Last time I was at a hacker conference I for obvious reasons didn't want to connect to the local network.
It's not just a matter of setting up some simple firewall rules, since the people around you are people
who have and are inventing new and unusual attacks. Examples of this would be rogue IPv6
RA and NDs, and people who have actually generated their own signed root CAs. There's also the
risk (or certainty) of having all your unencrypted traffic sniffed and altered.
For next time I've prepared a SheevaPlug
computer I had laying around. I updated it to a modern Debian installation, added a USB network card,
and set it up to provide always-on VPN. This could also be done using a raspberry pi, but I don't
Read the rest of this entry »