{"id":234,"date":"2003-01-02T10:03:58","date_gmt":"2003-01-02T08:03:58","guid":{"rendered":"http:\/\/www.multiplicity.dk\/?p=234"},"modified":"2003-01-02T10:03:58","modified_gmt":"2003-01-02T08:03:58","slug":"wifi-security-the-true-story","status":"publish","type":"post","link":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/","title":{"rendered":"WiFi security: the true story:"},"content":{"rendered":"

AlterNet<\/a> carries this<\/a> incisive dissection of all the recnt babble about the lack of security of WiFi networks. <\/p>\n

It’s all so unbelievable manipulative that it makes me want to be sick. here’s an affordable technology that is powerful in it’s potential and governments, corporates and media are slicing iot to bit’s with contrived stories about how insecure it is. abusing the fact that john doe really doesn’t have the knowledge or experience to tell the lies from the truth, they are trying to kill off a technology with some potential for good. because they are afraid of the consequences?<\/p>\n","protected":false},"excerpt":{"rendered":"

AlterNet carries this incisive dissection of all the recnt babble about the lack of security of WiFi networks. It’s all so unbelievable manipulative that it makes me want to be sick. here’s an affordable technology that is powerful in it’s potential and governments, corporates and media are slicing iot to bit’s with contrived stories about […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1,17],"tags":[],"yoast_head":"\nWiFi security: the true story: • krag.be<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WiFi security: the true story: • krag.be\" \/>\n<meta property=\"og:description\" content=\"AlterNet carries this incisive dissection of all the recnt babble about the lack of security of WiFi networks. It’s all so unbelievable manipulative that it makes me want to be sick. here’s an affordable technology that is powerful in it’s potential and governments, corporates and media are slicing iot to bit’s with contrived stories about […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/\" \/>\n<meta property=\"og:site_name\" content=\"krag.be\" \/>\n<meta property=\"article:published_time\" content=\"2003-01-02T08:03:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@tkrag\" \/>\n<meta name=\"twitter:site\" content=\"@tkrag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tomas\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/krag.be\/#website\",\"url\":\"https:\/\/krag.be\/\",\"name\":\"krag.be\",\"description\":\"I am multiple and various - Tomas A. Krag\",\"publisher\":{\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/krag.be\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage\",\"url\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/\",\"name\":\"WiFi security: the true story: • krag.be\",\"isPartOf\":{\"@id\":\"https:\/\/krag.be\/#website\"},\"datePublished\":\"2003-01-02T08:03:58+00:00\",\"dateModified\":\"2003-01-02T08:03:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/krag.be\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WiFi security: the true story:\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage\"},\"author\":{\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0\"},\"headline\":\"WiFi security: the true story:\",\"datePublished\":\"2003-01-02T08:03:58+00:00\",\"dateModified\":\"2003-01-02T08:03:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage\"},\"wordCount\":104,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0\"},\"articleSection\":{\"1\":\"Wireless\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#respond\"]}]},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0\",\"name\":\"Tomas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c551b8d07191bf152b7a271de3489235?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c551b8d07191bf152b7a271de3489235?s=96&d=retro&r=g\",\"caption\":\"Tomas\"},\"logo\":{\"@id\":\"https:\/\/krag.be\/#\/schema\/person\/image\/\"},\"sameAs\":[\"https:\/\/linkedin.com\/in\/tkrag\",\"https:\/\/twitter.com\/tkrag\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WiFi security: the true story: • krag.be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/","og_locale":"en_US","og_type":"article","og_title":"WiFi security: the true story: • krag.be","og_description":"AlterNet carries this incisive dissection of all the recnt babble about the lack of security of WiFi networks. It’s all so unbelievable manipulative that it makes me want to be sick. here’s an affordable technology that is powerful in it’s potential and governments, corporates and media are slicing iot to bit’s with contrived stories about […]","og_url":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/","og_site_name":"krag.be","article_published_time":"2003-01-02T08:03:58+00:00","twitter_card":"summary","twitter_creator":"@tkrag","twitter_site":"@tkrag","twitter_misc":{"Written by":"Tomas"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/krag.be\/#website","url":"https:\/\/krag.be\/","name":"krag.be","description":"I am multiple and various - Tomas A. Krag","publisher":{"@id":"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/krag.be\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage","url":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/","name":"WiFi security: the true story: • krag.be","isPartOf":{"@id":"https:\/\/krag.be\/#website"},"datePublished":"2003-01-02T08:03:58+00:00","dateModified":"2003-01-02T08:03:58+00:00","breadcrumb":{"@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/krag.be\/"},{"@type":"ListItem","position":2,"name":"WiFi security: the true story:"}]},{"@type":"Article","@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#article","isPartOf":{"@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage"},"author":{"@id":"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0"},"headline":"WiFi security: the true story:","datePublished":"2003-01-02T08:03:58+00:00","dateModified":"2003-01-02T08:03:58+00:00","mainEntityOfPage":{"@id":"https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#webpage"},"wordCount":104,"commentCount":1,"publisher":{"@id":"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0"},"articleSection":{"1":"Wireless"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/krag.be\/index.php\/2003\/01\/02\/wifi-security-the-true-story\/#respond"]}]},{"@type":["Person","Organization"],"@id":"https:\/\/krag.be\/#\/schema\/person\/0a3bccef1d3b78b8f864bee3ed963db0","name":"Tomas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krag.be\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c551b8d07191bf152b7a271de3489235?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c551b8d07191bf152b7a271de3489235?s=96&d=retro&r=g","caption":"Tomas"},"logo":{"@id":"https:\/\/krag.be\/#\/schema\/person\/image\/"},"sameAs":["https:\/\/linkedin.com\/in\/tkrag","https:\/\/twitter.com\/tkrag"]}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8poVB-3M","jetpack-related-posts":[{"id":376,"url":"https:\/\/krag.be\/index.php\/2003\/07\/11\/wifi-hype-continued\/","url_meta":{"origin":234,"position":0},"title":"WiFi Hype – continued","date":"11\/07\/2003","format":false,"excerpt":"Yesterday, I wrote this item about an article on BBC's news site relating to WiFi hype in a developing world context. Simon Woodside commented on my post, noting that Open Spectrum is NOT deregulation as such, but mere RE-regulation. Simon is of course 100% correct. There is a huge difference\u2026","rel":"","context":"In "ict4dev"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":353,"url":"https:\/\/krag.be\/index.php\/2003\/06\/06\/wifi-in-india\/","url_meta":{"origin":234,"position":1},"title":"WiFi in India","date":"06\/06\/2003","format":false,"excerpt":"The Digital Divide Network: Over 200 rural villages in India's Maharashtra state have formed a wireless Internet cooperative, establishing 50 wi-fi \"hotspots\" in their communities. The co-op has managed to raise more than $400,000 (RS20 million) to expand the reach of wireless Internet locally. Maharashtra is not alone, however; communities\u2026","rel":"","context":"In "ict4dev"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":141,"url":"https:\/\/krag.be\/index.php\/2002\/04\/03\/us-wifi-market-racing-ahead\/","url_meta":{"origin":234,"position":2},"title":"US WiFi market racing ahead","date":"03\/04\/2002","format":false,"excerpt":"With the recent addition of Deep Blue Wireless, to the ranks of US companies trying their hand at provisioning WiFi networks, this business model is really about to get tested. Along with Sputnik and Joltage, Deep Blue is offering it's centralized billing and authentication software to people interested in setting\u2026","rel":"","context":"In "Wireless"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":253,"url":"https:\/\/krag.be\/index.php\/2003\/01\/27\/telecoms-in-afghanistan\/","url_meta":{"origin":234,"position":3},"title":"Telecoms in Afghanistan","date":"27\/01\/2003","format":false,"excerpt":"Telecoms and Wireless in Afghanistan: One Year Later is a nice brief report on the state of telecommunications infrastructure in Afghanistan. It features 2 interesting stories about the development in the past year, and about a possible path to follow in the future. Specifically the article entitled, \"Telecommunications in Afghanistan:\u2026","rel":"","context":"In "ict4dev"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":371,"url":"https:\/\/krag.be\/index.php\/2003\/07\/10\/wireless-pocket-snifer\/","url_meta":{"origin":234,"position":4},"title":"Wireless pocket snifer","date":"10\/07\/2003","format":false,"excerpt":"One of the things I really like about a PDA with built-in WiFi, is that you can carry it in your pocket, and have it sniff for wireless networks. When travelling, and wanting to avoid the huge costs of cell-phone based connections, or even commercial HotSpot sertvices, this is a\u2026","rel":"","context":"In "Wireless"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":350,"url":"https:\/\/krag.be\/index.php\/2003\/06\/05\/one-woman-it-show\/","url_meta":{"origin":234,"position":5},"title":"One-woman IT show","date":"05\/06\/2003","format":false,"excerpt":"BBC NEWS | Technology | Mature villager joins digital era I like anecdotal stories about succesful IT deployments in the developing world. I like them partially because to a certain degree they vindicate my interest in deploying Internet and Communication technologies in the developing world. And interestingly enough most of\u2026","rel":"","context":"In "ict4dev"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/posts\/234"}],"collection":[{"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":0,"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"wp:attachment":[{"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/krag.be\/index.php\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}