- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
399 lines
37 KiB
Plaintext
399 lines
37 KiB
Plaintext
Episode: 723
|
|
Title: HPR0723: How to be a safe computerist
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0723/hpr0723.mp3
|
|
Transcribed: 2025-10-08 01:31:46
|
|
|
|
---
|
|
|
|
Hi everyone, my name is Klaatu and this is Hacker Public Radio, Urban Camping Episode 8.
|
|
This is the final episode, I think I said there were going to be seven or eight or nine,
|
|
so this is it, eight, the final one.
|
|
I waited a little while to do this one because I was actually getting a lot of listener feedback.
|
|
Well actually to date I think probably more listener feedback on this series than I've ever had
|
|
on anything else aside maybe from a blender tutorial or something, but a lot of people it seems
|
|
kind of found this idea really either intriguing or really similar to something they were doing
|
|
or whatever. I as usual have done a horrible job of collecting all of the things that I was
|
|
supposed to collect about you know what they all said to me, so I'll just say that generally
|
|
speaking people have said that it's a really neat idea, something that they would really like to
|
|
try, something that they intend to try at some point, and two things off the top in my head
|
|
that people mentioned were one that hack spaces are really really good for an urban camping or
|
|
would be really good, and I think that is true. I've only been in real life to one hack space and
|
|
that was the one in New York, Rochester, New York area, and it was really cool and I can imagine if
|
|
I was really really close to a hack space and it was really convenient to get to it, I would probably
|
|
spend a lot of time in a hack space, probably pay the membership, do or whatever, get a key,
|
|
and just hang out there basically all the time because that would be fantastic. As I said in my last
|
|
episode episode 7, that can be also a little bit of a curse because there is that kind of, oh I'm
|
|
a geek, I don't have to go outside, I can just sit at my computer all alone and hack all day,
|
|
and while that's really really great for focus sometimes, sometimes it's not so good for kind of
|
|
getting your mind to be thinking out of the box and just meeting new people, which you know,
|
|
I mean we're human, it's pretty important to do that at some point. So, hack space could be
|
|
really cool, it could be good for collaboration if there are other people hanging out there a lot
|
|
as well, it could be good for social events as well if it's an active, you know, kind of busy
|
|
hack space. So that was a great suggestion from a listener. Another listener told me about something
|
|
that I'd honestly never heard of before it's called co-working, and it's kind of an interesting
|
|
thing, I don't really know much about it, but it sounds like it's a building that offers
|
|
something called co-working membership, meaning that you essentially, you rent I think like an office
|
|
or a space where you can work, do all kinds of things. You get 24-7 access, this, the guy who told
|
|
me about this, says that he found a place that was $300 a month, and that essentially gets you
|
|
internet connection, probably like telephone connection, I imagine I don't know, he didn't say
|
|
that explicitly, and a little space where you could of course, since it's 24-7 access, you could
|
|
actually even sleep there, and you get to meet more people again, it's not quite a hack space,
|
|
but it's basically a hack space because there are other people there doing whatever people do in
|
|
office environments or working environments. So it's, that sounds really cool, I would, I would
|
|
have loved to know about that a long time ago, and I'm going to actually start looking for these
|
|
things in my area, because that sounds exactly like what I've been looking for for a very long time.
|
|
So that's really good to know about, thank you very much, everyone who's commented, it's been
|
|
really great feedback, lots of cool ideas, great recommendations about different backpacks, coffee cups,
|
|
all kinds of things, so that's really, really neat. Another thing that I was actually talking to
|
|
the last known god about from, at the Indiana Linux class, which I just got back from recently,
|
|
we were speaking about finding food, you know, just outside, being self-reliant enough that you can
|
|
actually just feed yourself from things that you find in that strange thing called nature,
|
|
whether it's mushrooms or just plants or fruit, whatever. Mushrooms you should obviously probably
|
|
stay away from unless you've taken a class in it, but there are people who know a lot about it,
|
|
and they can't teach you that sort of thing. Plants, there's a really neat little book that
|
|
my friend Scarlett got me called the Illustrated Guide to Edible Wild Plants, which was put out by
|
|
the Department of the Army actually, but she found it at an anarchist bookstore, a nice little
|
|
breach of logic there, or not, not really, it's just an unlikely combination, I guess. And it was
|
|
put out by the Lions Press, you can find their site at lionspress.com, and it's a book with
|
|
pictures and everything about all the different kinds of plants that you might find just out there
|
|
in the world that you can actually chow down on. And it's a really fascinating book, and I think
|
|
that kind of survivalism sort of technique. Who doesn't need that? I mean, that's just really good
|
|
stuff to know. It's our planet we live on, we might as well know what we can eat and not eat. So,
|
|
so check either that book out or something similar to it. It's a pretty interesting study,
|
|
but in this episode we're going to talk very specifically about hacking as an urban camper.
