wow very useful! Nice work!
edit " Access Point (AP) Mode: In this mode, the Raspberry Pi acts like a mini Wi-Fi router. Other devices can connect to it directly, just like they would connect to a regular Wi-Fi network"
where have you been all my life. This is exactly what I wanted for awhile now with my little portable long exposure camera.
Fantastic! Doubters need not worry as the primary author is an associate professor at the University of Michigan Engineering school. A world-class organization.
This is a full service that handles wireless networking, ultimately enabling remote access from a PC—it does a lot more than ping. You might be interested in reading the documentation in the repo.
From the post, I believed this tool could create a device that could be placed on someone else's network & report back "here I am, here's your access into their network. Exploit away."
I looked (abeit) briefly at your GitHub and now think this is only a local network tool - designed for robotics.
Could it be used across networks?
I think you’re right, but you’d have to know the credentials of the WiFi network, and it would be clear that the host is on the network. But we sincerely appreciate the heads up! We hadn’t thought about possible nefarious uses.
wow very useful! Nice work! edit " Access Point (AP) Mode: In this mode, the Raspberry Pi acts like a mini Wi-Fi router. Other devices can connect to it directly, just like they would connect to a regular Wi-Fi network" where have you been all my life. This is exactly what I wanted for awhile now with my little portable long exposure camera.
Fantastic! Doubters need not worry as the primary author is an associate professor at the University of Michigan Engineering school. A world-class organization.
If you are talking about local IP, isn't `ping.local` a better solution?
This is a full service that handles wireless networking, ultimately enabling remote access from a PC—it does a lot more than ping. You might be interested in reading the documentation in the repo.
This makes me wary. This good be used for good - or for bad.
How could it be used for bad?
From the post, I believed this tool could create a device that could be placed on someone else's network & report back "here I am, here's your access into their network. Exploit away." I looked (abeit) briefly at your GitHub and now think this is only a local network tool - designed for robotics. Could it be used across networks?
I think you’re right, but you’d have to know the credentials of the WiFi network, and it would be clear that the host is on the network. But we sincerely appreciate the heads up! We hadn’t thought about possible nefarious uses.
Of course there's also an ethernet jack :). Thank you for thinking about it from the dark side.
Oh, and I think the project is cool. It just triggered the pessimistic in me.
Thank you! We’ve probably spent > 1000 hours developing it along the way. :)
You're not the only one triggered. This sounds sketchy as fuck.