logs of my wifi router / cable modem. Many are linked to the IP address 83.0.68.240 from the ISP, Orange Polanska. Events like "DoS attack: Ping Of Death", "DoS attack: Teardrop or derivative" etc. However…
Zane
  • 21
  • 3
2
votes
1 answer

Can an attacker listen to a DSL signal by calling telephone?

With a normal telephone connection you can't call two people separately and simultaneously. You can have a conference call where the signal is shared by all participants. With my DSL line I can call and use the internet at the same time. This means…
nebuch
  • 139
  • 3
1
2