|
|
Obviously, the crowd listening to this series are most of them, I think, are probably interested
|
|
in computing, hacking, things like that. So, when you think about it, the idea of being an urban
|
|
camper, you suddenly, it's almost, again, an unlikely combination, because if you're in love with
|
|
your computer and you want to be on your computer all the time, you want to be on the network all the
|
|
time. How do you do that? How do you have power? How do you have access to networks all the time?
|
|
If you're just out and about. Well, of course, in today's world, it's not that big of a deal,
|
|
and I've covered some of the things about going out and finding a good network and a good
|
|
place with refillable coffee and just kind of camping out there, and that's definitely applicable,
|
|
and that was, you know, that's generally what I do. But let's talk specifically about what we're
|
|
doing on the computers while we're doing that, and how not to be hacked ourselves, I guess. Now,
|
|
I'm no security expert. I actually know nothing about security. I just kind of know what people
|
|
talk about, so I'm going to tell you what I do when I'm out on public Wi-Fi networks and things
|
|
like that to kind of give myself a layer of security, but you should come up with your own
|
|
methodologies, and you should probably do more research on this and be smart, you know, just kind of
|
|
use your best judgment when you're out doing things. So, first of all, I mean, if you're out on a
|
|
public network that automatically right there kind of restricts what you should and should not be
|
|
doing on that network. For instance, if you're checking your mail via some kind of antiquated,
|
|
unsecured logins and things like, or unencrypted logins and things like that, you're sending your
|
|
password and plain text, all that other good stuff. If you are doing that, you really shouldn't
|
|
be doing that at all. It's a bad idea on a public network. So, if you need to check your mail with
|
|
these protocols, I mean, sometimes the mail provider that you're using might just, they may not give
|
|
you another option. Then, save that for later, save it for your friend's house, save it for a
|
|
network that you feel like you can trust a little bit more. Online banking, same thing goes. If you're
|
|
doing online banking and you're on a public Wi-Fi, you probably shouldn't be doing it on that network
|
|
at all. Period. I would probably save that for a trusted network. Those are just two obvious
|
|
rules of thumb that nevertheless people kind of violate any way all the time. So, the solutions
|
|
there would be, well, twofold, mobile banking because of the mobile phones out there that don't
|
|
do flash and things like that. A lot of the mobile banking sites nowadays will have a mobile
|
|
accessible site. This is usually a much smaller and simpler version of their typical mobile banking
|
|
site and a lot of times it'll just be that little, you know, it'll be like an m.mygreatbank.com,
|
|
instead of just www.mygreatbank.com. So, if you direct your browser to m.mygreatbank.com,
|
|
then you'll be taken to your bank. I'm assuming we are all knowing that I mean that you need to
|
|
substitute the name of your, you know, the domain of your bank for mygreatbank. So, m., you know,
|
|
whatever your bank is.com, you go there and suddenly you're on a much lighter weight version of
|
|
your banking site, which of course does nothing for security, right? But the other thing that I'm
|
|
going to talk about right now is the part where your tunneling stuff through more secured means.
|
|
Couple of different ways to do this. You can set up an SSH tunnel to a server somewhere
|
|
and then use the version of your browser over on that server. That's what I typically do. That's
|
|
really the only way to be honest. I know how to do it. It's very simple to do this actually,
|
|
but you do have to have a server. So, the idea would be, of course, to set up the server in some
|
|
safe location and go ahead and install some kind of X environment. It doesn't have to be fancy.
|
|
It just has to be enough, essentially, to give you enough for a nice graphical browser, like Firefox.
