Anti-Wi-Fi paint for WiFi Security

Status
Not open for further replies.

mikepdx

Member
Joined
Dec 19, 2002
Messages
877
Location
Corbett, OR USA
Anti-Wi-Fi paint keeps your wireless signal to yourself

Developed by the University of Tokyo, the paint is said to be the first that can block radio frequency in higher spectra where Wi-Fi and other higher-bandwidth communications occur rather than just low-frequency wireless like FM radio. Most Wi-Fi technologies operate at 2.4GHz; the Tokyo paint can reportedly block frequencies all the way up to 100GHz, with a 200GHz-blocking paint now in the works.

Anti-Wi-Fi paint keeps your wireless signal to yourself
 

poltergeisty

Truth is a force of nature
Banned
Joined
May 7, 2004
Messages
4,012
Location
RLG, Fly heading 053, intercept 315 DVV
Ez-12

YouTube - HOW TO MAKE A WIFI EXTENDER

Seems more logical than a human microwave...

Of course with this method the client is not using a parabolic ant. Client: Laptop, wireless printer Wii, etc. Any hardware susceptible to attack. But it does cut down non-directed (for lack of a better term. Spurious?) emissions.


Finally there's.. https://www.grc.com/passwords.htm Make sure all hardware supports the WPA2 algorithm and at least 64 hexadecimals. No need to remember, it's save. The key would be saved in the software, right....? I don't type in that long ass string all the time.
Always config. with a network cable first!
 
Last edited:

dracer777

Member
Premium Subscriber
Joined
Mar 26, 2009
Messages
738
Location
South Dacono, CO
Wirelessly posted (MOT-QA30/00.72 UP.Browser/7.2.7.5.610 (GUI) MMP/2.0)

Uhm..... WPA2 enterprise if youre sooooo worried.....

I don't understand taking all this time to paint when it still will leak through windows and such. If you are so incredibly worried, don't do wireless. I would rather use WPA-2 enterprize, or even just WPA for my super-sensitive data, than using RF blocking paint along with an insecure connection.
 

RayAir

Member
Joined
Dec 31, 2005
Messages
1,947
So will this stop my NSA employed neighbor from running TEMPEST surveillance attacks on my computer?
 

dracer777

Member
Premium Subscriber
Joined
Mar 26, 2009
Messages
738
Location
South Dacono, CO
Wirelessly posted (MOT-QA30/00.72 UP.Browser/7.2.7.5.610 (GUI) MMP/2.0)

If you change the key by the hour, most likely. However, it would be much easier to break into the system via the internet, than breaking WPA2 Enterprise. If you want the NSA to stop spying on you, don't connect to the internet, and network everything via ethernet. Hope that helps! lol
 
Last edited:

dracer777

Member
Premium Subscriber
Joined
Mar 26, 2009
Messages
738
Location
South Dacono, CO
Wirelessly posted (MOT-QA30/00.72 UP.Browser/7.2.7.5.610 (GUI) MMP/2.0)

Ok N-Jay, firstly, I read the wiki on "TEMPEST" and found it confusing. I probably could figure it out, but somehow, I think it would be easier for you to summarize it.... Yes, I'm volunteering you. lol. From what I read, it basically is the NSA unintentionally monitoring comms???

Secondly, you have to admit my above post was amusing at the least. lol
 
N

N_Jay

Guest
Yes, you post is "amusing".
:lol::twisted::lol::twisted::lol::twisted::lol:
(Honest, We are laughing with you and not at you)

TEMPEST is a program to investigate and certify equipment as secure from monitoring by "Compromising emissions".

At the simplest level you can think of "Compromising emanations" as information leaks such as someone being able to receive the "noise" (RF or electrical) from your keyboard cable and decode what is being typed, or the "noise" (RF or Audio) from your monitor and decode what is being displayed.

As an example, early versions of multi-line desk phones with LEDs instead of lamps could be monitored optically by monitoring minor fluctuations in the intensity of the light.
 

dracer777

Member
Premium Subscriber
Joined
Mar 26, 2009
Messages
738
Location
South Dacono, CO
Wirelessly posted (MOT-QA30/00.72 UP.Browser/7.2.7.5.610 (GUI) MMP/2.0)

Wow.... That's crazy. I will have to read up on that, it sounds like something I'd love to learn about. Thanks for explaining it.

And, it's ok, if you ever want to laugh at me..... by all means, do. lol
 

radiofan1

Member
Joined
Aug 20, 2009
Messages
190
In the Navy they (used to) dog all the waterproof doors down tight and aim directional microphones toward the radio room, trying to hear the teletype machines print secure traffic and other emanations from the cryptographic receivers, same thing kinda...? All the crypto machines had a sort of metallic mesh-like material around the drawer edges to block rf and/or acoustic noise from the device from escaping.
 

poltergeisty

Truth is a force of nature
Banned
Joined
May 7, 2004
Messages
4,012
Location
RLG, Fly heading 053, intercept 315 DVV
So will this stop my NSA employed neighbor from running TEMPEST surveillance attacks on my computer?

:lol: Forget tempest lets look at the basic XOR of your wireless keyboard! :twisted: :wink:

Oh yeah! tempest??? What about Rhyolite? :lol: All your WIFI signal belong to R us

Hawha Hawha Hawha Hawha .. In the best Chinese accent I can muster
 
Last edited:

dracer777

Member
Premium Subscriber
Joined
Mar 26, 2009
Messages
738
Location
South Dacono, CO
Wirelessly posted (MOT-QA30/00.72 UP.Browser/7.2.7.5.610 (GUI) MMP/2.0)

Haha, i wonder how difficult it would be to decode that.... anybody?
 
Status
Not open for further replies.
Top