I Made a Wifi Cracking Van

Поділитися
Вставка
  • Опубліковано 27 гру 2024

КОМЕНТАРІ • 2,6 тис.

  • @LinusTechTips
    @LinusTechTips  9 місяців тому +52

    Grab your very own set of LTT Keycaps with free US Shipping! Go to apos.io/ltt-keycaps

    • @Dra1n__TV
      @Dra1n__TV 9 місяців тому +1

      Not shine-through, lame

    • @aaronmcmahon6240
      @aaronmcmahon6240 9 місяців тому

      Lvk​@@Dra1n__TV

    • @fordony
      @fordony 9 місяців тому +2

      what am i gonna do with an underwear button?!!??

    • @realcartoongirl
      @realcartoongirl 9 місяців тому +1

      linus in steam link video has unsecured LMG guest Wifi

    • @mainaccount4585
      @mainaccount4585 8 місяців тому

      sounds very impractical to spend a lot of time, money and expertise, just to know someone's wifi password

  • @Bens_Jamming
    @Bens_Jamming 9 місяців тому +4972

    i was 100% expecting “we lost all our data”

  • @randomtransitadventures
    @randomtransitadventures 9 місяців тому +3232

    he figured out how to touch grass without touching grass again he is becoming too powerful

    • @thewubmachine840
      @thewubmachine840 9 місяців тому +30

      And its a U-Haul van you only have to use the ''Wifi Cracking Van'' for 1 day

    • @randomtransitadventures
      @randomtransitadventures 9 місяців тому +3

      b r u h

    • @SYAZ73
      @SYAZ73 9 місяців тому

      Day 2 of asking for a free pc❤

    • @aquss33
      @aquss33 9 місяців тому +21

      ​@@SYAZ73this ain't tiktok, nobody cares, especially Linus, who is 100% not going to give you a PC

    • @SYAZ73
      @SYAZ73 9 місяців тому +1

      Its worth a try

  • @benargee
    @benargee 9 місяців тому +477

    You don't even need a van to hold the cracking equipment. You just need the lower power device to intercept the handshakes and then send that data to a remote server optimized for cracking.

    • @spicybaguette7706
      @spicybaguette7706 9 місяців тому +32

      Yes, you can even use cloud compute. But you will have to make sure to erase your traces. But in most cases cloud computing providers aren't looking what you're running on their systems, as long as you aren't scanning the whole internet or something

    • @MrLTiger
      @MrLTiger 9 місяців тому +2

      blah blah blah nobody cares

    • @spicybaguette7706
      @spicybaguette7706 9 місяців тому +35

      @@MrLTiger L + ratio

    • @formes2388
      @formes2388 9 місяців тому +24

      @@MrLTiger Some people do. And you cared enough to write that - and hit the reply button.
      If you don't care: Move on.

    • @benargee
      @benargee 9 місяців тому

      @@Unknown-sz8kg This whole video is basically a tutorial. Cracking WPA2 is old news. Like lockpicking, it's completely legal to know and to break the security of your own devices or of others who give you permission. Pentesters are legal white hat hackers and are hired all the time by companies. WiFi cracking would be one of their attempted attack vectors to audit security.

  • @4RILDIGITAL
    @4RILDIGITAL 9 місяців тому +594

    Definitely an eye-opener on Wi-Fi security. Time to double-check my password setup and perhaps even consider separating my IoT devices from my main network. Thanks for the insights.

    • @BobIzam
      @BobIzam 9 місяців тому +28

      iot devices 100% should be the most limited as they are usually the least secure. good luck

    • @kittybrowneye3163
      @kittybrowneye3163 9 місяців тому +5

      I can literally use Cain and Abel from my phone and crack your wifi with a phone. The van is basically just for show and makes no sense really

    • @PaletoB
      @PaletoB 9 місяців тому +16

      Realized that not only am I using the standard password but also that the back of my router is against a window. So the password is clearly visible from outside 😂

    • @BillAnt
      @BillAnt 9 місяців тому +4

      Some routers with OpenWRT allows you to create hundreds of dummy WiFi hotspots with random passwords. That will keel Linus busy for a while. lol

    • @arthilas_
      @arthilas_ 9 місяців тому

      I am not too worried about that because one wouldn't be able to get close enough to our house to receive our Wi-Fi signal without breaking into our property - which is secured with CCTV and an alarm. And we mostly use LAN anyways.

  • @KevinLopez-ht9br
    @KevinLopez-ht9br 9 місяців тому +96

    Definitely wanna see more security focused videos. Enlightenment one video at a time🎉

  • @JeffDeWitt
    @JeffDeWitt 9 місяців тому +1844

    There is a really easy way to make 100% sure your printer's connection won't compromise your network... plug it in with a USB cable and make sure the wifi is turned off.

    • @Dnylpz94
      @Dnylpz94 9 місяців тому +143

      Worst case, plug into a network switch with an Ethernet cable

    • @kazzxtrismus
      @kazzxtrismus 9 місяців тому +84

      theyre ditching ports n printers now

    • @Jimmy_Jones
      @Jimmy_Jones 9 місяців тому +87

      ​@kazzxtrismus get an enterprise one then or something more professional rather than ones that are just there to waste ink.

    • @greenbubbleboy5673
      @greenbubbleboy5673 9 місяців тому +47

      ​@@kazzxtrismus yep our new brother printer doesn't have a Ethernet port. Which drives my bonkers

    • @ItchyKneeSon
      @ItchyKneeSon 9 місяців тому +14

      @@greenbubbleboy5673 ...have *an ethernet port. (Sorry; perfectionist having English teaching flashbacks.)

  • @NonEuclideanTacoCannon
    @NonEuclideanTacoCannon 9 місяців тому +983

    We just called it "wardriving" back in the day. When I was a kid, we squatted an abandoned 10 story apartment building. We had the WEP keys for every network in cantenna range. If a network wasn't available for some reason, just had to re-aim the can on the tripod.

    • @YagiChanDan
      @YagiChanDan 9 місяців тому +116

      Haven't heard the term "Wardriving" in yonks. God I feel old.

    • @whodatsaddle
      @whodatsaddle 9 місяців тому +71

      i fucking love crime man thanks for sharing!

    • @stretchchris1
      @stretchchris1 9 місяців тому +45

      Wardriving around the city I lived in 20 years ago with a USB wifi connector taped to the roof of the car. Memories.

    • @ventusprime
      @ventusprime 9 місяців тому +11

      The problem is linus just find out .