|
|
Set that up. Of course, you won't be able to actually see any of it. And you don't even really
|
|
have to launch the desktop, but it needs to be installed. And then when you SSH into that server,
|
|
do the SSH with a dash X flag. SSH dash X will allow the X forwarding to occur. And then you can use
|
|
the Firefox over on your server and do your mobile banking through the SSH channel. And since the
|
|
SSH channel, of course, is going to be slower than a normal HTTP connection to your bank. Using the
|
|
mobile version of your bank's site will help you a lot. Better than that, of course, is not doing
|
|
your banking on public networks. I've heard that X forwarding via SSH isn't exactly the best idea
|
|
anyway. It's not like the most secure thing in the world. I don't know, but it's something to keep
|
|
in mind. So, that's how to do that, though. Now, that brings me to a really important point of
|
|
the fact that you probably need a server. If you're going to be doing urban camping and you're
|
|
going to be hanging out on unknown networks, having that server, your own private cloud, essentially,
|
|
or semi-private because you probably don't actually own the hardware that you are constructing
|
|
the cloud on, but having a server in some remote location where you can access that server from any
|
|
network via some kind of tunnel, probably an SSH channel, it's a really good idea. So, you know,
|
|
you can just use that server. I mean, for every day surfing, I'm not saying you need to be on your
|
|
little private server cloud, but four things like that for an emergency mobile banking session,
|
|
or checking your email when you know that your email may not be the most secure email service around.
|
|
Stuff like that. For a while, at the very beginning of my really serious urban camping thing,
|
|
which was last year, for really, practically, all of last year, I was using, at the very beginning,
|
|
I was using what I'd been using for a while, which was sdf.lonestar.org. And sdf.lonestar.org is
|
|
kind of cool because it's a secure shell account. If you pay your lifetime membership of $36, you get
|
|
a secure shell account, you can SSH in, you can use it as your primary or your secure email address
|
|
because now you're SSHing in, so you can check all your email there. So, it's a great little thing
|
|
to have. It's a server, it's a cloud that you can access quite securely and use for a lot of
|
|
different things. The only problem with it, I guess, is that I found it ever so slightly too slow,
|
|
a little bit slower than I would have preferred, I guess. And I also found it ever so slightly,
|
|
and I mean, ever so slightly unreliable. And I don't mean that sdf.lonestar.org is unreliable,
|
|
because it's a great service. I love it, and I still have my account, and we'll continue to have
|
|
my account and continue to enjoy it. But there would be just one or two times where I would try to
|
|
access them, and they were moving their server. There was a big server move last year, actually.
|
|
It wasn't a big deal, I mean, really, really wasn't. But I just, it kind of drove home for me,
|
|
that I felt like I needed something a little bit more, something I could really kind of point to
|
|
and call my own and be paying for and say, hey, I want that server to be right there and online
|
|
all the time, no matter where I was. So, doing that meant getting a VPS, a virtually, a virtual
|
|
private server. And doing that alone would have been a little bit costly, perhaps. But I managed
|
|
to find two, three other people who actually were interested in doing the same thing, having a
|
|
virtual private server. And so, we all kind of pitched in, and we all pay, you know, a quarter of
|
|
the server cost. And we now have our own little private-ish cloud. Again, we don't actually own
|
|
the hardware, but the server is there. So, I guess I don't really use this private cloud
|
|
so much for, you know, the sort of common use of it like, oh, here's my email and all my online
|
|
documents and all the things that are important to me that I need to have everywhere. And here's
|
|
all the things that are important to me and that I need to have everywhere. I don't really do
|
|
that. I quit the contrary. I keep the stuff that's important to me off of anybody's cloud. So,
|
|
I don't use it for that, but I do use it as a kind of a gateway out of whatever public Wi-Fi or
|
|
public network that I'm on and out into the rest of the internet. Setting up the SSH channel, of
|
|
course, is just as simple as I said. I mean, it's just literally just SSH with the dash x flag.
