Unity+ Posted March 13, 2015 Posted March 13, 2015 So, I was just thinking about this earlier and thought I would just share my idea. I don't know if this is an actual bypass. Inform me if it is, though. The idea involves developing an app that allows a mobile device/PC to connect to the hotspot device(which also has the app) that has the Internet access. While the device doesn't provide direct access to the Internet, what happens is the hotspot device would allow requests from the connected devices. Essentially, the connected devices make requests of webpages to the device. The hotspot device would then download that requested webpage and then send it to the device that requested it. That is just the basic aspect of it. So, what do you think? Is this a bypass or simply just an inefficient process that would also be breaking the rules(I don't see why it would be).
Sato Posted March 13, 2015 Posted March 13, 2015 It looks like you're thinking of piggybacking or tethering, depending on the relationship between the routing and dependant devices / users. What you described is essentially how most implementations work, and in fact, how "downloading" works (**note, your router is a computer**). 1
Unity+ Posted March 13, 2015 Author Posted March 13, 2015 It looks like you're thinking of piggybacking or tethering, depending on the relationship between the routing and dependant devices / users. What you described is essentially how most implementations work, and in fact, how "downloading" works (**note, your router is a computer**). From the definitions within Wikipedia, it is close but not really what I am talking about. What I am talking about is not allowing the connected devices to have direct access, but the requests sent to the device that is acting as the hotspot and the hotspot device will essentially download the webpage to itself and then send the information requested for to the user asking for it. It doesn't give the user access to the Internet access, simply access to the information. It would be limited, but possible.
StringJunky Posted March 13, 2015 Posted March 13, 2015 (edited) I use my phone as a portable wifi hotspot and link my laptop to it. Or it could be an 'ad hoc' connection you are thinking of. Edited March 13, 2015 by StringJunky
Unity+ Posted March 13, 2015 Author Posted March 13, 2015 I use my phone as a portable wifi hotspot and link my laptop to it. I don't think hotspots are against ISP policy unless it is for the purpose of allowing other users access to the device, which can be detectable. This is just making it harder for them to detect it. NOTE: I am not condoning this activity. I am simply giving tips.
Sato Posted March 13, 2015 Posted March 13, 2015 From the definitions within Wikipedia, it is close but not really what I am talking about. What I am talking about is not allowing the connected devices to have direct access, but the requests sent to the device that is acting as the hotspot and the hotspot device will essentially download the webpage to itself and then send the information requested for to the user asking for it. It doesn't give the user access to the Internet access, simply access to the information. It would be limited, but possible. I think you are not understanding. In any case of downloading (that means accessing a web page here), information is passed between devices and at some point stored on each one in the process, the particularities of which are those of the protocol and software implementing it. A system which does all this, but restricts the communication to HTTP and downloads the web page and then sends it to another device, is not different. It might help to give those articles a more thorough read; they apply here directly, esp with the implication that someone is not completely aware or condoning of the connection, but still so otherwise. I'm tried and about to pass out, but hope this helped. Satout.
StringJunky Posted March 13, 2015 Posted March 13, 2015 I don't think hotspots are against ISP policy unless it is for the purpose of allowing other users access to the device, which can be detectable. This is just making it harder for them to detect it. NOTE: I am not condoning this activity. I am simply giving tips. With my ISP, Giffgaff, you are only allowed to do what I do on a fixed data package - mine's 5GB. If you get the unlimited download plan it's not allowed, owing to people abusing it. Anybody is allowed, with my permission to use my internet; I'm paying for it.
Unity+ Posted March 13, 2015 Author Posted March 13, 2015 With my ISP, Giffgaff, you are only allowed to do what I do on a fixed data package - mine's 5GB. If you get the unlimited download plan it's not allowed, owing to people abusing it. Anybody is allowed, with my permission to use my internet; I'm paying for it. Verizon must be different then, as well as CenturyLink. I think you are not understanding. In any case of downloading (that means accessing a web page here), information is passed between devices and at some point stored on each one in the process, the particularities of which are those of the protocol and software implementing it. A system which does all this, but restricts the communication to HTTP and downloads the web page and then sends it to another device, is not different. It might help to give those articles a more thorough read; they apply here directly, esp with the implication that someone is not completely aware or condoning of the connection, but still so otherwise. I'm tried and about to pass out, but hope this helped. Satout. Yeah, didn't see the part about modems. I apologize for that.
