Having just returned from the sunny dunes of a distant shore, I would like to share with you now a little insight about those insecurities that seem to follow us wherever we travel. OK, at the outset, I would like to state that to completely “unplug” when I go on vacation is very difficult. Therefore, if I see something interesting, I try to fill up my now freed-up time by commencing little investigations. On this occasion, one of the first observations I made was that of the public’s appetite to remain connected always, whether in their hotels, on the beach, or dining out.
The problem with this constant connectivity is of course that all of their connections’ access points were insecure; they could easily allow someone like me to trace down their device and prove, for example, that in a number of cases they were exposed to known exploits like FireSheep. In summary, my first observation is as follows: notwithstanding a paper I wrote some years back on WiFi security, things seem to be just as bad now as they were three years ago.
Image 1: Cell phone charging points
My second observation has to do with recharging your mobile devices. It may be that when you are travelling, your cell phone runs out of juice after uploading all those photographs of your beach getaway to Facebook. But never fear! With the advent of cell phone charging points, [See Image 1] you can simply connected your device via USB and re-energize its little power source. But how do you really know what this charger’s capabilities are? We’ve likely never interacted with that particular charger before. Can we as public users be sure that somewhere down the road, if not already, some nasty, imaginative individual hasn’t worked out some crafty means to circumvent our personal-cell security using these chargers?
The cell phone is no longer just some little hand held device which we use to send texts or make calls. It is a hand-held communications server that can do everything from facilitating our banking transactions to controlling our home heating systems. On that basis, I thinks this little tool deserves a tad more respect and certainly a lot more security.