|
|
If you need the graphical stuff, although if you don't and quite often I don't, you can simply
|
|
SSH and use links for your web browsing, use mud or pine for your email and really whatever else
|
|
you want to do on the cloud. So, having that is a great idea. Finding a couple of people who you can
|
|
trust, who can go into a kind of roommate situation with you on this server, on the VPS,
|
|
each kind of chip in for paying the bills. It makes it really, really manageable and gets you
|
|
out of the public network that you'd otherwise just be kind of a sitting duck on and gives you
|
|
a little tunnel out into the rest of the world and gives you a little bit more security and also
|
|
kind of frees you from things sort of the more obvious alternatives to doing that. You know,
|
|
things like, well, I'm using Gmail. So, it's got an HTTPS connection. So, who cares? Well, no one
|
|
except the Gmail has all your email anyway. So, yeah, who does care? So, using the server for that
|
|
is not a bad idea. Disadvantage to that. So far, it's only been speed. In terms of connecting to
|
|
that server, I've not had a problem yet. I've not encountered a public network that blocks
|
|
SSH access. For instance, I just don't, I don't run into that so far. In terms of speed, yeah, I've
|
|
noticed, you know, every time I do it, practically, I notice that, yeah, I'm association to my server.
|
|
It is slow. If you want a really nice server, it's going to cost a lot of money and you still might
|
|
not even be getting that great of a connection. It just kind of depends on what network you're on.
|
|
This particular server that I'm paying part for really, really dirt cheap and it feels slow.
|
|
It doesn't have a whole lot of RAM, no matter what network I'm on, unless I'm just getting really
|
|
lucky and I guess none of my other, none of the other people actually on that physical box,
|
|
you know, not my, not my paying roommates and, and fellow users, but those other people out
|
|
on that server who have their own little VPS partitions, you know, if they're not on it,
|
|
then I'll, I'll, I'll feel like the speed is okay, but more often than not, I, I, I feel the,
|
|
the performance hit. So that's just something to be aware of. Also doing cool things online, of course,
|
|
always, there's Tor. Tor, as you probably already know, I've actually interviewed, I think, well,
|
|
I know, I've interviewed, I think it was for HPR Wendy, one of the people who is currently with
|
|
Tor or was with Tor and is now with EFF or vice versa or both, but she's a really smart lawyer,
|
|
hacker type and it's really cool. So we all know about Tor. It's, it's a great project.
|
|
Setting it up is surprisingly easy and I'm talking about setting it up for the more common,
|
|
the most common use, which is, oh, I'm going to browse. I want to be anonymous about where I'm
|
|
coming from or what my, you know, who and what I am tap into Tor for that. This isn't really
|
|
something that I think you're going to need so much from a public network since public networks
|
|
by their nature are, are fairly anonymous. If I'm wrong on that, you know, I mean, don't quote me,
|
|
first of all, but if I'm wrong on that and if Tor anonymizes you even more than, than, than what
|
|
I'm aware of, then don't listen to me. But otherwise, I don't know, I don't tend to use it from
|
|
public networks so much as I do from networks that I, you know, my friends network or the work
|
|
network. That kind of thing where I, I'm there frequently, someone else owns the network. I don't
|
|
want either myself or them necessarily being on the record as having gone to certain places. So
|
|
you do it with Tor. Tor used to kind of confound me a little bit in terms of setting it up because
|
|
you'd see all this crazy stuff about how, how many options you've got for this setup and how to,
|
|
um, how to configure your browser to use it automatically and all these different buttons and
|
|
plugins and Vidalia and all these other things that frankly, I can't be bothered to even figure
|
|
all that stuff out. So I'm going to tell you exactly how Tor is done on my computer. So my computer
|
|
runs Slackware. So this is going to be biased toward that. But I mean, in theory, you know, if you
|
|
listen to all the all the cliches, Slackware is really, really hard to use. So if I can do it on
|
|
Slackware, you should be able to listen to how I do it and emulate it with great simplicity and ease
|
|
on whether whatever distribution you're running. So on Slackware, this is actually straight out of
|
|
the Slack build that I use in order to get all this stuff done. So it's not anything that I've
|
|
actually figured out as much as it is something that I just am copying from the instructions. So it's,
|
|
it's very, very easy. The first thing that I do is install LibEvent because it's the direct
|
|
dependent, the Tor requires LibEvent. So if you install LibEvent on your computer, you'll have
|
|
the dependency for Tor. And then you do a group add space, g space 220 and you call that group Tor.
