Bad idea, I thought, but the router supports MAC address filtering. If I just use this as security, then it should be ok right?
I am leaving myself open to packet sniffing, though, but that could happen anywhere on the internet I am guessing, and anything secure (ie online banking) should be via https anyway.
Whaddya reckon?
You’re not just leaving yourself open to packet sniffing, you’re making your access point easily available. No encryption, anyone can associate with it, then they have an unfirewalled connection to your PC and obviously they can use your bandwidth…you know, to attack the FBI or download kiddie porn.
When a malicious user does a network scan, he’ll look for open access points first, why go to the effort of cracking some encryption if he can gain access effectively for free? As above, MAC filtering and turning off SSID broadcast will only stop the most casual of attackers. WEP is normally a trivial five minute job to crack, WPA/WPA2 all depends on how strong your password is and how much time and computing power they have. They only need to capture one IV to start cracking and there are a number of online server farms who will do the job for you for a few dollars.
All wireless protection is breakable, but what you need to do is make yours less attractive than your neighbours. 😉