XplornetSUCKS  

Go Back   XplornetSUCKS > ViaSat2 Satellite Forum *approx Sept 2017*
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 05-20-2015, 12:27 PM
buttitchi buttitchi is offline
offline "Global Moderator" Retired
 
Join Date: Feb 2008
Posts: 212
Default ViaSat2 update (May 2015)

Around Jan/Feb 2017 for putting into service.


http://spacenews.com/viasat-sees-fal...-growth-plans/
Quote:
In a conference call with investors, ViaSat Chief Executive Mark. D. Dankberg said ViaSat-2 construction at Boeing Space and Intelligence Systems of El Segundo, California, is on schedule and that the satellite will move into final testing sometime this summer.

ViaSat-2’s launch, aboard a Falcon Heavy rocket built by SpaceX of Hawthorne, California, is scheduled to occur no later than September 2016. The Falcon Heavy rocket’s inaugural flight has slipped to early 2016, and ViaSat expects to be the third or fourth customer for the rocket.
Quote:
In recent months ViaSat has said its consumer satellite broadband business would focus on filtering prospective subscribers before they end up being disconnected for nonpayment. A parallel effort has been made to educate service centers so that they do not lure customers accustomed to unlimited bandwidth. These customers, too, are more likely to quit the service.
To cut the customer churn and the bitching from both sides, might as well be truthful with your prospective customers.




The part of the article on airline internet. The NSA/CSEC has made sure that all airlines in North America have put data collection devices on board. Your supposedly encrypted website communication may have a false certificate displaying(man in middle attack). Using a VPN may work for proper encryption, if you can see what path it is taking and if your known key matches 100%.
Using the free airport WIFI is also not safe. North American airports are also collecting the MAC address of user's phone wifi, which unless you turn wifi off, will always be pinging for a router.
https://www.techdirt.com/articles/20...nication.shtml
__________________
Hi Diddly Ho, Good Neighborino

Last edited by buttitchi : 05-20-2015 at 12:37 PM.
Reply With Quote
  #2  
Old 06-14-2015, 02:11 AM
dave_ca dave_ca is offline
Senior Member
 
Join Date: Feb 2008
Posts: 301
Default

For a SSL MITM attack to succeed the fake certificate being presented would need to be trusted by the device. In the enterprise when we want to inspect SSL data for virus/NIDS reasons we push out our fake self signed cert and that way when end user connects to Dropbox to download that virus, our software can scan within that transaction. Unless the airline has you install some software, I am not sure they are doing a MITM type of attack. There are things that sites can do like enable PFS and HSTS - this will help prevent that type of attack.

But as a end user, if you are connecting to a public wifi without running your traffic over a VPN you need to assume its all being looked at. Either by the entity providing the connection, the guy sitting beside you (In the many cases public wifi do not implement client isolation) or other parties. I have implemented SoftEther server to protect communications when I am in public places. https://www.softether.org/1-features...nd_Reliability
Reply With Quote
  #3  
Old 06-14-2015, 12:34 PM
buttitchi buttitchi is offline
offline "Global Moderator" Retired
 
Join Date: Feb 2008
Posts: 212
Default

There's some more detailed description out there on man in the middle attacks and how easy they are if the end user ignores those security popups, if a security alert happens that is.

https://www.techdirt.com/articles/20...ificates.shtml
Quote:
Gogo Inflight Internet seems to believe that they are justified in performing a man-in-the-middle attack on their users. Adrienne Porter Felt, an engineer that is a part of the Google Chrome security team, discovered while on a flight that she was being served SSL certificates from Gogo when she was requesting Google sites. Looking at the issuer of the certificate, rather than being issued by Google, it was being issued by Gogo.

The bogus certificate was captured in a screenshot tweeted out by Felt.
Certificate companies that keep issuing false Google domain certificates.
http://googleonlinesecurity.blogspot...-security.html

Google security alerts page.
http://googleonlinesecurity.blogspot.com/


Article on Ad injectors, whether by malware or ISP.
http://googleonlinesecurity.blogspot...n-economy.html




Even some security products people have on their computer were adding fake certificates to the computer, so they could intercept encrypted communications, in order to check for things...
https://nakedsecurity.sophos.com/201...the-spotlight/
__________________
Hi Diddly Ho, Good Neighborino

Last edited by buttitchi : 06-14-2015 at 12:51 PM.
Reply With Quote
  #4  
Old 06-14-2015, 01:21 PM
dave_ca dave_ca is offline
Senior Member
 
Join Date: Feb 2008
Posts: 301
Default

haha yeah if an end user ignores the cert error message then all the security in the world will not help them
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -4. The time now is 02:36 PM.


Powered by vBulletin® Version 3.6.8
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.