    • @Digimess88
      @Digimess88 9 місяців тому +50

      I remember wardriving in my small town like 20 years ago and noone's wifi was protected. Then I went to film school in LA in 2008-ish and EVERYONE's wifi was protected and someone was like "yea, everyone has screenplays and scripts on their computers and they are worth millions potentially". Made sense they were more up to date.

  • @Obi1kenobi10
    @Obi1kenobi10 9 місяців тому +753

    Ah, war-driving. I remember doing this in the late 90s and early 2000s. We used "can-tennas" made out of Pringles can. We had. Soup can to scan a wide area, and the Pringles can to zero in and crack.

    • @kenGPT
      @kenGPT 9 місяців тому +16

      cantennas arent used for war driving. two very separate use cases.

    • @aaronkellyuk
      @aaronkellyuk 9 місяців тому +21

      I remember my computer science teacher telling me about doing that.

    • @Obi1kenobi10
      @Obi1kenobi10 9 місяців тому +45

      @@kenGPT we used them while war driving. Helped to zero in on wifi.

    • @kenGPT
      @kenGPT 9 місяців тому +3

      @@MrBarcode yeah? What makes you think so? You wanted to publicly call me a child so own up to it
      Keep in mind that you are talking to someone who has been hacking Wi-Fi for 20 years and I professionally give advice to businesses on their wireless posture

    • @kenabi
      @kenabi 9 місяців тому +22

      @@kenGPTthe heck they weren't. some might not have, but plenty of people did. it sucks for broad area scanning, but they're super useful for pinpointing to maximize signal and limit dropout due to the surroundings/rf. and then again, if you want to keep using that wifi you just pinpointed.

  • @SpadChad
    @SpadChad 9 місяців тому +1058

    remove "wifi" and "ing" from the title and you have yourself a much more interesting video.

    • @CloroxBleach0
      @CloroxBleach0 9 місяців тому +54

      Walter

    • @mattayalynn4050
      @mattayalynn4050 9 місяців тому +32

      Mmm, not my particular poison but I'll still get in the crack van.

    • @jean_yves_plongeur
      @jean_yves_plongeur 9 місяців тому +14

      hello waltuh

    • @zye.
      @zye. 9 місяців тому +17

      Linus, we need to cook

    • @Ushq_QgA
      @Ushq_QgA 9 місяців тому +3

      Let him cook.

  • @Miltiadis_Vouzounaras
    @Miltiadis_Vouzounaras 9 місяців тому +483

    You forgot WPS and Man-In-The-Middle attacks, when you force a device to make a handshake with your fake Access Point.
    You clone the Access Point characteristics, then you wait for a Handshake (or you send a disconnect signal) and you have the key.

    • @hofa
      @hofa 9 місяців тому +48

      Damn WPS is ridiculous. If I recall correctly, it's a set of 8 characters that you can split in two and validate two sets of 4 chars instead of 8. To top it off, the last character is a CRC so you just had a group of 4 chars and a group of 3 chars to crack. I remember the main ISP in my country adding a max number of tries, followed by a long timeout to try again, making it significantly more time consuming to hack. Of course you can just drop a raspberry pi on a battery pack near the device and let it do it's thing over the course of a few days.
      I remember having a netbook in 2012 with a dualcore 1.6 ghz ARM processor and just getting all the wifi passwords around my house in a matter of minutes. Edit: Intel Atom® Processor N270 single core with hyperthreading.

    • @RawmanFilm
      @RawmanFilm 9 місяців тому

      @@hofa2012 1,6GHz Arm Dual core would have been very nice.

    • @d4m4s74
      @d4m4s74 9 місяців тому +29

      I haven't seen any numeric WPS in years, only push button WPS.

    • @Miltiadis_Vouzounaras
      @Miltiadis_Vouzounaras 9 місяців тому

      @@hofa Look for pixie-dust attack! A vulnerability on the random generator that makes it easier to find the 8 digit WPS key (4+3+CRC).

    • @LaAwesomeK
      @LaAwesomeK 9 місяців тому

      Regrettably, @hofa's response is accurate. Internet security is subjective, requiring tailored plans that consider the user's comfort level. One cannot expect someone like Joe the plumber to become a cybersecurity expert overnight. However, Joe excels at fixing leaking faucets, a task a cybersecurity professional might struggle with. Achieving the right balance is crucial for risk mitigation. While well-intentioned, the discussed video delves into a topic that many may find daunting without expert guidance. Without personalized consultation, its value diminishes.
      In my view, the video seems geared towards instilling fear. Let's be clear: during my college days with a basic laptop (i3), I successfully assessed WiFi security levels without breaching or altering them-a practice strictly illegal without explicit consent. LTT should focus on offering practical advice rather than showcasing hacking techniques and then attempting to offer assistance, which only fosters fear. Furthermore, contemporary hackers target larger entities like social media platforms hosting billions of users, rather than individuals. Such platforms represent worthy pursuits for their time and effort.

  • @deathjunior7755
    @deathjunior7755 9 місяців тому +58

    Gotta love how appropriate the pile of masterlock 140's used as a comparison is. They are one of the easiest locks to pick out there and a 4 pin comb opens any of them just as easily as a key.

  • @THEpicND
    @THEpicND 9 місяців тому +59

    This is the kind of video I subbed to LTT for. Thank you for making it

  • @OldManBadly
    @OldManBadly 9 місяців тому +41

    You left out the most common attack vector at this point, which is forcibly making devices drop off the network and reconnect, so you can get many, many more handshake samples. It also allows replicating that handshake to allow outside devices to mimic and replace devices. Many amusing tricks are possible!

    • @lumikarhu
      @lumikarhu 9 місяців тому +2

      you're not wrong but wps is still the most common vector (horrible that it still works in 2024 but good for me), trust me i do this every other weekend. i explained it more in another comment

  • @Luvtheleanfr
    @Luvtheleanfr 9 місяців тому +5

    6:10 ‘Tis quiet tho 😁👍🏼 (we love Gary)

  • @jonathanschober1032
    @jonathanschober1032 9 місяців тому +26

    I just want to say, this was a very excellent video. I loved the comedic entertainment value, informative history of Wi-Fi security, showcasing cool hardware. Very well done

  • @98FleXJ
    @98FleXJ 9 місяців тому +94

    Alex wearing an Edison Motors hat warms my heart! An incredible company, getting some solid recognition.

    • @aaronpreston47
      @aaronpreston47 9 місяців тому +12

      Once Edison gets their building up and running in Terrace, it would be cool if LMG visited them.

