Free WiFi, beware of "thieves."

Source: Internet
Author: User
Keywords Public WiFi free WiFi access
Tags .net 21st century economic report access basic business connected data economic

With the popularity of domestic intelligent terminals and mobile internet, WiFi is also forming a new intelligent business form. However, in the convenience of free WiFi for users, "information security" is like the Sword of Damocles hanging on, at any time may threaten the user's basic interests. Moreover, because the current entry threshold of WiFi industry is relatively low, the industry also lacks uniform norms and standards, this security problem is increasingly prominent.

"CCTV only exposed a security issue of free WiFi, but the security of WiFi can be summed up as a net is a thief, the net has thieves, the net has thieves, the net after the thieves four forms." "March 16, Tangwen, vice president of business Wi-Fi products and solutions provider, said in an interview with the 21st century economic reporter.

CCTV in this year's "315 Party" on the site to test the free WiFi how to obtain the user information process, and recommended users to send mail when using the mobile phone 3G, 4G data flow to operate. Then the WiFi service provider, Andy, made a specific response, said that in the network security, Mai di commercial wifi network widely used to obtain the authority of the state departments and agencies certified network security equipment, can effectively prevent illegal intrusion and illegal sniffing.

Why is the safety of free WiFi suddenly the focus of media and users? This has to do with the massive laying of free wifi in the last two years. Michael CMO Xiahuajin, a reporter for the 21st century Economic report, said that with the popularity of smart terminals and mobile Internet, data traffic is growing fast, and 3G and 4G alone cannot meet this growth. At the same time, WiFi is also forming a new intelligent business form, such as O2O, large data and so on. As a result, free WiFi is expanding rapidly in the domestic market. Xiahuajin revealed that at present, Mai di covered public places have reached more than 40,000, daily more than 1 million users use the network of Mai di.

It is understood that the current user-accessible WiFi in the market includes the public WiFi provided by the telecommunications operator, commercial WiFi from Third-party service providers (such as Michael Dee, Koala, etc.), and Wi-Fi and WiFi from the shops.

But several industry insiders interviewed by the 21st century Economic report said that the current access threshold for WiFi is still relatively low, and the industry lacks uniform norms and standards.

WiFi Happy Enclosure

After millet, the end of last year, Tencent and the public comment on the joint investment of Michael Andy; Before, Alibaba also announced and bear a strategic partnership to promote a comprehensive free WiFi program, Shanda Network co-founder, Chen flyover brother Danian last year also invested in the creation of the WiFi master key. For a time, the WiFi market sparked concern.

Xiahuajin said that the early commercial WiFi market is mainly Cisco, Aruba and other commercial-grade hardware manufacturers or system integrators for hotels, restaurants, such as the laying of WiFi, function is limited to the Internet and local behavior management. While Mai di is through the "cloud + End" and "Application + platform" way to provide a complete set of solutions.

For the commercial value of WiFi, Xiahuajin said that the initial stage or the flow of cash, such as landing page ads, and then, WiFi can also become a bridge between merchants and users to join interactive social elements, such as the provision of ordering, coupons and other services, but also for third-party applications, such as public comments, Destination Tourism products provide services as an entry point for O2O; in the future, when WiFi hotspot coverage reaches a certain scale, large data mining can be carried out. "Through a standard, WiFi connection to a variety of intelligent devices, building networking, which can form a chemical reaction, the formation of new intelligent business form." "he said.

With a bullish outlook on WiFi and market demand, the coverage of WiFi hotspots has increased rapidly over the past two years. According to data from the Tencent secure WiFi Alliance, about 10% of the world's population is using WiFi, and as one of the world's largest markets, WiFi hotspots in public places are now covered by at least tens of thousands, a service that has almost become a standard in the service area of public places.

But at the same time, security issues have followed. The "Wi-Fi" report by Tencent's mobile butler shows that up to 49.75% of Android users are connected to WiFi, while 49.14% are worried about WiFi security.

Tencent Mobile Butler security expert Lu Ziaohua in an interview with the 21st century Economic report, said the hackers will be different technology through the WiFi network to create security problems for users, such as man-in-the-middle attack, DNS hijacking and phishing Web pages, theft of user's various account passwords and documents (such as figure).

WiFi, beware of thieves.

"WiFi is not universal before, the network of valuable data is not much, as the WiFi usage scenario more and more, interactive data more and more valuable in the network, so the probability of the occurrence of security problems will increase." "Tangwen said.

It is understood that the current through WiFi caused user security problems in the form of roughly two types, one is the CCTV exposure of the WiFi connection problem, that is, the lawless elements directly laying WiFi hotspot, after the user connected, all the data will be exposed to the rogue system; The second is a hacker attack using a hotspot from a regular WiFi service provider.

Tangwen said that WiFi security can also be summed up as a net is a thief, the net has thieves, the net has thieves and nets after thieves, CCTV exposure of the problem is the net is a thief, the user connected to the network itself is a fishing wifi. The reason, he says, is that ordinary WiFi can only have a single forward authentication, a network of authenticated users, and a lack of a reverse "user authentication network." It is reported that the koala will solve the problem in some way, but because the product has not been released, Tangwen declined to disclose. The principle, he says, is similar to letting the network answer the password and the user to confirm the password.

There are thieves in the net, there are thieves outside the net, thieves are in a regular WiFi network environment, users can also encounter attacks when operating. Tangwen said that the net has a thief is a and b in a WiFi network, a may be attacked by B, the current solution is through technology isolation and password verification, for each of the tree bear network in the user data encryption, to prevent information from being stolen and cracked.

And a thief outside the net refers to the user through the WiFi network access to malicious websites, hackers through this site to steal. After the net a thief refers to the hacker completely control the WiFi equipment and systems, the consequences more serious. Therefore, Tangwen said, only from the cloud, equipment (routers) and intelligent terminals of the entire chain to authenticate, will be more secure, a single link of preventive measures are more vulnerable.

Xiahuajin also said that Mai di uses the international mainstream 128bit encryption algorithm and so on series of security measures, the comprehensive protection user's information security. At the same time, the state has applied for a number of WiFi security patents, and in the forthcoming WISMART3 business intelligence without a circuit from the hardware level to solve the problem of pseudo Ssid/IP.

At present, in addition to the WiFi service provider through the technology for security, third-party security software is also beginning to focus on WiFi use security. Lu Ziaohua said that security software is mainly to monitor whether the user has been man-in-the-middle attack, DNS hijacking and access to the site is a phishing site. He said that no matter whether the user is using a regular WiFi network, as long as the exception occurs, security software will be detected.

But not all WiFi network providers have security precautions. It is understood that at present some businesses based on cost considerations, the purchase of some inferior equipment, and these equipment providers do not have strict safety technology protection standards, it is very easy to create security problems. At the same time, although security software can be monitored, not all mobile phones are equipped with related software.

According to the 21st Century Economic report reporter, although the current WiFi service providers and security software vendors have their own safety standards, but the industry still lacks a unified standard, the industry's entry threshold is still very low.

Xiahuajin revealed that as the initiator of the China WiFi Alliance and the Tencent Secure WiFi consortium, Michael is actively working with relevant national authorities and industry colleagues on safety standards, and "the ministry has recently invited us to discuss the standard standards for WiFi security."

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.