|
|
And we're using 220 because it's quote unquote recommended. I don't know why it's recommended
|
|
to be that except that it's, you know, a low number. So it's kind of a system kind of user.
|
|
I understand that part. I don't know why else it's recommended. Then you add a user.
|
|
User add dash u 220 dash g meaning assign them primarily to this group 220 which of course is the
|
|
Tor group we just created. Dash c you can comment, you know, make a comment like this is the Tor user
|
|
or, you know, the onion router, whatever. It's just a human readable comment for yourself. Dash d
|
|
slash dev slash null slash s slash bin slash false and then name that user Tor. So basically you're
|
|
creating a fairly powerless user in terms of logging into your system. The default shell would
|
|
not be a shell. It would be slash bin slash false. So that wouldn't do anyone much good if they
|
|
were able to somehow get into your computer with the username Tor. But Tor can use this username.
|
|
And you do that and you run the Slack build and it installs Tor. Really as simple as that.
|
|
The newest version I think is like, I don't know, 1.2.30 or 2.1.30 something with a 2.1 and a 30 in it.
|
|
It works great. It's easy to use. Once it's installed, you simply drop down to a command line
|
|
and you type in the word Tor TOR. If you look, if you open another terminal after you've done that
|
|
and then look at the the the config file which at least on Slackware is slash edc slash Tor slash
|
|
Tor RC. If you look at that, it tells you exactly what ports Tor is running on as the thing that you
|
|
will interact with. And the default on that right now is Sox port 9050. And the address for that
|
|
since it's running on your computer that you're about to use for the connections, it would be Sox
|
|
listen address 1 2 7 dot 0 dot 0 dot 1. And that's almost all you need. There might be some other
|
|
stuff, but I'm actually fairly sure that that's really all you need in your config file for this
|
|
to work. So we know that the port that it's using is 9050 and you know that the the the IP address
|
|
that you should be looking for your little Tor server essentially is your local host 1 2 7 dot 0 dot
|
|
1 dot 1. So just to test all of this out, the first thing to do and no, it's not finished yet,
|
|
don't panic. The first thing that we want to do is just for kicks go to what's my IP dot com or
|
|
dot org rather. What's my IP dot org of course will show you what your broadcasting as your address
|
|
is. So in my case right now it's 8 9 dot 2 3 3 dot 8 2 dot 7 1. Now you've established that now open
|
|
up your preferences in Firefox edit preferences go to the network tab in the advanced section
|
|
and right at the top it says connection and figure out how Firefox connects to the internet. And
|
|
if you go into the settings of the connection settings, you have four four choices. No proxy,
|
|
auto detect proxy, use system proxy or manual proxy. I use the manual proxy and I simply type in
|
|
down at the socks host because that's what kind of that's the kind of port or proxy tour is,
|
|
it's a socks proxy. So type in for socks host list 1 2 7 dot 0 dot 0 dot 1 and where it asks you
|
|
what port to look at type in 9050. Click OK. Now Firefox for this for right now until you change it
|
|
is using a socks proxy that is pointing at the 9050 port which is tour which is running on your
|
|
computer. So the IP address of that is 1 2 7 dot 0 dot 0 dot 1. Now if you go to what's my IP dot org,
|
|
it's going to take a while because you're going probably all over the world. And there it is.
|
|
Your IP address 1 9 dot 1 3 1 dot 6 2 dot 1 3 3. Completely different from what your other IP
|
|
address was. And so now as long as you're using Firefox, you're now browsing the web completely,
|
|
well very anonymously. Of course, tour will tell you that it's not completely anonymous quite
|
|
probably and you should be very careful. So again, if you're doing this and it's the life-threatening
|
|
situation, don't listen to this show for all the advice. But that's that's the simple way to get
|
|
tour up and running. It's really, really that easy. And next thing you know, you're you're going
|
|
all over the place to get to, you know, whatever site you're really trying to get to. And it's
|
|
quite quite a cool experience. And quite a bit slower. So keep that in mind. But it's a good
|
|
thing to know about. The only other real tip I have I guess is a very, very simple command called
|
|
TCP dump. This is one of those commands that people really could. And you know, someone really
|
|
should, especially on a network called hacker public radio. But yeah, someone could and should do
|
|
an entire series on TCP dump and how to use it. I barely know anything about it except that if
|
|
you sit in a cafe and you've got a notebook computer that you can put the Wi-Fi card in monitor
|
|
mode. And you can use the IWU config command to put it in monitor mode or for miscus mode,
|
|
some people call it. You can use TCP dump to then monitor the all the traffic that is flying
|
|
through the air anyway. All you're doing is instead of sending your own signals out, you're
|
|
just getting everything. You're looking at everything as it passes. It's really cool. And the the
|
|
command for that would be TCP dump dash in in V capital X capital S small S one five one four.
