Skip navigation

RenderMan to the rescue

Globe and Mail Update

Dressed in a black trench coat and his trademark fedora, Brad Haines cruises city streets and malls on the hunt for wireless networks that are prime targets for hacking. Just be grateful he's one of the good guys ...Read the full article

This conversation is closed

  1. Joe Liberali from Canada writes: Whitehat is not the correct term, and he's certainly not blackhat, he's most definitely greyhat. The difference being, any penetration testing done for the purposes of "good" (for whatever definite of good you like) is done by a whitehat only if all parties are fully aware and supportive of the activity.
  2. Paul S from Canada writes: http://www.aircrack-ng.org/doku.php
  3. Paul S from Canada writes: Whitehat? I suppose that's why he is selling 33GB word lists - what else would you use such a thing for other than to brute force WPA?
  4. K McIntyre from Oshawa, Canada writes: Renderman is a hacker hanger-on. He doesn't produce any original research. He just takes other people's work and talks and writes a lot about it.

    And he dresses the part.
  5. mu mu from Canada writes: This is moronic. We spend millions to wifi libraries, schools public buildings, offices and then it s "crime" to use. Secure the computers with firewalls, secure the routers, leave the wireless open. If you can see some elses computer it is THEIR problem not everyones problem.
    Society has forgottern that nature culls the sick weak and stupid for a purpose, to get rid of them. By protecting and insuring dumb behaviour, the bulk of society pays the price.
  6. Eugene Fiume from Aurora, Canada writes: Please, please, let me hold your antenna. Please. Sounds like an SNL routine with Christopher Walken!

    What a remarkably stupid, alarmist article.

    The issue is real, but a guy going around with suspect taste in clothing and puerile tactics is not the best spokesperson for a lesson in good internet security (and let's not forget wired internet). Further, the reporter has done a disservice to the community by not filtering his reportage through informed second opinion (or is the point of emergent internet journalism to let forums like this determine the experts?).

    And "mu mu", natural selection does not apply to the internet, OK? Even the meek (or weak or sick as you say) are able to inherit a few simple rules about internet security that will make them stronger.

    OK. I'm outta here before you trace my cleartext message.
  7. Har Har from Canada writes: mu mu:

    Next time you leave your bedroom window open I hope no one climbs in and culls you.
  8. Kevin Chew from Germany writes: If any of the negative commenters here are qualified to speak on the subject, I'd be interested in reading some concrete criticism of his approach and/or why this is "alarmist".
  9. white hat from Vancouver, Canada writes: "He did offer anonymous examples..."

    This article shows he broke at least 2 of his stumbler ethics...
    Do Not Connect!!
    C'mon, you had to connect to prove that transaction data could be read.

    Don't use your data for personal gain
    A 4 page feature article in the globe to brag about your white hat creds. That surely is personal gain.

    Gray hat for sure!
  10. Brian Lowry from Canada writes: This is absurd -- first of all, he's just proving that he can access networks, and not that he can actually do anything once there... second of all, he laments unencrypted wireless transmissions, which no doubt contain some juicy packets if you have the technical knowledge/equipment to intercept the signals coherently plus weeks to kill analyzing mostly garbage, looking for nuggets of useful information. This guy is just a modern dumpster-diver, complaining that more businesses should install locks on their dumpsters.
  11. Ziad Fazel from Calgary, Canada writes: @Brian, the information you can access on a company's open wireless network is not garbage from the dumpster. You can join their LAN and take or change any unprotected information from other computers on that LAN.

    Companies with open or WEP wireless networks usually have other issues, like software firewalls off, too many ports open on the firewall, poor separation between their wireless and wired LAN, failure to encrypt sensitive data, and a host of other security weaknesses.

    I see them, and fix them, all the time. I just prefer to wear a golf shirt and khaki pants when I do my work.
  12. Elic Mades from Ottawa, Canada writes: I know for a fact that the "CSIS Agent" referred to in this article was pulling his leg.

    Anyone with some Google foo can find a picture of her with him from DEFCON 10; she's a well-recognized person within the Canadian InfoSec community who likes to play tricks on people.

    I find it amusing that he took her at face value (never asked for credentials) - and six years later is still flogging the same story about how he went out wardriving with a CSIS agent!

    Don't believe it. Cheers to the first person who can find a JPEG.
  13. K McIntyre from Oshawa, Canada writes: I presume it's the picture on Deviant Ollam's site to which you are referring.

    Who is she really?
  14. Elic Mades from Ottawa, Canada writes: Cheers, @KMcIntyre!

    Ive met her at a TASK meeting - she works for a bank - not CSIS, which makes this article even more lame than at first read. Where the backpack rig and the Access Point in a stuffed animal was funny/neato five years ago, now it's just embarassing and I feel sorry for him.

Comments are closed

Thanks for your interest in commenting on this article, however we are no longer accepting submissions. If you would like, you may send a letter to the editor.

Report an abusive comment to our editorial staff

close

Alert us about this comment

Please let us know if this reader’s comment breaks the editor's rules and is obscene, abusive, threatening, unlawful, harassing, defamatory, profane or racially offensive by selecting the appropriate option to describe the problem.

Do not use this to complain about comments that don’t break the rules, for example those comments that you disagree with or contain spelling errors or multiple postings.

Back to top