Answer the question
In order to leave comments, you need to log in
In the provider's network, authentication takes place only using the mac address, are there any communication laws on which it violates the law?
Мой провайдер не использует средства для осуществления безопасного доступа в сеть, можно ли его за это наказать? В частности не использует шифрование и туннелирование, сеть подобна огромной локальной сети, где о безопасности и не может быть и речи. Поменял свой физический адрес на тот что выдал сканер, и можешь получить доступ сеть даже если на твоём балансе недостаточно средств.
Answer the question
In order to leave comments, you need to log in
Here you can only catch on to the fact that the provider, in fact, is not able to identify the connected subscribers. i.e. if you connect a wifi point somewhere in neutral territory (for example, an attic) to the provider's equipment, and distribute free wifi, then this is already a violation of the law.
But this is true only if in Russia providers are required to collect data on all subscribers. In any case, I think in this direction you can dig.
By the way, if you do this and take someone's MAC address, then keep in mind that you will most likely set up that person ...
And stop feeding this troll already))
Let's consider another option. We have a smart-ass user. Who is looking for a freebie. Who decided to use someone else's traffic. And his ass was fried. And he began to run like a hen in a chicken coop. which lacks a rooster. Tell something about what he thought about what he thought about what would be good if he was so smart .... and so on ad infinitum. Well, in fact ... we have a thief. He was caught by the hand and now he carries all sorts of nonsense.
The provider has not violated any laws. And you violated. =) Well, then the court will figure it out. So that
So go to another provider if this one does not suit you.
In my country - does not violate.
At the same time, for such providers, binding by MAC is accompanied by binding to the switch port, and changing the MAC to a scanned one will only lead to an alert from the admin, and then you will have to explain. And the physical connection to someone else's subscriber cable is already an article.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question