|
|
That should that should get you started anyway. There's a couple of other things you could do
|
|
either more or less than that. But that basically turns on a lot of verbosity and it captures all kinds
|
|
of packets, I guess. And it also sets how in what bite sizes you're capturing it in. That's the
|
|
one five one four part. It's it's a neat command. You'll see amazing things on the in the far
|
|
right hand column. You'll just see amazing things. You got to try it in a busy cafe where lots of
|
|
people have their iPhones and their computers out do that. And that'll just fascinate you for for
|
|
days really. Obviously there's all kinds of places you can go from there. That's like the really
|
|
most basic thing. And that's I'm only giving you the most basics because that's as much as I know.
|
|
You know, no, as much about TCP dump as I do. People will tell you, oh, you've got to try
|
|
wire shark or T shark instead of TCP dump and all these other things. And I totally agree,
|
|
but I don't know how to. So I can't really talk a whole lot about that. But it is it is fun. I mean,
|
|
there's there's cool things like you know, you can TCP dump dash S one five one four port 80 dash
|
|
W, you know, TCP 80 dot dump whatever point being that you can you can tell TCP dump to just
|
|
capture stuff on port 80, which obviously is going to be all the internet stuff. And it'll ignore
|
|
all the all the other extraneous what what we would probably consider noise. I'm sure someone
|
|
who was really smart and knew what all that noise meant wouldn't call it noise, but but there you go.
|
|
So it's yeah, it's it's a lot of fun. And there's a lot of filtering that you can do in TCP dump alone.
|
|
I know that there are other programs that filter all this information a lot more effectively
|
|
and dynamically, but it's it's kind of cool because you can just see all kinds of traffic
|
|
flying by your computer. And even if you don't know what it all means, it starts to give you a
|
|
little bit of a better idea of what exactly all that traffic really is. All kinds of interesting
|
|
things to just look at. And for for what you're doing just for fun, I don't really tend to I don't
|
|
pretend that this is like anything evil or subversive at all. It's because it's not. It's just
|
|
it's really just monitoring traffic. And happily most people are are most sites important sites
|
|
encrypt their their traffic. So you're not even going to see stuff unless you really really know
|
|
what you're doing and and and really really try to see it. But you will see interesting stuff
|
|
nevertheless. You know idle conversations on on G chat sometimes, but not really any passwords
|
|
or anything. I mean, unless you're really looking for it. I'm not really looking for it. I miss all
|
|
that stuff. I think it's just cool to look at these little packet headers and all the and really
|
|
what makes all this data that's flying through the air to get reconstructed, you know, to get
|
|
routed and then reconstructed. It's very cool study. So you should definitely do that. I mean,
|
|
if you're going to be sitting outside on a public network, you kind of owe it to yourself and,
|
|
you know, to the network to monitor it. It's it's just cool. Now on that subject, there is a cool
|
|
little device that you can get from a place called Meda Geek. That's NETA GEK and it's called
|
|
the Y Spy and that name sounds a lot more subversive again than it really is. The Y Spy is a little
|
|
antenna and that really is all it is. It's an antenna that you plug into your USB port and the
|
|
device monitors the level of traffic on different frequencies. It is not a full spectrum analyzer. It's
|
|
not analyzing all possible spectrum, you know, all possible frequencies on that frequency chart,
|
|
you know, the FCC kind of runs. It's just monitoring Wi-Fi traffic range and it does this with two
|
|
different tools. There's an in-curses interface and there's a GUI interface and both of them are
|
|
fairly easy to install on Linux. You have to kind of do it from source code. Well, actually,
|
|
I think it might be available for Debian or something but I generally just do it from the source that's
|
|
included on the on the disk that you get with the antenna or if you don't get a disk or you don't
|
|
have a disk, you can download it from the project's website which is a source for project. It wouldn't
|
|
do you any good without the device so it's a front-end, you know, it's a soft interface for this little
|
|
piece of hardware. So you plug the USB antenna into your USB connection. It becomes just a monitor
|
|
of frequency traffic and you can then find out where in the frequency spectrum you might find
|
|
more or less stuff to either monitor or compete with depending on your goal. So if it's a setup where
|
|
you've got lots of choices of which public network you're going to join or whatever, then you can
|
|
choose your channel accordingly. Or if you just want to find out where most of the traffic is,
|
|
that's a really quick and easy way to monitor where all the action is happening. It's a really
|
|
fairly quick and drastic noticeable thing. I mean, it gives you a little chart and the stuff that's
|
|
really, really busy just peaks up really quick. You'll see it right away and you can jump onto that
|
|
channel if you want or you can avoid that channel if your goal is to stay off the noisy networks
|
|
and enjoy a little bit of peace and quiet. So that's MetaGeek and the product is called Why Spy.