StringJunky Posted March 13, 2015 Posted March 13, 2015 (edited) Verizon must be different then, as well as CenturyLink. Yeah, didn't see the part about modems. I apologize for that. I think internet access, prices and policies are much better and freer in the UK than the US. Giffgaff are very in tune with and encourage the feedback from its users; their polices and plans are refined by user feedback. Edited March 13, 2015 by StringJunky
Sensei Posted March 13, 2015 Posted March 13, 2015 (edited) Tor https://www.torproject.org/ Download and install app browser, that's modified Mozilla/Firefox. When you go to URL it's sending packet to Tor server (each time randomly picked one), instead of where you wanted to go. Then that server is sending real requests to website, downloading it, and then sending to you in encrypted form.. ISP won't know where you go, what you watched, and won't filter, block it. Edited March 13, 2015 by Sensei
MonDie Posted March 17, 2015 Posted March 17, 2015 (edited) From the definitions within Wikipedia, it is close but not really what I am talking about. What I am talking about is not allowing the connected devices to have direct access, but the requests sent to the device that is acting as the hotspot and the hotspot device will essentially download the webpage to itself and then send the information requested for to the user asking for it. It doesn't give the user access to the Internet access, simply access to the information. It would be limited, but possible. So rather than merely forwarding the packets, the server will accept - reformat - resend? Have you heard of mobile hotspots such as Mifi? If it's sending the information back through the internet, then why? Is it adding another layer of encryption? Edited March 17, 2015 by MonDie
Unity+ Posted March 17, 2015 Author Posted March 17, 2015 So rather than merely forwarding the packets, the server will accept - reformat - resend? Have you heard of mobile hotspots such as Mifi? If it's sending the information back through the internet, then why? Is it adding another layer of encryption? It would send it to the device requesting, not through the internet again through some other process. Bluetooth, maybe?
Sensei Posted March 17, 2015 Posted March 17, 2015 (edited) Bluetooth, maybe? Bluetooth is pretty slow. http://en.wikipedia.org/wiki/Bluetooth When it's +HS it's not really Bluebooth transfer rate but IEEE 802.11 wifi.. Edited March 17, 2015 by Sensei
MonDie Posted March 17, 2015 Posted March 17, 2015 (edited) Bluetooth, maybe? Sounds sneaky! Edited March 17, 2015 by MonDie
MonDie Posted April 7, 2015 Posted April 7, 2015 (edited) What are the ISP policies anyway? I thought you might find NoCat interesting. Warning: www.nocat.net is redirecting to hackerfriendly.com for some reason. Proprietary solutions are available for creating wireless hot spots, but why go for a closed-source solution when your favorite operating system and freely licensed tools can do it on a spare PC? [You will need] NoCatAuth hot spot/portal software (free, open-source and available at www.nocat.net). [and] A wireless access point, or several. Access points function as a bridge between the wired and wireless segments of your network. NoCat builds a captive portal by assigning incoming users an IP address using DHCP and restricting network access until the user has validated, be it as a guest, paying customer or administrator. NoCat uses the standard Linux iptables firewalling to control network access. LinuxJournal: Linux-Powered Wireless Hotspots by Mike Kershaw Edited April 7, 2015 by MonDie
fiveworlds Posted April 7, 2015 Posted April 7, 2015 The idea involves developing an app that allows a mobile device/PC to connect to the hotspot device(which also has the app) that has the Internet access. While the device doesn't provide direct access to the Internet, what happens is the hotspot device would allow requests from the connected devices. Essentially, the connected devices make requests of webpages to the device. The hotspot device would then download that requested webpage and then send it to the device that requested it. That is just the basic aspect of it. Of course you can I have a tp-link wifi-box in my computer that allows it.
MonDie Posted April 7, 2015 Posted April 7, 2015 Oh my, the avatar was completely incidental. Anyway, bye!
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now