    • @98FleXJ
      @98FleXJ 9 місяців тому +6

      @@aaronpreston47 I agree! This is tech that needs to be covered!

  • @TheMotlias
    @TheMotlias 9 місяців тому +328

    I used a 20 character random alphanumeric, it drives my sister mad whenever she needs to use the WiFi at my place but I'm not gonna compromise

    • @Natsukashii1111
      @Natsukashii1111 9 місяців тому

      Just put up a qrcode for easy connect

    • @Jehty_
      @Jehty_ 9 місяців тому +12

      Why not simply use WPS?

    • @jansongin2636
      @jansongin2636 9 місяців тому +145

      Your downfall is you told us how long it is

    • @DankasorusRex
      @DankasorusRex 9 місяців тому +31

      My buddy used an image translated into text. It was a few hundred thousand characters I think

    • @RT-.
      @RT-. 9 місяців тому +69

      In your phone (both Android and Apple!) you can go into the wifi settings and tap to generate a QR code. You can print or just show it. If you scan that using the camera app on another device, it'll show a "Connect to wifi" option. It's really cool and supported in all modern phones. Linus mentioned this in the video, but he didn't mention how easy to do it is. There's no setup steps in the software side

  • @TsoLIt
    @TsoLIt 9 місяців тому +7

    This just demonstrated the importance of VLANs and layer 3 routing.
    People say I've gone overboard, but it's a 5min process to set up a VLANed SSID and configure that on my network to limit where my IoT devices are allowed to connect. Seperate password for each SSID. etc.

    • @e.t.anderson4639
      @e.t.anderson4639 9 місяців тому

      If your Wi-Fi access points support VLANs. As far as I've seen, that's limited to Enterprise hardware or custom firmware.

    • @TsoLIt
      @TsoLIt 9 місяців тому

      @@e.t.anderson4639 not so much anymore. You can get “prosumer” or even just regular off the shelf home WiFi gear that supports almost all of this now. Like the TPlink wifi6 access point I got to replace an EnGenuis WiFi 5 AP does all the same stuff but was like 75$ vs 150-500$ for an enterprise one.

  • @PeterMoriarty_
    @PeterMoriarty_ 9 місяців тому +5

    I used to do this decades ago with fairly straightforward cracking software without understanding any of the underlying encryption technology protocols. This video has been enlightning and you guys are the best in the world at taking technical concepts and breaking them down in an easy and enjoyable format. God bless you Linus and team!!!

  • @TrainsWithDynamo
    @TrainsWithDynamo 9 місяців тому +399

    If I dont count my brother as a loved one does that mean my wifi password isnt a security threat 🤣

    • @WiscoBoundTrucker
      @WiscoBoundTrucker 9 місяців тому

      😆🤣😆🤣😆🤣 that's so stupid I can't believe I laughed at it! Nice one

    • @CheapBastard1988
      @CheapBastard1988 9 місяців тому +2

      ​@@WiscoBoundTruckerI thought it was clever.

    • @WiscoBoundTrucker
      @WiscoBoundTrucker 9 місяців тому +1

      @@CheapBastard1988 stupidly clever, but yes, clever 😂

  • @Triflixfilms
    @Triflixfilms 9 місяців тому +182

    Every stationary device should really just have an ethernet port by now.

    • @nmf220
      @nmf220 9 місяців тому +18

      I mean fair but at the same time, not everyone knows or has the ability to run cable infrastructure through a building if it doesn't already exist. Wifi gives us more of the easability/convenience of a layer 1 alternative to networking. The next step is, as this video points out, is to secure your over-the-air commucations.

    • @SanderEvers
      @SanderEvers 9 місяців тому

      Even wired internet isn't completely safe though.

    • @jonathanfischer7395
      @jonathanfischer7395 9 місяців тому +2

      I’ve got my desktop connected via wifi due to living in an older apartment complex with only phone and cable lines in the walls. Moca isn’t an option because apartment complex, so I’m stuck with either wifi or 100 ft Ethernet cord.

    • @jacobp8294
      @jacobp8294 9 місяців тому +11

      ​@@jonathanfischer7395true men run tens or hundreds of Ethernet cables, loosely taped to the floor connected to their homelab which has grown to the size of the kitchen

    • @djsteiner1
      @djsteiner1 9 місяців тому +3

      Tell that to all the TV manufacturers who refuse to put anything faster than 100Mb fast ethernet in their appliances

  • @EvilPumpkin1337
    @EvilPumpkin1337 9 місяців тому +145

    we want linus to make more cybersecurity videos...even in a collab with david bombal and networkchuck XD

    • @sicario-2898
      @sicario-2898 9 місяців тому +4

      I second this motion

    • @sicario-2898
      @sicario-2898 9 місяців тому +2

      I second this motion

    • @Ниггерфиш
      @Ниггерфиш 9 місяців тому +2

      I third

    • @hazrpg
      @hazrpg 9 місяців тому +3

      maybe I'm too old, but I'd rather it was hak5 or snubs the collab was with... love those guys!

    • @sicario-2898
      @sicario-2898 9 місяців тому

      @@MrSevenEleven I’ll check em out 👍🏼

  • @whattheduck4644
    @whattheduck4644 9 місяців тому +8

    Seeing Alex wearing the Edison Motors hat made me a bit excited lol. They're such a cool company with great ideas!

  • @Rhymes04
    @Rhymes04 9 місяців тому +3

    6:09 Gray: "These run a lot quieter" Alex: "Yeah but they suck" Gary: "Quite"

  • @Premier-Media-Group
    @Premier-Media-Group 9 місяців тому +84

    Need more bashing of HP, please.

