<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p><br>
</p>
<div class="moz-cite-prefix">On 2018-09-16 1:45 p.m., David
Collier-Brown wrote:<br>
</div>
<blockquote type="cite"
cite="mid:9ac61071-1983-0216-3c15-ef04bd433f23@rogers.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<p>I have a Rogers-supplied router and cable modem package, which
twice has shown significant usage when I was out, once with the
original unit and once with their replacement Cisco. That makes
me suspicious of the current state of authentication for wi-fi
schemes (and I use the term "schemes" advisedly: they used to
horribly leaky (;-))</p>
<p>What's a good approach? I have considered<br>
</p>
<ul>
<li>MAC address lists, <br>
</li>
<li>no wi-fi (strictly wired doesn't work with solid concrete
walls), </li>
<li>a second router with a more secure protocol (<i>is</i> there
such a protocol? And will my wife's Mac speak it?))</li>
<li>something I haven't thought of<br>
</li>
</ul>
<p>--dave</p>
<p>[The usage never runs me over my limit: I think someone is
using me for downloads that might put <i>them</i> over their
limit</p>
</blockquote>
<p>Given that most closed-source routers are simply an invitation to
hacking, I generally try to make sure my connections are all
layer-2 (you can't easily attack something that does not have an
address).</p>
<p>Similarly, a small metal box is a good place to put their wifi
(although their wifi tends to be less effectual in layer-2 mode).
You may also be able to turn off the wifi.</p>
<p>WEP2 is pretty good tech. It's at least fairly difficult to
break (depending on who's talking). Most new routers support it,
but I suggest looking into pfsense on some pfsense supported
hardware.</p>
<p>That-all-said... rogers? Ugh.</p>
<p><br>
</p>
</body>
</html>