wutcnbrowndo4u
wutcnbrowndo4u t1_j6io0d8 wrote
Reply to comment by Figbud in MTA cuts free Wi-Fi from NYC buses by flightwaves
Damn, yes... Sorry about that.
wutcnbrowndo4u t1_j6frp4s wrote
Reply to comment by ICantThinkOfANameBud in MTA cuts free Wi-Fi from NYC buses by flightwaves
Your sarcasm is clearly masking extreme ignorance as to how the Web, the Internet, and computer security in general work, but I'll bite for one comment. Beyond that, feel free to do your own research (there's a website called google.com on which you can type "why is unsecured public wifi risky").
> Sniff the packets? Oh no, they found out what websites I visit
Leaving aside the obvious attack vectors of spoofing the access point or compromising the router, packet sniffing itself presents vulnerabilities. One of the primary reasons that defense in depth is a fundamental principle of network security is that a single browsing session interacts with a gargantuan number of different actors[1], and the odds of multiple gaps lining up is nonzero.
While you're checking out this Google website, look up what a "cookie" is in the context of the Internet. You may have noticed that you don't type in your password during every web request you make to a website logged in to, because you send cookie data instead that consistently identifies your different requests as belonging to the same session. Cookies are not encrypted with nearly the universality that passwords are, and an attacker with access to your cookie can impersonate you(r session) to the server that you're communicating with.
> What's that, they don't know what person on the bus I am?
I'll admit this last part of your comment made me question whether you even know what the Internet is. Are you under the impression that it's impossible for a browsing session to contain a collection of data that is useful without knowing what a person looks like or which seat on a bus they're sitting in? Are you under the impression that all successful hacks involve sending surveillance drones to visually identify the target?
[1] Not just the network infra and websites you're using, but every injected script and and ad on each of them
wutcnbrowndo4u t1_j6fk0oe wrote
Reply to comment by ICantThinkOfANameBud in MTA cuts free Wi-Fi from NYC buses by flightwaves
> passwords are all encrypted
The attack surface of the Web is massively more complicated than this.
wutcnbrowndo4u t1_j6fjd9k wrote
Reply to comment by Figbud in MTA cuts free Wi-Fi from NYC buses by flightwaves
> Even if you load the maps from the WiFi at LGA, chances are the map app will usually close by the time you get anywhere near where you're trying to go.
What do you mean by this? I did an around-the-world trip in 2015 without using SIM cards and it was pretty easy to get directions on Google Maps when I had a connection and follow them for arbitrarily long even after I lost the connection.
wutcnbrowndo4u t1_iw5fd0a wrote
Reply to comment by Smartch in [D] Current Job Market in ML by diffusion-xgb
It might also be different time periods. I talked to them a couple mos ago, at the beginning of all the tech hiring freezes
wutcnbrowndo4u t1_ivzez7r wrote
Reply to comment by maxToTheJ in [D] Current Job Market in ML by diffusion-xgb
I was chatting with a Meta recruiter during their hiring freeze (before layoffs) and they told me that MLEs were the only job category they were still actively hiring for.
wutcnbrowndo4u t1_j7l2qpz wrote
Reply to comment by youcantfindoutwhoiam in MTA spent twice as much on Second Ave subway consultants as it did on its construction by NYY657545
Pedantic, but La Defense isn't a neighborhood of Paris. It's outside the city of Paris.