Quantcast
Channel: Shaw forum - dslreports.com
Viewing all articles
Browse latest Browse all 898

[ALL] Shaw Go WiFi

$
0
0
I am on the fence whether to allow usage of Shaw Go WiFi for my family. My main concerns are the following: 1.) Someone broadcasts their SSID as "ShawOpen" and records the registered device's MAC address. Attacker clones the recorded MAC address to get his/her device to other Shaw Go WiFi hotspots. 2.) Someone can spoof "ShawOpen" as well as the login page (I notice from the videos. The login credentials are stolen. Attacker uses the stolen credentials to connect to other Shaw Go WiFi hotspots. In both cases, the attacker gets free Shaw Go WiFi access, and at the same time, the bandwidth usage will count towards the victim's account. Victim might just have his/her data usage spike up without knowledge. Do you guys know if Shaw is doing anything on their end to prevent these scenarios? Is Shaw doing some form of rogue AP mitigation? or is it an open battle out there? I know that there is a Shaw Go WiFi app indicating the locations of Shaw Go WiFi hotspots, but the honeypot will most likely be located within these hotspots' proximity. Adding the fact that your device will auto-connect to an SSID of "ShawOpen", the Shaw Go WiFi app does not help much.

Viewing all articles
Browse latest Browse all 898

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>