|
|
Of course having little antenna popping out of your notebook could be a little bit suspicious
|
|
looking, don't you think? Well, interestingly you'd think so and actually a lot of people don't
|
|
ever, ever seem to notice it at all and those who do assume that it's a cellular modem. So it's
|
|
actually not that suspicious. However, that is one thing that you'd want to keep in mind.
|
|
As I've said in previous episodes, keeping up an appearance of some kind of normalcy is actually
|
|
really important to an urban camper. You don't want to arise suspicion or disapproval or
|
|
anything like that. If your goal is to find peace and quiet and places to hang around and potentially
|
|
get free food or really cheap food or just a place to stay out of the heat or the cold, whatever.
|
|
So having a little USB antenna popping out of your laptop might be fine. In some areas it might
|
|
not be in other areas. Having your computer on while you're just sitting in your car outside
|
|
of a residential house, you might not be doing anything at all suspicious. You might be sharing
|
|
their network. You might not be. It just depends. Point being that kind of thing tends to draw
|
|
attention to you. So be smart about it. I guess is what I'm really trying to get to here. Don't
|
|
the goal here is not to look like a cool superhero evil hacker. The goal is to be a good
|
|
computerist, to be a good hacker, to sit down and get your work done. Be smart about it. Be safe
|
|
about it. Protect your data on the way out to the network and back and learn about it and study it
|
|
and that's it. So that's what I tend to like to do and I tend to be very mindful of, for
|
|
instance, how glowy my laptop screen is when I'm out at night in places that would raise some
|
|
suspicion if I'm seeing just kind of hanging out for hours at a time outside of someplace
|
|
with a glowing laptop screen or sitting in some place where maybe they're a little bit sensitive
|
|
about the security of their network and here you are scanning it with an antenna poking out of
|
|
your laptop, kind of asking for trouble. So you shouldn't ask for trouble. Overall, I think that
|
|
urban camping and kind of hanging around places, exploring different networks, exploring different
|
|
ways to protect yourself from people who are smarter than you on that same network and how to
|
|
just kind of be smart about the way that you are transmitting your data since all the hackers are
|
|
supposedly so computer savvy and we all want to protect data and all this other good stuff. If
|
|
you're unfamiliar with these basic tools like SSH tunneling and I guess tour and how to set up a
|
|
proxy, just little things like that, I don't know, it seems like there's a breach of what you're
|
|
saying and what you're doing there. So being an urban camper and actually being able to explore
|
|
how do I implement these things, it's really powerful stuff and I think of all the things of urban
|
|
camping in terms of learning stuff, having a lot of time to really explore all the different things
|
|
that the hacker culture is always talking about, the community is always talking about like the
|
|
security and and all the cool things that you can do on a network and all these things and servers
|
|
and all that good stuff. A lot of it happened during urban camping for me because I could sit down
|
|
and I could focus and I had a real, I had a different environment every day if I wanted, you know,
|
|
I had all kinds of different things going on. I'd have different problems pop up quite unexpectedly,
|
|
all when all I'm trying to do is find onto my server to check an email, you know, there'd be some
|
|
weird issue, some random cookie that someone wants to give me that maybe I don't want to accept.
|
|
An SSL search check that I'm not doing what I'm checking my mutt mail that maybe I should be
|
|
checking the SSL, maybe I should learn how to download that SSL search and actually utilize it so
|
|
that I'm finding into the same server every time. Little tiny details like that, you can start really
|
|
concentrating on them because no longer are you kind of complacent in your own home where hey,
|
|
you're wired straight to Comcast or Verizon or whatever big evil corporation you're
|
|
hooking into for your internet. You're not, you're not there anymore, you're doing cool,
|
|
different things, you're doing with different network setups, you're, you're looking at,
|
|
at the way, once this admin or, you know, the guy who knows how to make the internet work at one
|
|
cafe set up their network versus the corporate setup that some franchise has. It's really interesting
|
|
study and it's just as interesting as the people that you'll meet when you're at urban camping and
|
|
the different experiences you'll have when you're urban camping. The computing side of it,
|
|
it gets really interesting really fast if you let yourself go along that path and study it and
|
|
think about it and learn more about it. So that's yet one more recommendation on why you might
|
|
want to urban camp because the computing becomes a lot more fun. So look into all of those things,
|
|
look into a VPS or a server that you can use, look into configuring your, your mail so that you're
|
|
actually not sending plain text passwords or whatever or even user names, look into getting
|
|
someplace that you can SSH into, set up tours, start using TCP dump and email me, let me know how
|
|
it's all going, email me tips, email me stuff that you've learned, whatever. And most of all,
|
|
I just remember that urban camping is exactly what I didn't realize, but I think all of this
|
|
actually do realize that we, I think the hacker community, at least HPR listeners who I've heard
|
|
from have been really, really open to the idea, really, really excited about the idea. And I think it's,
|
|
it's for lack of a better description, it is, it's hacking society, it's hacking the status quo.
|
|
You're, you're, you're taking exactly what people want you to live your life in in a certain way
|
|
and you're taking that and, and you're not going with it at all or you're doing what you want to
|
|
on your own terms. And that's really exciting stuff because that's how things get done. We do it
|
|
ourselves, right? We, we change our own lives. We change the way that we do things. We learn stuff
|
|
on our own and then we do whatever we want to. And that, that's freedom, I guess. So enjoy
|
|
that freedom. And thanks again for listening to this mini series, The Hacker Followed Radio
|
|
mini series on urban camping. Talk to you next time.
|
|
One evening as the sun went down and the young blue fire was burning. Now the track came a
|
|
little hiking and he said, boys, I'm not turning. I'm headed for a land that's far away
|
|
beside the crystal fountain. So come with me, we'll go and see the big rock candy mountains
|
|
in the big rock candy mountains. There's a land that's fair and bright where the handouts grow
|
|
on bushes and you sleep out every night where the box cards all are empty and the sun shines
|
|
every day on the birds and the bees and the cigarette trees. The lemonade springs where the
|
|
blue bird sings in the big rock candy mountains. In the big rock candy mountains all the cops
|
|
have wooden legs and the bulldogs all have rubber teeth and the hens lay soft boiled eggs.
|
|
The harmless trees are full of fruit and the barns are full of hay. Oh I'm bound to go where
|
|
there ain't no snow where the rain don't fall. The wind don't blow in the big rock candy mountains.
|
|
In the big rock candy mountains you never change your socks and the little streams of alcohol
|
|
come a trickling down the rocks. The breakmen have to tip their hats and the railroad bowls are
|
|
playing. There's a lake and stew and a whiskey too. You can paddle all around them in a big canoe
|
|
in the big rock candy mountains. In the big rock candy mountains the jails are made of tin
|
|
and you can walk right out again as soon as you are in. There ain't no short handle shovels,
|
|
no access, saws or fix. I'm going to stay where you sleep all day where the hunglicer
|
|
that invented work in the big rock candy mountains.
|
|
I'll see you all is coming fall in the big rock candy mountain.
|
|
Thank you for listening to Hack the Public Radio.
|
|
HPR sponsored by Carol.net. So head on over to C-A-R-O dot-N-T for all of us in the
|