  • @jjmori7100
    @jjmori7100 9 місяців тому +211

    What was missing in the video is, that for capturing the handshake of a device, a device needs to start the connection to the WiFi while you are capturing. Just driving in front of a house capturing a few seconds and leaving won't work in most cases.
    While there is a deauth packet that can be sent to devices to disconnect it from the WiFi and shortly after it will try to reconnect. But even on most WPA2 devices the deauth packet needs to be authenticated by the Access Point. So this is not possible in most cases.
    Sure you can wait hours in front of the house waiting for a device to connect. But this is a lot less feasible

    • @khakers2.099
      @khakers2.099 9 місяців тому +30

      Protected management frames are optional in WPA2 so I'm not sure I'd bet on deauth attacks not working. I'm guessing most cheap devices that don't implement WPA3 also didn't bother to support 802.11w

    • @jjmori7100
      @jjmori7100 9 місяців тому +5

      @@khakers2.099 Maybe some cheap iot devices don't support protected management frames but at least old regular devices like phones and computers that only support wpa2 do support protected management frames, at least in my experience

    • @SumoLucas
      @SumoLucas 9 місяців тому +32

      Good mention! Comfortable talking about this now because I’m pretty far removed from high school at this point. When I was in high school they did an experimental roll out of laptops to the senior class to determine if they would invest in laptops for the whole school… of course they wanted to secure the devices, however they put the laptops on a completely unfiltered wireless network and put the filtering on the laptop itself! This made access to that network incredibly valuable due to the fact that if you connected a NON school issued device you could have unfiltered wifi access.
      I set up a raspberry pi with an external antenna that I hid inside of a computer lab desktop tower and could remote into. I told it to start capturing handshakes right as students arrived at school in the morning knowing that all their seniors laptops would start automatically connecting when in range and I’d be likely to capture a handshake as they walked by the lab. Worked like a charm and allowed me to crack the password off site when I retrieved the device later

    • @Mobliz
      @Mobliz 9 місяців тому +5

      Deauth attacks worked fine for me for kicking desktops and laptops off the network to capture their handshake whenever I did this back in the early 2010s using kali.

    • @Klinical69420
      @Klinical69420 9 місяців тому

      I tried this on myself years ago just to see what an idiot kid like myself could get into. The program doesn't need me to look at the wifi networks. Just seeing the network id was enough. A simple one way handshake was enough to get any password I wanted. I used a single r9 280x and it took me 17 hours to crack "H@_ck.M4D@**Y" I used a simple command to sort through that one file every hacker knows with the ten gigs of every leaked password ever. I was only 14 at the time and this was so easy to do.

  • @techwolflupindo
    @techwolflupindo 9 місяців тому +58

    As a truck driver, I have been using public wifi for over 10 years. Started out using laptop card that had an antenna and using some early WEP cracking software. My upgrades over the years was rigging up an rocketdish on push up pole outside the cab of the truck. I am currently using aircrack-ng and reaver tools to get internet access. Today, very few routers AP are pixedust crackable. But the amount of free public internet access has grown also. So I am planning on upgrading my dish setup to handle 5G band as the single square mikrotik wifi antenna gets over 100Mb/s on McD fast food places at distances up to a mile away. So as a truck driver, a big externial 5G band antenna can pick up all the free internet access points at all the fast food places and all Walmarts and many large stores. So having to "crack" into an AP is getting less and less now a days.

    • @Mikkel111
      @Mikkel111 9 місяців тому +2

      Free 5G? Never heard of it. Why would a fast food restaurant host cellular networking?

    • @DMalek
      @DMalek 9 місяців тому +11

      ​@Mikkel111 i think hes refering to 5ghz frequency, I might be wrong though

    • @Zach476
      @Zach476 9 місяців тому

      @@Mikkel111to sell coffee

    • @MyMobileGames
      @MyMobileGames 9 місяців тому +1

      ​@@Mikkel111 JIO and Airtel is giving free 5G for over a year in India

    • @heni63
      @heni63 9 місяців тому +2

      Why do you not buy unlimited cell phone data? Isn't it quick enough to almost do anything?

  • @ethanlieske9678
    @ethanlieske9678 9 місяців тому +2

    I run Ubiquity APs, some used Dells managed switches I got off ebay, and a PFsense box I got of amazon for my home network. Its a "relatively" affordable setup that still gets you basically every feature your going to want in a advanced home network.

  • @jarrodkober
    @jarrodkober 9 місяців тому +3

    I lived in a house across the street from a Car Mechanic Shop. We didn't have internet, but their WiFi showed up (protected tho) and one of my roomates figured out the password was their phone number! Got me through a year 😎

  • @XyneTrell
    @XyneTrell 9 місяців тому +59

    This is an understated huge topic. I get how you cannot go into it all in a single video, but for something like this I think some base level links to other videos or tutorials or just about anything else is desperately needed.

    • @lumikarhu
      @lumikarhu 9 місяців тому +1

      absolutely true. he also skipped most important things while trying to explain how wep2/3 works, as someone who wardrives around the city and cracks networks i rate the video 3/10 tops.

    • @jyrolys6
      @jyrolys6 9 місяців тому

      @@lumikarhu Obviously this is only meant to give a rough concept of what's going on, and not to teach or encourage. Either for liability reasons or moral reasons.

  • @neonthefox3550
    @neonthefox3550 9 місяців тому +103

    There’s something about that thumbnail that will be a meme in the future

    • @penismightier9278
      @penismightier9278 9 місяців тому

      You mean when someone writes "FREE CANDY" on the side of it?

    • @dpqb-web
      @dpqb-web 9 місяців тому +15

      "I made a 'Free Gaming PC' Van"

    • @98SE
      @98SE 9 місяців тому +7

      lmao this is definitly going to be taken out of context xD

  • @digitaltinker7813
    @digitaltinker7813 9 місяців тому +16

    Suggestion for a follow up video. How to build an affordable network that is better than buying a home router but not full Ubiquiti Dreammachine Pro level. Something that gives you more access to multiple wifi networks that can be customized but doesn't cost a ton of money. TP-Link's Omada might be an alternate option but also isn't super cheap depending on how you design your network. Maybe also throw in some used commercial hardware from sites like eBay or GovDeals.

    • @killerpanda4659
      @killerpanda4659 9 місяців тому

      To have full control and remain fairly cheap I'd think something like a basic Protectli router wouldn't be a bad idea

    • @digitaltinker7813
      @digitaltinker7813 9 місяців тому

      @@killerpanda4659That is actually my setup. I'm using one of the mid range Protectli's with TP-Link Omada switch and AP behind with the controller running in Docker. I think that might come down to who you would target the video at as an audience though. Protectli is most likely PFSense or OpnSense which may be beyond who this video was targeted at.

    • @AgencyNighthawk
      @AgencyNighthawk 9 місяців тому

      Engenius' Fit stuff is pretty good too

  • @hysel1234
    @hysel1234 9 місяців тому +14

    One of the best measures to protect yourself is to use strict MAC address filters where, especially for IoT devices, you create a separate SSID and set it up to only accept connections from specific MAC addresses. While not 100% secure (MAC addresses are easy to spoof), it does give you another layer of security.

