Questions tagged [snooping]
29 questions
13
votes
2 answers
Can google read my mind?
I had just been looking, in a plain text file, using a VI-ish editor, at my notes about garlic. I did not use the clipboard. The file is on my HD; nothing is 'in the cloud'. In the editor, I had searched for both 'garlic' and 'fertil'. After…
George
- 279
- 2
- 4
12
votes
2 answers
Sniffing, Snooping, Spoofing
Could somebody please explain to me the differences between the following attacks?
sniffing
snooping
spoofing
My professors used them all in his documents, but I'm not sure, if those are 3 different attacks or just synonyms.
user1170330
- 223
- 1
- 2
- 4
12
votes
4 answers
Can someone use WiFi snooping to see data I send through Tor Browser when I'm not using SSL?
(NOTE: I've read other similar questions, but I'm not at all certain about this, therefore I'm asking.)
I travel a lot, and I generally use public WiFi spots and hotels/hostels/boarding houses etc. access points.
I'm a reporter. Sometimes I send my…
victor
- 121
- 1
- 3
11
votes
3 answers
Is it safe to log into my bank website over a public wifi?
Is it safe to log into my bank website over a public wifi (like a coffee shop)?
I realize that the connection between the browser and bank servers should be encrypted, however I'm wondering if there are any other "gotchas"?
Chris Dutrow
- 211
- 1
- 2
- 5
6
votes
5 answers
Does WPA2 Enterprise protect against evasdropping from within the network?
At home, I have a simple ISP supplied router where I have set up a WPA2-PSK wireless network for our laptops and other devices. While I played around with Wireshark, I noticed that I could use my laptop to see what my tablet is doing in the…
Martin Ueding
- 658
- 6
- 17
6
votes
2 answers
Can free Wi-Fi hotspot providers snoop on HTTPS communications?
Every article (and post on this website) I find on public Wi-Fi safety is mostly concerned with other people connected to the same network snooping on our communications. As far as I understand it, we’re mostly secure as long as we’re connecting…
user137369
- 693
- 5
- 9
5
votes
2 answers
Unknown ports shown on Nmap scan...and other strange behavior
My local network has been exhibiting some inexplicable behaviour.
Firstly connecting to my websites domain name from inside the lan redirected me to my router's login page. I checked again with 3g and found that it didn't happen from outside the…
xeuari
- 51
- 3
3
votes
2 answers
Wi-Fi Pineapple Device - is it that easy to steal people's info?
I've been doing research on the internet relating to cybersecurity and I came across an article talking about a "Wi-Fi Pineapple".
The article made it seem like anyone can buy this and basically steal peoples information in a Plug-and-play type…
Alex Valdez
- 33
- 1
- 4
3
votes
1 answer
(Theoretically) intercepting GCHQ's smartphone exploit
In the lastest Snowden interview, it was revealed that GCHQ used an exploit sent via SMS to gain access to smartphones, and that this 'exploit' goes unnoticed to the handset user. I was wondering if it might be possible to somehow setup a smartphone…
user88566
2
votes
1 answer
Understanding Hearthbleed attacks
In order for a Heartbleed attack to happen and for someone to grab the SSL private key and even spy they have to be on the local network with a router, switch or server, correct?
Or can this be done to any server directly over the internet? I always…
Jason
- 3,086
- 4
- 20
- 24
2
votes
3 answers
For security reasons, can I block ping response on my router without disabling my network?
I seem to have a serious problem of being attacked and after looking up the attack source, 99% come from China, then Korea, Hong Kong etc. Here is a fraction of the report from my Router, which is a Cisco WRVS4400N router.
1 2014-01-06 14:53:32…
DeKoss
- 131
- 1
- 1
- 3
2
votes
1 answer
DNS cache snooping protection
Is it possible to protect against DNS cache snooping on ISC bind and PowerDNS servers?
If not, is there a similar DNS server software which can't protect agains snooping?
jwalker
- 33
- 2
2
votes
3 answers
Susceptibility of 7z encrypted archive files to man in the middle attacks
Given:
A file (assume 1 GB in size) is encrypted along with filenames using 7zip into a 7z archive using AES-256
The file is uploaded to a cloud storage service such as those offered by Google, Amazon, or Microsoft
The file is downloaded by a peer…
Rob
- 68
- 1
- 6
2
votes
3 answers
What is this Polish IP doing on my internal WiFi?
Lately I've seen many strange events in the logs of my wifi router / cable modem. Many are linked to the IP address 83.0.68.240 from the ISP, Orange Polanska. Events like "DoS attack: Ping Of Death", "DoS attack: Teardrop or derivative" etc.
However…
Zane
- 21
- 3
2
votes
1 answer
Can an attacker listen to a DSL signal by calling telephone?
With a normal telephone connection you can't call two people separately and simultaneously. You can have a conference call where the signal is shared by all participants. With my DSL line I can call and use the internet at the same time. This means…
nebuch
- 139
- 3