LiveBrianD, on 26 January 2012 - 03:30 PM, said:
The thing is, why would someone want to get into your network so badly anyway? Chances are that there's another guy who only uses WEP (or no security at all), and thus the attacker would go there.
Let me ask you a question that may answer yours.
If YOU were interested in doing something illegal, say buying drugs, over the internet, what would be the BEST target to use to AVOID suspicion? Use the network that has security too weak to be considered secure, or something borderline that "takes more time and effort" to break into? Would you use a network that FORCED MAC cloning to hide yourself, or the wide open network? I am going to use the one that makes the TARGET look guilty, not me. I want someone that thinks their network is completely secure.
We have seen cases on PCWORLD already, where WEP crackers have been picked up for their illegal deeds. This would be MUCH harder to prove in the situations I have mentioned above. How would you like the police to prove that MY device with a MAC address printed right on it DIFFERING from the one you see committing these crimes is the one that performed the illegal activities? Then, with the use of TPM, you can take the ONLY FUNCTIONING KEY to the system and destroy it BEFORE your computer is taken as evidence, and they would never be able to prove you changed your own MAC address.
Now this is just me, and what I would do to avoid suspicion. Use the networks that people THINK are totally secure. More often than not, they are also more LAX about watching it. At the same time, use CHEAP machines that you can afford to loose to do the heavy lifting. Also use LIVE CD's for the OS, and SAVE NOTHING. Then when the time comes, what is anyone going to say?