  • @Jack-Daw-Games
    @Jack-Daw-Games 9 місяців тому +4

    really loving the more security focused content about networking and other stuff

  • @vincentdyer8018
    @vincentdyer8018 9 місяців тому +72

    the edison motors hat gives me hope for a future with the best crossover youtube tech episode in the history of forever

    • @arlsincharge
      @arlsincharge 9 місяців тому +4

      Let's go!

    • @69MaxVerstappen69
      @69MaxVerstappen69 9 місяців тому +3

      alex has been wearing that hat for 6 + months now, i don't think it will ever happen

    • @blargleschnartz
      @blargleschnartz 9 місяців тому +2

      If it does happen though, that would be incredible

    • @RENO_K
      @RENO_K 9 місяців тому

      ​@@69MaxVerstappen69i feel like once they're done testing topsy they'll do PR campagins with youtubers, they're the #1 trending startup in Canada, press would love to interview them and talk about their truck

  • @stefanlindbohm
    @stefanlindbohm 9 місяців тому +10

    hunter2 reference acknowledged. Old age also acknowledged, judging by the lack of comments on that reference :)

    • @uber1337miles
      @uber1337miles 9 місяців тому +3

      I don't get it, I just saw ******. UA-cam blocks it if you say your own password, see - *******

  • @martianingreen
    @martianingreen 9 місяців тому +183

    0:46 WAIT???? There are data limits on your wired home internet connection in Canada? What the actual hell

    • @1unar_eclipse
      @1unar_eclipse 9 місяців тому +23

      My old ISP (Cox) also has data limits, it's stupid

    • @JuiceB0x0101
      @JuiceB0x0101 9 місяців тому +16

      I live in the states and I gotta pay extra for unlimited.

    • @martianingreen
      @martianingreen 9 місяців тому +57

      @@JuiceB0x0101 that's rediculous... I live in Germany and we're not exactly known for the best Internet or friendliest ISP and I've literally never heard of that here

    • @burkino7046
      @burkino7046 9 місяців тому +10

      my ISP has a 1TB data limit every month, under normal circumstances most people wont come close to maxing this out

    • @Volker_A4
      @Volker_A4 9 місяців тому +9

      In the US most non-fiber plans I've seen have limits. They just don't mention them upfront, and they're fairly generous for cable internet. I'm sure most customers never hit them.

  • @Sneffe
    @Sneffe 9 місяців тому +3

    I love how they changed the n word password to "tigger" on 10:30

  • @TechySpeaking
    @TechySpeaking 9 місяців тому +2

    What is the focus of this video? Is it a Tech Quickie about WiFi security? A review of a multi-GPU server? It's all over the place.

  • @amit_up
    @amit_up 9 місяців тому +36

    With such a setup they put for this video i was really expecting them to try out various different types of recommended strong passwords and check how long it takes to breake it.
    The real purpose of the toy you built and are showcasing.

    • @reuven2010
      @reuven2010 9 місяців тому +3

      Eh, in truth, it's very, very easy to have an uncrackable password, the point here is that people use easy passwords or phone numbers are passwords which can be guessed easily with dictionary and slight brute force, once you have a random 10 digit password containing numbers and letters it will take thousand's of years with current hardware, add 2 symbols and now it's even worse... The toy he built is useless on a password like "f}A1=#f9M8" it will take millions of years to crack that.

    • @redsquirrelftw
      @redsquirrelftw 9 місяців тому +5

      Yeah I was expecting to actually see it in action more.

    • @marvinjohn
      @marvinjohn 9 місяців тому

      He's addressed this too in the video. People do not use difficult to crack passwords even when they do use longer passwords with numbers. There is still a dictionary available for such passwords (the Shakespeare thing he mentioned) which will considerably increase an attackers chance of cracking it. ​@@reuven2010

  • @linuxares
    @linuxares 9 місяців тому +112

    So Collin is the Intel Arc of LTT? Since he also is quiet.

    • @electricallycanadian
      @electricallycanadian 9 місяців тому +20

      and can't run AI workloads worth a damn.

    • @greenbubbleboy5673
      @greenbubbleboy5673 9 місяців тому +1

      Why is Colin quiet?

    • @vinxmusic_
      @vinxmusic_ 9 місяців тому +2

      @@greenbubbleboy5673 Maybe it´s his "role"?

    • @CommodoreFan64
      @CommodoreFan64 9 місяців тому +2

      @@vinxmusic_ I thought they said at one point that speaking English was not his strong suit since he's from the Netherlands, so it could be a bit of both?

    • @vinxmusic_
      @vinxmusic_ 9 місяців тому +1

      @@CommodoreFan64yeah probably

  • @benwu7980
    @benwu7980 9 місяців тому +6

    The point regarding Cuda cores hit me.. since I got a 8800GTX back around 2008 and wow was that a complete shift in this type of compute. Going from 1000's to millions per second was just insane.

  • @fillway1
    @fillway1 9 місяців тому +6

    Holy crap without even watching this it's already awesome. I rented a Uhaul for like a year and ran an office out of it, complete with Starlink and everything. I wish I could come up to Canada and work w/ you guys, the stuff you're doing is so cool.
    Keep up the great work!

    • @mawkzin
      @mawkzin 9 місяців тому +2

      Very nice idea.

    • @pauljones9150
      @pauljones9150 9 місяців тому

      @fillway1 tell me more!

    • @fillway1
      @fillway1 9 місяців тому

      @@mawkzin 10/10 would recommend. I honestly loved it.
      Would def recommend leasing/financing over renting one for a year though

    • @fillway1
      @fillway1 9 місяців тому

      @@pauljones9150 I've tried to reply to this three times but for some reason it's not staying up.
      It was very much the same, with monitors and other equipment mounted to the wooden slats running the length of the van, and Starlink RV or a Gli-net router combined with a Yagi antenna to re-broadcast WiFi for internet. I also had two solar inverters with 200 watt panels and AC inverters for power.
      If you're going to give it a shot, I highly recommend the Ford Transit of the three models they offer. It has better fuel economy, idle fuel draw, and interior. It's also really stable and actually kinda fun to drive to boot.

    • @fillway1
      @fillway1 9 місяців тому

      @@pauljones9150 Sorry man, I've tried to reply to you four times but it keeps getting taken down for some reason, I have no idea why

  • @TrevorsMailbox
    @TrevorsMailbox 9 місяців тому +3

    Reminds me of Sub7 and (2002-2003?) wardriving with a big patch antenna stuck to the side of my Honda wired to the PCIe card in my laptop. We'd drive around and just cruise neighborhoods. We thought we were so cool. I can still hear the ICQ notifications when someone turned on their computer and we got a notification. We were little better than script kiddies. Now I'm old and my knees hurt.

