Feeds

Finland mulls legalizing use of unsecured Wi-Fi

Lack of harm cited

Beginner's guide to SSL certificates

When it comes to the unauthorized use of open Wi-Fi networks, the Finnish government may say: If you can't beat them, join them.

At least, that's our interpretation of this badly garbled Google translation of a YLE.fi article. It says the country's Ministry of Justice is investigating the decriminalization of using unsecured wireless networks because of the large number of unprotected access points and the widespread use of them by people without permission.

The government body also pointed to the difficulty of monitoring networks for unauthorized users and the lack of harm caused. What's more, it's not always clear when an unsecured network is intended to be used as a public hotspot and when it's the product of an owner who has deemed it private but is too lazy or uninformed to bother encrypting its signal.

This sounds like a fairly commonsense approach, though Finnish citizens should probably be reminded that much of what they say and do over unsecured Wi-Fi networks is completely open to eavesdroppers in the next room or in roving wardriving cars. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.