Feeds

Beware WarKitteh, the connected cat that sniffs your Wi-Fi privates

Inventor says, despite it all, he’s still not a cat person

Secure remote control for conventional and virtual desktops

Defcon 22 An inventive security researcher has successfully tested a war-driving kitty collar – so its wearer can prowl around the neighborhood exposing the lamentable state of Wi-Fi security.

WarKitteh collar

Wardriving cat couture. Credit: Gene Bransfield

Gene Bransfield, a security researcher with Tenacity, told El Reg that while he isn't a cat person himself, he uses them in his presentations because, well, every internet user knows how popular cats are. (Some unconfirmed estimates suggest cat-related content consumes as much as 15 per cent of internet traffic.)

"Techies get security, but try to explain the technology to the average consumer and you can see their eyes glaze over so I've become known for getting them back engaged with cat pictures," he said. "Then someone told me about a cat collar with GPS and a cellular modem built in that texted the pet's location, and I had the idea for WarKitteh."

Bransfield first tested his idea by outfitting a cat with a coat containing an HTC phone, but the feline refused to play ball. Once out of sight, it dumped its baggage and slunk off, leaving it for some larcenous individual to steal the phone. So Bransfield decided to build his own device.

He started the project a year ago and began building the device in November. While he's a security expert, however, this particular scheme required help from friends and family. "Once I'd explained the concept everyone said 'Awesome, how can we help?'" he explained.

Bransfield built the WarKitteh collar using a Spark Core chip, which is an ARM processor backed by a Wi-Fi chip and a GP-635T GPS unit. A friend who is into model airplanes sourced him a 3.7V/500mAh battery to power the unit. His wife's grandmother, who's a dab hand with needle and thread, enclosed the unit in a tasteful covering, and the plan was good to go.

Apart from dealing with cat psychology, that is. The first time Bransfield tried the WarKitteh collar with a friend's moggy, the recalcitrant feline ran down the road and hid under a bush. With the GPS signal blocked, the battery quickly drained and the experiment was declared a failure.

To deal with this, Bransfield decided to leave the collar out for a while to get a solid GPS lock before putting it into full 'cat mode.' But this second experiment was also unsuccessful because the test pilot decided to just walk around its back yard for the day, and no useful data was gathered.

Coco with WarKitteh collar

Coco with WarKitteh collar. Credit: Gene Bransfield

Clearly new recruits were needed. Luckily, the aforementioned grandmother had a Siamese cat called Coco and she expressed an interest in trying out the device so that she could see what her feline got up to during the day.

Coco clearly wasn't fazed by the collar and went on a serious prowl around the neighborhood, even catching a small rodent along the way. While the data the cat gathered was extensive, however, it was also somewhat depressing.

The WarKitteh collar found 23 unique Wi-Fi networks, including four that were completely open and four more that were using the easily broken WEP encryption standard. It's clear from the data that security best practices still aren't filtering down to many home Wi-Fi users. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.