  • @stapuft
    @stapuft 9 місяців тому +181

    Blur is NOT DESTRUCTIVE.
    4chan proved this over a decade ago with the "uncensor this please" and the "no blur" threads. And with AI being what it is now......

    • @Iaotle
      @Iaotle 9 місяців тому +73

      it definitely is though. AI is just guessing at the pixels, it's not adding back the detail removed, but creating new detail.

    • @L0op
      @L0op 9 місяців тому +64

      ​@@Iaotle read again. this has been proven pre-AI, and it mostly depends on what kind of blur is used. it just wouldn't matter if they used a block of solid color, or mosaic though, and that's the whole point.

    • @deleted-something
      @deleted-something 9 місяців тому +30

      It depends on the type of blur they are using tho, and even when it is, the programs probably do it all a little bit differently

    • @tomihawk01
      @tomihawk01 9 місяців тому +12

      Enhance!

    • @bastienx8
      @bastienx8 9 місяців тому +38

      @@Iaotle There are AI trained specifically to deblur. Since blur is "just" a mix of pixels spread out, it is possible to predict how much the pixels were spread out and reverse the process. But on youtube the compression often removes the little colors shifts on blur and we can't recover the smaller details

  • @StolenPw
    @StolenPw 9 місяців тому +49

    During high school I'd walk around my neighborhood with a wifi pineapple in my backpack and an antenna sticking out while I went around cracking peoples wifi

    • @TheHammerGuy94
      @TheHammerGuy94 9 місяців тому +11

      playing watch_dogs in real life be like:

    • @robmckennie4203
      @robmckennie4203 9 місяців тому +16

      I love the number of people just confessing to crimes in these comments, it doesn't make you cool dude

    • @mks-h
      @mks-h 9 місяців тому

      ​@@robmckennie4203it does tho. Still wouldn't confess to it on the internet, lol

    • @BryceCassagneres
      @BryceCassagneres 9 місяців тому

      @@robmckennie4203 I bet you support Canada trying to ban FlipperZero's

    • @squidwardo7074
      @squidwardo7074 9 місяців тому

      @@robmckennie4203 especially the truck driver dude. why the hell would you risk your livelihood just so you can get a slightly faster internet connection

  • @TheNewton
    @TheNewton 9 місяців тому +6

    The real story here is how they resisted the urge to do a build video of building a fullblown tech van ike you'd see in movies instead of a pc on plastic coffee table in a rental.

    • @itscaptainterry
      @itscaptainterry 9 місяців тому

      that would cost too much for Scrooge McLinus

  • @m4d0s
    @m4d0s 9 місяців тому +2

    Great video for raising awareness. One thing missing for me though was info about how insecure WPS can be. I would love to see a more detailed follow up maybe including a bit more about the history. There are a lot of interesting stories of manufacturers messing up their implementations etc so keeping devices up to date (which some cheap isp issued routers often won’t do) is absolutely a critical factor imo

  • @jublywubly
    @jublywubly 9 місяців тому +1

    Years ago, I bought a PDA. I found a wi-fi locator program that had a visual display that looked like a radar. It showed the locations of all wi-fi devices within about 150 metres, in real time. If I moved the PDA, the location of the wi-fi locations would move on the screen, continuing to show exactly where they were. It also showed the name of each router and what network they were using.
    The people who didn't re-name their wi-fi routers were also showing the model. I found a website that listed the default passwords for internet routers. In theory, I would have been able to hack into anyone's wi-fi, if they didn't change the name of their router and if they didn't change their default password.
    While I did have that capability in my hands, I honestly never actually tested it out.

  • @sleepytonia6372
    @sleepytonia6372 9 місяців тому +5

    Something I would recommend to use is a sequence of four or five random words, plus a number or special character mixed in there. Those usually end up being very long and harder to brute-force than even those 16-20 random character sequences and are much, much easier to memorize and type.

    • @dfs-comedy
      @dfs-comedy 9 місяців тому +1

      Nope. Truly-random sequences have more entropy than anything you'd pick yourself. Choose a 32-character truly random password. It has roughly 192 bits of randomness. Five random English words plus a random character would have only about 87 bits of randomness assuming your vocabulary is about 65000 words (which is almost certainly much too high) and your special character has 7 bits of entropy.

    • @sleepytonia6372
      @sleepytonia6372 9 місяців тому

      @@dfs-comedy Yes. A sequence of 32 random characters is going to be stronger than a few random words. I won't fight you on this one. But a sequence of random words, not a quote or sentence, with special characters sprinkled here and there is going to be much lengthier and stronger than any random sequence of characters your average person would be willing to use as their wifi password. It'll have plenty of entropy for day-to-day use... Most home wifi passwords I've seen were just a common word with replaced characters or a relative or pet's name with 123 at the end... and usually that's fine! Most of us won't ever be targeted by criminals going around in vans to sniff our wifi transmissions. A sequence of words won't be hard to memorize, communicate or type, will be strong enough, on top of being on absolutely no list of commonly used passwords. We're looking for effective and convenient. Something better than "F1do12345" and also something you can just "tell" to someone without having to spell it out character by character. Anything that truly needs high security in a home network should be going through a wired connection on top of using a trusted VPN anyways.

  • @Farquaad_M.D.
    @Farquaad_M.D. 9 місяців тому +8

    Thank you guys again. these videos are getting so smooth. all the LTT videos have such a distinct feel. will always support this brand

  • @Secoashimself
    @Secoashimself 9 місяців тому +15

    Would love to see a follow up video showing how the VLANs and different WiFi networks should be done from security point of view as mentioned in the last section. Thanks!

    • @schlbus
      @schlbus 9 місяців тому +1

      You need network gear that doesn't suck balls in rgb lighting.

  • @ivar4us
    @ivar4us 9 місяців тому +1

    I watched all of this and found out you suggested what I was already doing. Proof you are smart.

  • @therealchayd
    @therealchayd 9 місяців тому +1

    Infra pentester here. Not as much fun, but more practical if you use a tool like NPK which spins up AWS spot GPU instances to do all the cracking in the cloud once you've got the handshake. No van needed, and a damn sight cheaper 😁

  • @Duke_Of_Havoc
    @Duke_Of_Havoc 9 місяців тому +7

    I was watching Person of Interest just now before this notification popped up. I guess we have a Harold Finch of our own in the real world.

