Feeds

Beware WarKitteh, the connected cat that sniffs your Wi-Fi privates

Inventor says, despite it all, he’s still not a cat person

Beginner's guide to SSL certificates

Defcon 22 An inventive security researcher has successfully tested a war-driving kitty collar – so its wearer can prowl around the neighborhood exposing the lamentable state of Wi-Fi security.

WarKitteh collar

Wardriving cat couture. Credit: Gene Bransfield

Gene Bransfield, a security researcher with Tenacity, told El Reg that while he isn't a cat person himself, he uses them in his presentations because, well, every internet user knows how popular cats are. (Some unconfirmed estimates suggest cat-related content consumes as much as 15 per cent of internet traffic.)

"Techies get security, but try to explain the technology to the average consumer and you can see their eyes glaze over so I've become known for getting them back engaged with cat pictures," he said. "Then someone told me about a cat collar with GPS and a cellular modem built in that texted the pet's location, and I had the idea for WarKitteh."

Bransfield first tested his idea by outfitting a cat with a coat containing an HTC phone, but the feline refused to play ball. Once out of sight, it dumped its baggage and slunk off, leaving it for some larcenous individual to steal the phone. So Bransfield decided to build his own device.

He started the project a year ago and began building the device in November. While he's a security expert, however, this particular scheme required help from friends and family. "Once I'd explained the concept everyone said 'Awesome, how can we help?'" he explained.

Bransfield built the WarKitteh collar using a Spark Core chip, which is an ARM processor backed by a Wi-Fi chip and a GP-635T GPS unit. A friend who is into model airplanes sourced him a 3.7V/500mAh battery to power the unit. His wife's grandmother, who's a dab hand with needle and thread, enclosed the unit in a tasteful covering, and the plan was good to go.

Apart from dealing with cat psychology, that is. The first time Bransfield tried the WarKitteh collar with a friend's moggy, the recalcitrant feline ran down the road and hid under a bush. With the GPS signal blocked, the battery quickly drained and the experiment was declared a failure.

To deal with this, Bransfield decided to leave the collar out for a while to get a solid GPS lock before putting it into full 'cat mode.' But this second experiment was also unsuccessful because the test pilot decided to just walk around its back yard for the day, and no useful data was gathered.

Coco with WarKitteh collar

Coco with WarKitteh collar. Credit: Gene Bransfield

Clearly new recruits were needed. Luckily, the aforementioned grandmother had a Siamese cat called Coco and she expressed an interest in trying out the device so that she could see what her feline got up to during the day.

Coco clearly wasn't fazed by the collar and went on a serious prowl around the neighborhood, even catching a small rodent along the way. While the data the cat gathered was extensive, however, it was also somewhat depressing.

The WarKitteh collar found 23 unique Wi-Fi networks, including four that were completely open and four more that were using the easily broken WEP encryption standard. It's clear from the data that security best practices still aren't filtering down to many home Wi-Fi users. ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.