by early on 2/16/18, 8:07 AM with 129 comments
by wepple on 2/16/18, 1:41 PM
A lot of ISPs will perform remote diagnosis by connecting into your router and scanning your internal hosts to see if there are any problems.
Between that capability and general appalling security of routers, you’re basically on Starbucks WiFi from a security perspective even at home.
important note: buying an off the shelf netgear/tplink/linksys/whatever might stop your ISP remoting in, but is still wildly full of vulnerabilities.
by aus_ on 2/16/18, 2:53 PM
1. They offer "IP Passthrough" which is fake Bridge Mode. They still do routing and you'll still hit NAT table limits of 4096. Connection falls apart for anything over 3000.
2. You can dump and reverse the router-gateway firmware and 802.1X/EAP authentication. Oh goodie.
3. There's a history of exploits for the NVG510, NVG589 and NVG599. Try your luck. [1] [2]
4. Create some "magic" to split the 802.1X and untag VLAN0. Works in Linux at least. [3]
5. But good luck if you want to do this in pfSense or FreeBSD. There's an open BTC bounty if you've got any netgraph / networking chops. [4]
[1]: http://earlz.net/view/2012/06/07/0026/rooting-the-nvg510-fro...
[2]: https://www.nomotion.net/blog/sharknatto/
[3]: http://blog.0xpebbles.org/Bypassing-At-t-U-verse-hardware-NA...
by jstanley on 2/16/18, 10:01 AM
by liotier on 2/16/18, 2:25 PM
Former provider offered FTTB and I used the coaxial cable CPE as a bridge - and even when I do not have that option, I insist on having a router of my own as my network's demarcation: it is basic hygiene.
Other option for GPON would have been to plug a GPON SFP module into one of my switches - the friendly guy who laid the fiber to my apartment even left me one in case I changed my mind... But going through the switch to the router and back to the switch on a different VLAN is unnecessarily complicated in my case. Anyone wants a free GPON SFP module ?
by mmrezaie on 2/16/18, 9:39 AM
I do data analytics and data engineering and a couple of months ago indirectly I have been contacted by an ISP in Spain and they literally were collecting every bit of data that their customers were seeing on internet (websites, timestamps, how much data were transferred and etcetera with the user's id and basically in another table name and address). I was shocked how easy they were talking about it. I didn't accept but for sure someone has done it! I never heard the name of the ISP, I wish I didn't bark at them so fast and I could collect more information about them.
by laveur on 2/16/18, 2:09 PM
by LeoPanthera on 2/16/18, 10:26 AM
It feels like a good compromise between privacy and speed.
(I realise this is not the subject of the article exactly but I figured it's a related issue.)
by Cieplak on 2/16/18, 11:10 AM
by Buge on 2/16/18, 9:54 AM
But ignoring encryption, this is the price you pay for cloud management: the could knows your data.
by javajosh on 2/16/18, 10:41 AM
The only counter is for an adversary to own your box, which is far more expensive.
by alxndr13 on 2/16/18, 11:00 AM
by mirimir on 2/16/18, 9:43 AM
by RoadieRoller on 2/16/18, 2:38 PM
This is probably what your ISP is doing. Take your MAC Addresses, try to find the phones in your house which is connected to the wifi, take those MAC addresses to all the telecoms, get the SIM card number and the phone number associated with those MAC numberss, send those phone numbers to the banks to find matching bank accounts and the associated credit card number, along with your registered email address, get the purchase history from the bank on the credit card number, compare it with your browsing history and sell all of this to another company and make money.
by philjohn on 2/16/18, 10:08 AM
For instance, BT in the UK do the same reporting over TR-069 if you use their home hub - however - if you connect a different VDSL modem/router you can disable TR-069, and if you use a dedicated VDSL modem in bridged mode and a wireless router behind that there's no TR-069 to worry about in the first place.
by slhck on 2/16/18, 10:41 AM
They said they'd look into it, but they couldn't process my claim unless they could prove something was connected via Ethernet to their router. (They apparently never trust customer WiFi speed test results, probably because WiFi on their crappy routers can be notoriously unreliable.)
I ultimately had to connect something to the router's Ethernet port, so I grabbed another WiFi router, configured it as an access point, plugged it in, and voilà, they could verify that a device was connected and processed my complaint.
Obviously customer service reps can easily get access to a list of what is connected to the router.
by dbolgheroni on 2/16/18, 3:47 PM
https://nakedsecurity.sophos.com/2012/10/01/hacked-routers-b...
https://www.welivesecurity.com/2016/10/21/cybercriminals-tar...
Your router is critical, and choosing them wisely is one of the most important things if you care about some security.
by wowamit on 2/16/18, 10:33 AM
by rishabhd on 2/16/18, 9:41 AM
by 534b44a on 2/16/18, 2:09 PM
I've long ago lost the PPPoE password and this same router gets it automatically somehow. When I install another router, it won't do that.
by floatboth on 2/16/18, 1:03 PM
by icc97 on 2/16/18, 10:27 AM
This is why you used https to hide the full URL, VPN to push the problem to a 3rd party who might care a bit more about privacy and then Tor on top of it all.
Here's the good old EFF explanation [0]
by tzahola on 2/16/18, 10:06 AM
by jacksmith21006 on 2/16/18, 5:40 PM
https://www.usatoday.com/story/tech/news/2017/04/04/isps-can... ISPs can now collect and sell your data: What to know about Internet ...
by jwilk on 2/16/18, 10:48 AM
by nmeofthestate on 2/16/18, 12:22 PM