  • @RC-1290
    @RC-1290 9 місяців тому +8

    6:19 The fans don't need to spin up, if it can't run the code.

  • @AdRoPol
    @AdRoPol 9 місяців тому +32

    crack van? heisenburg did it first

    • @raigon_pawa
      @raigon_pawa 9 місяців тому

      sell crack in van?

    • @sycecraft
      @sycecraft 9 місяців тому

      Did you mean, "Breaking Bad had it first?"

    • @RickMyBalls
      @RickMyBalls 9 місяців тому

      the fuck?

  • @Silicon_0014
    @Silicon_0014 9 місяців тому +2

    i said vlans out loud a dozen times watching this and literally shouted wooo! when you mentioned them.
    these really need to be a more accessible option so many iot devices in a modern home these days!

    • @Silicon_0014
      @Silicon_0014 9 місяців тому +2

      Please make a video on vlans! More security videos!

  • @Bunce9908
    @Bunce9908 9 місяців тому +2

    I havent enjoyed ltt videos aside fron wan show in a long time, this was a pleasant surprise and a fantastic video

  • @DavidDji_1989
    @DavidDji_1989 9 місяців тому +4

    thanks ! this is a masterclass on the basics of cyber security

  • @TheGhostInTheWires
    @TheGhostInTheWires 9 місяців тому +9

    Side note: somebody does not need to own 5 RTX4090's to crack a WPA2 password. They can pay a few bucks and do it on cloud GPU's making the barrier much thinner. And if you're using a brand of router that has a basic scheme for all its default passwords (i.e. the Sagemcom routers Spectrum gives out which all use verb + noun + three numbers) its very easy to create a custom dictionary that will crack it in a fraction of the time.

    • @jasenrock
      @jasenrock 9 місяців тому

      No smart thief will use a cloud to do illegal stuff...

  • @mikenelson6630
    @mikenelson6630 9 місяців тому +21

    I find that the best solution for Wifi security is - use a wire instead. In my opinion there is way too much focus given today on making everything wireless. While a wireless connection may be needed in some situations, I feel that a better more secure solution is to use the dedicated wire. That eliminates the possibility of someone connecting without getting past the physical security that may be set up for the area in question. But it's good to know that there are security solutions for when you are forced to go wireless.

    • @itIsI988
      @itIsI988 9 місяців тому +7

      This. All static devices that can be wired on my network, are wired.

    • @nmf220
      @nmf220 9 місяців тому +5

      Cable infrastructure costs money. When we are talking about a SOHO solution, sure thats fine. But a small/medium size businesses solution, wifi has a wide varity of very valid and innovative use cases. And can cut cable infrastructure costs but a fair amount.

    • @stitchfinger7678
      @stitchfinger7678 9 місяців тому +2

      Kinda eliminates any family household with more than 1 floor.
      And most personal devices don't accept a hardline connection.

    • @squidwardo7074
      @squidwardo7074 9 місяців тому

      Problem is most houses don't have ethernet run in the walls

  • @Holycurative9610
    @Holycurative9610 9 місяців тому

    A BBC program, a series with 2 men and a woman called Jessica, did a similar thing about 10 years ago. They parked up in a residential street and proceeded to log onto peoples internet, they even knocked on one persons door and asked them how they enjoyed their holiday and showed them pictures from their emails. Nice to see people take security as seriously ten years on.

  • @leafyeon
    @leafyeon 9 місяців тому +1

    just the right amount of LTT humor mixed in with ... like useful info that's nice to know
    XD that evil printer hack laugh tho lol

  • @DefiNotAVampire
    @DefiNotAVampire 9 місяців тому +6

    Wait you need a subscription to print on an HP??? 9:16

    • @RawmanFilm
      @RawmanFilm 9 місяців тому

      on some neewer models, YES. They are trying to pull that stunt. Other Printer manufacturers are watching closely.

    • @the_undead
      @the_undead 8 місяців тому

      ​@@RawmanFilmThe solution to this problem is just get a brother laser printer

  • @nil2k
    @nil2k 9 місяців тому +8

    All my old devices have wired ethernet. Just connect your HP printer with wired ethernet, connect your TV to wired ethernet, connect your chromecast to wired ethernet. I even have wired network cables placed near where I like to sit with my laptop and just plug in the network there too. Good luck if you have a Nest thermostat or LG smart washer and dryer.

    • @geerliglecluse5297
      @geerliglecluse5297 9 місяців тому +1

      Using a VLAN to segregate your smart devices from the more sensitive stuff is a big step on the way to solving this problem and easy to implement.

  • @ffgamingkanaal
    @ffgamingkanaal 9 місяців тому +9

    Just use a mac filter for your wifi network , problem solft 😂.

    • @indiekiduk
      @indiekiduk 9 місяців тому +1

      Mac can be cloned easy

    • @ffgamingkanaal
      @ffgamingkanaal 9 місяців тому

      @@indiekiduk Yes, that's right, but you cannot have 2 devices with the same MAC address on the network.

    • @indiekiduk
      @indiekiduk 9 місяців тому

      @@ffgamingkanaal yes you can

    • @ffgamingkanaal
      @ffgamingkanaal 9 місяців тому +2

      @@indiekiduk that is not true,
      If a 2nd device with the same Mac comes into the network, it will be automatically rejected.

    • @indiekiduk
      @indiekiduk 9 місяців тому

      @@ffgamingkanaal It works try it. It's how you get free access in hotels and on planes. If you think about it you'll realise there is no way it can tell it's 2 devices. It can be a bit choppy but it works.

  • @bingbong7431
    @bingbong7431 16 днів тому

    I love it when Linus tech tips gives us great tech tips instead of a review of standard consumer devices. big W video.

  • @brentlidstone1982
    @brentlidstone1982 9 місяців тому +1

    This is a video that definitely could have been like 5-10 minutes longer and still been full of great content.

  • @m_ism
    @m_ism 9 місяців тому +13

    Everyone must respect the honorable pastime of wardriving

  • @Xdgvy
    @Xdgvy 9 місяців тому +5

    6:10
    But they're quiet!

  • @tiotheone
    @tiotheone 9 місяців тому +4

    So... Not mentioning MAC-Filtering at all then?

  • @KuruGDI
    @KuruGDI 9 місяців тому +1

    13:15 You for sure _can_ create a ton of WLAN networks for your devices, but this only kinda works in a more urban setup where you do not live on a flat.
    If you live in a big city on a larger building chances are high that there already are dozens of networks even there is only one per household. Now imagine that not only you but most of your neighbors not one, but several wireless networks. This would probably hurt performance pretty good.

  • @scottforbes0
    @scottforbes0 9 місяців тому +1

    Based on my experience, aligning your car and setting up your antenna works well only some of the time. A secure way to protect your home network, or any important radio information, is to physically manage the transmit power and location of your router to prevent sensitive data from being exposed outside.

  • @MTMProductions
    @MTMProductions 9 місяців тому +5

    He almost crashed into that other car at 1:16 😭😭😭

  • @sharksharkco
    @sharksharkco 9 місяців тому +7

    Bingo. We’re in

  • @AusinWilliams0429
    @AusinWilliams0429 9 місяців тому +9

    you are amazing! now I want to make one!

  • @farminglol
    @farminglol 9 місяців тому

    The info that older devices break your Wi-Fi security without you realizing it at all is actually very valuable. Nothing in your config tells you that unless you dig deep.
    And with IoT-devices usually requiring to be on the same Wi-Fi for full functionality, that's an uncomfortable thing to fix.

  • @Noctema
    @Noctema 9 місяців тому

    As a cybersecurity student nearly done with their bachelors degree, i would love to see more content of this nature from LTT. Educational, fun, and entertaining. Its actually pretty difficult to find insight/demonstrations of real life applications of data loss prevention, network segmentation, least priviledge, and other more in depth best practices for maintaining a secure digital environment in a workplace. You guys have the means to set up a mock environment to show us all this in real life daily use, and it would actually be really awesome and valuable to the community if you did! :)

  • @biomechanism1
    @biomechanism1 9 місяців тому +4

    Thats why I use crack to crack passwords

  • @rasperss_5176
    @rasperss_5176 9 місяців тому

    OneRuleToRuleThemAll
    I use 2x 4090s at work to audit NTLM and we have tested a bunch of others AES256 PDF, WPA2, NTLMv2, etc. 4090s overclocked can match 4x 1080Tis in hashcat benchmarks very impressive. I wish you went more indepth and showed some hashcat benchmarks on 6 of them. Love the super entry level video for security awareness.

  • @mfvicli
    @mfvicli 9 місяців тому +1

    Jokes on me. I live right next to a highway entrance, so people are CONSTANTLY parking in front of my house. You think I'm going to confront any of them? Hell no! 😂

  • @blueredbrick
    @blueredbrick 9 місяців тому

    Anyone else shared and still shared a special love for rainbows and tables? Especially double rainbows are so clear and enlightening. Opening portals of bidectional communiation out of photons and thought and matter.

  • @JohnnyFnG84
    @JohnnyFnG84 9 місяців тому

    Brings me back to 2005 w/ my first laptop, driving around, hooking into Linksys WRT54Gs everywhere w/ open wifi, changing their SSID to random things ❤

    • @Darkk6969
      @Darkk6969 9 місяців тому +2

      Yep and changing their default router password to something else just to "help" them out. 🤣

    • @JohnnyFnG84
      @JohnnyFnG84 9 місяців тому +1

      “So secure, even YOU can’t get in! You’re welcome!” 🤣🤣

  • @faiyaazkhan13
    @faiyaazkhan13 9 місяців тому

    This video is am amazing. The writing is top tier. Love the way we have an educational topic that still has some cool and entertaining content... You deserve a raise @Tanner...

  • @NoblePineapples
    @NoblePineapples 9 місяців тому

    I love seeing the Edison hat! So happy they are finally getting the recognition they deserve.

  • @kale360
    @kale360 9 місяців тому +1

    Repping the Edison Motors swag! Really hoping y'all do something together since your both Canooks and it would be a signal boost for a cool company doing cool stuff in a new way.

  • @YonatanAvhar
    @YonatanAvhar 9 місяців тому +1

    Small correction at 08:00, the Intel AX200 is Wi-Fi 6, and the Intel AX210 is Wi-Fi 6E, not sure which one is actually on that board, but I assume it's the AX200 given that the print on the IO shield says "WI-FI 6"

  • @thepeterbro1
    @thepeterbro1 9 місяців тому +1

    Bro just recorded himself committing a felony offense

    • @DarthLeo1000YT
      @DarthLeo1000YT 9 місяців тому

      Lol no. He probably got permission

  • @blablubb1234
    @blablubb1234 9 місяців тому

    Really glad seeing a paper written by people at my (comparatively small) university at 2:27 😊

  • @lukebryant
    @lukebryant 9 місяців тому

    Wow!! I got some great take aways from this video!!!
    I'm gonna look into making a lot network for my smart lights

  • @Piela_Butter
    @Piela_Butter 9 місяців тому

    I work as an ISP. Most people have no idea how vulnerable they are and this goes for small businesses as well. They share the WiFi name and passwords with the public and have all of the cash registers, card machines on the same network.
    Every network is vulnerable. It’s not a matter of guess work. it’s just the amount of time. The more complex the password the more time required. Remember convenience is not secure.

  • @prodigys9823
    @prodigys9823 9 місяців тому

    Great video I thought this was gonna be a regular video, but I’ve been personally surprised on the quality this video

  • @ironheart34
    @ironheart34 9 місяців тому

    This feels like an extended tech quickie, but still love it. Keep it up!

  • @fido139
    @fido139 9 місяців тому

    Back when I was big into Citizen Band radios, everyone I knew was deadly afraid of the dreaded FCC truck, that was never ever spotted anywhere, nor did we ever hear of anyone that got "busted". This reminds me SO MUCH of those days. 😆🙄

  • @charlie_nolan
    @charlie_nolan 9 місяців тому +1

    I wanted to see more. Did you actually build such a van? Does it have a massive alternator?

  • @iSirath12
    @iSirath12 9 місяців тому

    this has nothing to do with this video, i just want to say how i absolutley love how linus just cleanly and smoothly segways into sponsers, always catches me offguard haha

  • @geralduser8095
    @geralduser8095 9 місяців тому

    Great content! Please do up a video demonstrating the process of guest and IOT networks and what it would look like. I understand it's a rabbit hole and each brand is different. But I think a mid level "this is generally what you want to do and some "best" practices or things to watch out for. What are the performance impacts? How difficult is it actually to maintain and trouble shoot? Etc.

  • @t1aoshibby
    @t1aoshibby 9 місяців тому +1

    Gives you the ability to use all my data limits "laughs in unlimited"