• 0 Posts
  • 8 Comments
Joined 8 months ago
cake
Cake day: March 19th, 2024

help-circle
  • Lending some anecdotal support, the wireless network of the large flagship I went to (in the time spanning the late oughts to the early 10s) operated well enough for the the time while allowing students to plug their own wireless routers into the single Ethernet port they otherwise us to split. And this was back in 802.11g days; before all the channels of 5ghz.

    Students had a DC++ service running on the campus MAN, fed it by downloading Linux isos over the onion network… it wasn’t just us nerds doing it either- nearly everyone had a Wi-Fi router.

    As time marches on, more rules are made, none are repealed, and student freedom and innovation is stifled. Then those growing up in relative freedom grow grumpy as they watch things enshittify for the people who won’t have known an alternative. I usually apply this thought to privacy philosophy but I see it fits here too.








  • If there are no TOS though, wouldn’t OP be in the clear? I was an intern at a state capitol a couple years and while we had secured user/print/PSK networks, the public network was just an unprotected SSID without a captive portal - you just join.

    I didn’t think about it at the time, but it seems wild to have that setup in 2024. Piqued, I just looked it up and unless they’ve added a captive portal with a TOS to agree to, it looks like this is the only governing statement:

    Wireless Internet access is provided for the public at the Connecticut General Assembly (CGA) campus. This includes the State Capitol Building, the Legislative Office Building (LOB), and the Old State House (OSH). This wireless service is protected by virus and malware protection systems. Objectionable advertising, pornography, spyware, viruses, and other inappropriate content is blocked. To utilize the Internet, simply connect your device to the CGA_Guest wireless network.

    It reads to me like In that increasingly rare scenario that a raspberry pi advertising an exit node isn’t considered different from Joe’s laptop or Jane’s phone.