Adonis Diaries

Posts Tagged ‘Internet Privacy

Secure and Anonymous Wi-Fi:  2.5-mile Range

Next month during the Def Con hacker conference in Las Vegas, security researcher Ben Caudill will unveil a potentially game changing device called a ProxyHam.

Without question, the promise of ProxyHam should leave proponents of Internet privacy and anonymity beyond excited.

By relying upon a 900 MHz radio connection, Caudill’s device effectively serves as a long-distance Wi-Fi router.

Specifically, the ProxyHam can transmit a Wi-Fi connection up to a distance of 2.5 miles in ideal conditions.

As a result, even in scenarios where authorities manage to track down a target’s Internet connection, they might arrive on the scene (presumably a location with public w-fi access) only to find a ProxyHam device transmitting a low level signal perhaps thousands of feet away in any direction.

The event description for Caudill’s upcoming Def Con talk reads:

While a range of technologies (such as ToR) can provide some level of anonymity, a fundamental flaw still exists: a direct relationship between IP address and physical location.

If your true IP is ever uncovered, it’s game over – a significant threat when your adversary owns the infrastructure.

To resolve this issue, I present ProxyHam, a hardware device which utilizes both WiFi and the 900Mhz band to act as a hardware proxy, routing local traffic through a far-off wireless network – and significantly increasing the difficulty in identifying the true source of the traffic.

In addition to a demonstration of the device itself, full hardware schematics and code will be made freely available.

Speaking to Motherboard, Caudill explained that his device is ideally intended to be used as a complement to other privacy-oriented tools like Tor.

“We consider this the last or worst case scenario,” Caudill said, “the absolute fallback plan if everything else fails.”

As for the device itself, it’s comprised of a Wi-Fi enabled Raspberry Pi computer along with a setup consisting of three antennas.

One antenna, naturally, is tasked with connecting to a source Wi-Fi network.

The other two antennas work to transmit the Wi-Fi signal at a 900 MHz frequency.

In order to pick up the long-range signal, users will need to plug a 900 MHz antenna into their computer, which will leave your setup looking a little something like this.

Not exactly the epitome of mobility, but hey, it seems like a reasonable trade-off to us.

proxyham 900 mhz wifi shot
Image source: Adam Cohn

A Wired report sheds some more light on what makes ProxyHam so effective.

To avoid radio detection on the user’s end, ProxyHam’s wireless signals are designed to look indistinguishable from the many cordless telephones that use the same frequency.

And Caudill says the rise of more internet-connected wireless gadgets will provide further cover for ProxyHam users over time.

“There are a ton of devices jumping into that space and communicating there,” he says. “It’s not feasible to say ‘we’ll chase down everyone who has this device communicating on this frequency.’ It’s a needle in a haystack.”

For instance, some common items that communicate via 900 MHz frequencies include baby monitors and walkie talkies.

As for how ProxyHam might evolve in the future, Caudill tells Motherboard that he and his team are working to make the ProxyHam contraption less conspicuous.

Future iterations, for instance, might be small enough as to mimic the outward appearance of a book.

“If you throw this in a library it would take you years to be able to identify it,” Caudill said.

It’ll undoubtedly be interesting to hear more about ProxyHam once Caudill officially introduces the device at Def Con 2015, an event slated to kick off on August 6.

Andrew Bossone  shared and commented on this link.

Have fun.

Next month during the Def Con hacker conference in Las Vegas, security researcher Ben Caudill will unveil a potentially game changing device called a…|By Yoni Heisler
A call for securing social network privacy in Lebanon: Nicholas Sehnaoui, minister of Telecommunication
For many years, our communications were delivered to outside foreign sources, on the ground of providing the International Court with Data, in order to indict the perpetrators of the assassination of late Rafic Hariri PM.
The US and Israel got hold of every data and secret of every Lebanese citizens, and they want more.
For every assassination, or suspicion of an assassination in the planning, and they are in drove, the same requests for getting our data and private information are at stake.
Nicholas Sehnaoui, minister of Telecommunication, is haranguing the Lebanese to support efforts for consolidating the privacy of our communication.
“As a Lebanese Citizen I refuse to give up on my Internet Privacy
“Tonight, for the sake of our Privacy, I am calling for your support.A call to all bloggers, e-journalists, Tweeters and Facebook Users and all members of our Social Media Community.

Our Internet Privacy as Lebanese People is at stake.

Today I took a decision and refused a request from “Fer3 Ma3loumet” (Intelligence section within the internal security services) demanding content of all SMS
as well as username and password of all data sessions, BBM Webmail of 4 Million Lebanese.This request is unacceptable, illogical and cannot be justified. We cannot solve a crime by committing another crime.

The decision is now in the hands of the Council Of Ministers and this is where I need your support.

I need you to share awareness everywhere to put pressure on all Members of the Council and stop this invasion of our Privacy.


Use ANY means you find fit to say “As a Lebanese Citizen I refuse to give up on my Internet Privacy




December 2022

Blog Stats

  • 1,513,346 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by

Join 820 other followers
%d bloggers like this: