User Tools

Site Tools


communication:security

This is an old revision of the document!


Wireless security

Wifi and mobile data are both based on radios that transmit data back and forth. This can present a security issue if:

  1. you are transmitting sensitive data; and
  2. the data is unencrypted at any point along the route

Short version: if you are using a secured website (banking, finance, medical, email, etc) it doesn't matter how you get there. The transmitted data is encrypted end-to-end:

You could have an airplane write the transmitted data in the sky and it would still be safe. You could tattoo it on your face and it would be safe. You could paint it on the side of the empire state building and it would be safe. – secessus

Longer version follows.

using websites

img.mousetrap.net_misc_https.jpgWebsites are either secure (https:) or unsecure (http:). Traditionally, the browser indicates with a padlock icon when sites are secure. You can also click on that area to get security details such as the certifying authority, encryption type and number of bits, etc.

If the website is secure the information is fully encrypted between your browser and the website. There is no reason to worry about that communication being intercepted or “sniffed” as it passes through.

If the site is insecure, refrain from posting sensitive data. If the site requires a login, ensure you are using a unique password and preferably username. 1) It won't increase security at that site but it will help confine the damage to that site.

using apps

You will have to verify the encryption of app connections on an app-by-app basis.

connecting to the net

Connecting to the net over wifi or mobile data is the “first hop” along the route to the server.

what about Three Letter Agencies

Q. Wait. Can't [insert favorite agency here] intercept my transmissions and try to crack them?
A. Theoretically yes, and they might crack one secured connection before the heat death of the universe. They won't, because it's easier to watch over your shoulder, trick you over the phone, plant a keylogger, or implement rubber hose cryptography.2)

connecting over mobile data

using wifi

using mobile data

1)
should be doing this anyhow!
2)
beating you with a rubber hose until you give up your passwords
communication/security.1509077095.txt.gz · Last modified: 2020/10/11 19:48 (external edit)