Hacking

Safeguard your privacy online. Arm yourself with knowledge and use these tips, tools and techniques to secure your digital life.

I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber paid and tried to cover up the loss of 57 million driver and passenger records, seeing the impact of the hugely problematic SEC database hack on national stock exchanges and, finally, witnessing the Meltdown and Spectre mass surveillance backdoor I’m really starting to feel the gravity this quote from Woz:

Never trust a computer you can't throw out a window.

Steve Wozniak

Connecting devices like the RPi or Apple TV to public networks requiring browser-based auth can be a drag. But that shouldn't stop you from hacking your way in. Find out how.

Imagine your sitting at a coworking cafe in Bali after your last gadget run to Sim Lim Square where you picked up a CCTV Wi-Fi camera to protect your Bitcoin mining rig.

You unbox your new toy only to realize you can’t connect it because the cafe you’re sitting at is using a captive portal.

Gah! What to do… Shell into the device and use wget or curl? Fuggetaboutit.

You reach into your Tortuga carry-on bag, pull out your laptop and do the only sensible thing you can think of—spoof the device’s MAC address.

Here’s how to easily spoof the MAC address of an IoT device using macOS.