Yeah, any half decent city IT department will at least be using port filtering for their switches anyways. Unless a port is specifically set up to provide open access to the internet, all OP would be able to do is bonk against the city IT’s MAC address filter until the port was disabled for having an unrecognized device/suspicious activity.
In my building, (and pretty much any city building I’ve ever worked in,) only specific ports were set up to provide open internet access. And usually those ports are in places that need to be unlocked, and which OP wouldn’t have ready access to without a fun little bit of breaking and entering. Because those ports aren’t intended for the general public to use; They’re meant for presenters, speakers, clients who have rented a room for the day, etc… The general public is meant to use the free wifi. Because there’s a different level of service expected if you’re renting a room, vs simply camping out all day in the quiet study area.
When OP tries to bypass that by plugging straight in, the switch will just go “lol git fukd loser” and disable the port. Of fucking course they weren’t able to access anything, because the port isn’t there for OP; It’s for the IT department to be able to use whenever they need to set up a new computer, or book checkout station, or simply to plug their city-owned laptop in to be able to use the city network.
casual_turtle_stew_enjoyer@sh.itjust.works 7 months ago
yeah OP needs to provide this detail specifically as it changes everything.
If the Ethernet jack was not on a desk, then it wasn’t there for them to use. If they unplugged a cable to make it accessible, that is unfortunately enough to be considered tampering.
If an Ethernet jack was not expressly provided, unoccupied, at the technology access station then yes the access to Ethernet information facilities was unauthorized and illegitimate and could carry legal ramifications. Say what you want about proprietary wifi drivers, you get the access you are given and any attempts to gain further access without authorization are defined as intrusion attempts and will more likely than not be treated as such to some degree. Because honestly, the libraries aren’t funded enough to have great security and Ethernet security is harder than WiFi security in practice, despite the challenges being characterized by the same principles.