ViRGE
Elite Member, Moderator Emeritus
- Oct 9, 1999
- 31,516
- 167
- 106
I'll try to respond to these as I can.

I'm not purposely posturing, I'm serious and sincere about all of this. To that end I don't believe I'm missing the point, but please tell me if I'm wrong.I really think you 2 are missing the point or purposely posturing.
As others have pointed out through various links by now, that's incorrect. WPA2-AES has no known weaknesses, meaning the only method of recovering passwords is to dictionary attack or brute force it all. If the problem is indeed your network being compromised over wireless, then exclusive use of WPA2-AES with a strong key should repel all invaders. WEP, WPA, and WPA2-TKIP are all considered insecure in 2013.No amount of wireless security is going to prevent something like this.
These days, yes. Most wireless routers come with reasonably thorough advice to use WPA2-AES with a strong key, and what a strong key is.Do you really expect every person to be able to know how to lock down a network?
Yes. To use a car analogy, an internet connection is a valuable tool, like a car. And like a car it's registered, so authorities and others know who it belongs to. So if your tool (heh, heh) gets used in a crime, it's reasonable to expect the owner to prove that they were not the user of the tool at that time. If they can prove that, then they may be unfortunately negligent, but they obviously aren't a criminal.Do you honestly believe that it is the consumers responsibility?
For the record, you're confusing wireless network hacking with spearphishing. In those cases attackers broke into various networks by stealing credentials from employees caught in said spearphishing attacks. The network actually did exactly what it was supposed to.Companies can't even keep their networks secure and those are blamed on the hackers. See the double standard here?
And that's proof. That's really good proof. It means they were able to connect to a machine operating on or through your network and exchange data for the file in question. To be clear here, trawling for copyright infrigers through BitTorrent involves querying trackers and DHT swarms and then confirming that the IP in question is engaging in infringement. This is done by connecting to the machine, thereby confirming a 2-way connection and consequently a valid IP.The overall point to this portion is, they have no proof. At all. They have an IP.
Actually, I believe you. I'm not giving you this advice because I want you to somehow profess guilt. I'm giving you this advice because for the good of the rest of the Internet I'd like for you to secure your network.It has nothing to do with if I may or may have not downloaded material in the past. You are letting the thought process of "he must have downloaded it" cloud the subject.
Last edited:
