Welcome to City-Data.com Forum!
U.S. CitiesCity-Data Forum Index
Go Back   City-Data Forum > General Forums > Science and Technology > Internet
 [Register]
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
View detailed profile (Advanced) or search
site with Google Custom Search

Search Forums  (Advanced)
Reply Start New Thread
 
Old 08-27-2014, 01:34 AM
 
Location: In my skin
9,230 posts, read 16,546,473 times
Reputation: 9174

Advertisements

Quote:
Originally Posted by Tatooine View Post
Well, it could look he's picking up a neighbor's wifi hotspot, maybe? Perhaps she could name the hotspot "Smith Family" or whatnot. When he's home, she could switch to his hotspot.

Does she have a laptop? Can she bring it to Starbucks or a public library to use internet? It just worries me that if he discovers what she's doing (and if he's an IT guy, who knows what other things he could be doing to her computer), it could anger him and then go downhill from there.
I agree, it's a risk. I think she knows how to work around him. It's just better to have an additional option.

Quote:
Originally Posted by Huckleberry3911948 View Post
people that dont like to be watched often are up to no good.
financial infidelity is a biggie.
you are of course calling snooping domestic abuse. we can put whatever spin on it that suits us, however the bottom line is we dont trust each other. the question is should we?
There is no "we" or "us" on the spin cycle, dear. That's all you. Minimizing it seems to suit you. I have enough info to determine she is a victim of domestic violence, so that was never up for debate and not the point of this thread.
Reply With Quote Quick reply to this message

 
Old 08-27-2014, 01:46 AM
 
Location: Kaliforneea
2,518 posts, read 2,058,060 times
Reputation: 5258
in regards to the technical question of a "sniffer"
a sniffer allows the network administrator to capture and read all activity on the network, wired and wireless, without installing any spy software on the target laptop or phone client who uses that network.
Packet analyzer - Wikipedia, the free encyclopedia

There are ways around the sniffer, but they are beyond the scope of this discussion and the presumed abilities of the battered woman.

Her best course of action is to contact the police, and the local battered woman's shelter, for resources to help her in scenario - not hacker tips.
Reply With Quote Quick reply to this message
 
Old 08-27-2014, 05:32 AM
 
41,813 posts, read 51,051,710 times
Reputation: 17865
Quote:
Originally Posted by PassTheChocolate View Post
So it sounds like a laptop and a mobile internet/hot spot he doesn't know about would be a good option.
ANY DEVICE this man has access whether it's a cell phone, tablet, computer etc is NOT a viable alternative.

Anything she is using for communication cannot be physically accessed by this person or needs to be encrypted to be viable.
Reply With Quote Quick reply to this message
 
Old 08-27-2014, 05:35 AM
 
41,813 posts, read 51,051,710 times
Reputation: 17865
Quote:
Originally Posted by PassTheChocolate View Post
I think she knows how to work around him.
If the guy works in IT security she is not going to work around him if he's determined.
Reply With Quote Quick reply to this message
 
Old 08-27-2014, 06:26 AM
 
Location: The DMV
6,590 posts, read 11,288,331 times
Reputation: 8653
Quote:
Originally Posted by PassTheChocolate View Post
So it sounds like a laptop and a mobile internet/hot spot he doesn't know about would be a good option. What would she need to do to ensure the hotspot is not detected by his devices? I'm thinking she would only use it when he's not home. As long as she shuts it down before he gets home it won't show on the network list, correct? Any other advice there?
I would go against this simply because you are still potentially keeping devices at home that can be discovered by the abusive partner. And if having something at home is non-negotiable, she should at least minimize the exposure. So you may be better off just using a 4G/LTE based tablet. Thus, you are then only managing one device, and it will only be on the provider's network (never use wifi at home).

You can also add security controls on there using a complex password with a low threshold of unsuccessful attempts before the tablet is wiped.

However, the biggest threat here IMO is not the data being intercepted. But escalating the abuse if her attempts at doing things 'behind his back' is discovered. Since we're not dealing with rational thinking here, any little thing may set the guy off (e.g. a charger that wasn't put away). So I still say that if separating herself is not an option, she needs to separate her "routines" from the abusive environment (where the abuser has more control) as much as possible - thus, coffee shops, friends' house etc.
Reply With Quote Quick reply to this message
 
Old 08-27-2014, 08:54 AM
 
Location: Tyler, TX
23,861 posts, read 24,111,507 times
Reputation: 15135
I've seen it posted but not stressed heavily enough -

SHE SHOULD NOT BE USING ANY COMPUTER/TABLET/SMARTPHONE THAT HE HAS ACCESS TO, REGARDLESS OF HER METHOD OF CONNECTING TO THE INTERNET!

Period. He may be watching the network traffic, but he may also have spyware installed on her devices. If he has physical access to them, then she can't be confident that they're not compromised.

Think of the ramifications an abused person would be facing if the abuser found out about the hotspot. I think your intentions are good, and I'm glad that you're thinking outside the box to help your friend, but an alternate connection is only one piece of the puzzle, and IMO, it's too risky to try. She should get out of the house and use a completely different device & connection for activity that she doesn't want him to see. For instance, a library computer or that of a friend or relative. She should ABSOLUTELY NOT be using her own computer, tablet or phone for that stuff, especially if the abuser is tech-savvy, regardless of how she's connecting to the 'net.
Reply With Quote Quick reply to this message
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.

Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.


Reply
Please update this thread with any new information or opinions. This open thread is still read by thousands of people, so we encourage all additional points of view.

Quick Reply
Message:


Over $104,000 in prizes was already given out to active posters on our forum and additional giveaways are planned!

Go Back   City-Data Forum > General Forums > Science and Technology > Internet

All times are GMT -6. The time now is 08:15 PM.

© 2005-2024, Advameg, Inc. · Please obey Forum Rules · Terms of Use and Privacy Policy · Bug Bounty

City-Data.com - Contact Us - Archive 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37 - Top