Why Is This Useful For My Customers
- Get instant WiFi access on the Internet (without password)
- Have access ONLY when they are in your outlet (no more "free" Internet for people passing by or customers of outlets nearby)
- Use less battery while they are connected (save 2+ hours)
- Captive portal: ads, promos and offers in their smartphones (without any app)
- Enjoy unique services in a white Label custom made mobile App
Why Would I Want It For My Business
3D WiFi Bubbles also provides added-value services for your business such as:
- Dynamic control of your Internet speed depending on your customers' class (simple, VIP)
- Ability to profile your customers' from their smart devices (position, drink/food, time/frequency of presence/staying)
- Total security by guarding your perimeter or inner space
In order to start using 3D WiFi you need to have the 3D WiFi Bubbles (generator) Box which is actually an access point/hot spot.
To install it just:
- Choose a high place to put it. (e.g. ceiling, somewhere high on a wall...)
- Plug-in the AC Cord and an Ethernet cable from your router.
- Users/customers choose the "3D-WiFi-Bubbles" network -while in range- from any smart device and get connected.
The prototype consists of 5 things (hardware):
- The main terminal (Access Point)
- SD Card (8GB)
- WiFi antenna
- Ethernet cable 100/1000 (1.5m)
- EU Charger - 240V/2A (2m)
The software that lies inside the SD Card is the heart and brain of 3D WiFi Bubbles. It's the "3D WiFi Fencing" technology that enables precise control over space and lets the "Bubbles" transmit information in the specified 3D range.
Not completely true Blecky
Yes, with WEP encryption it's super simple. Everything's encrypted with the key you needed to know to get on the network. Everyone on the network can decode everyone else's traffic without even trying.
With WPA-PSK and WPA2-PSK, it's a little trickier, but not too hard. WPA-PSK and WPA2-PSK encrypt everything with per-client, per-session keys, but those keys are derived from the Pre-Shared Key (the PSK; the key you have to know to get on the network) plus some information exchanged in the clear when the client joins or re-joins the network. So if you know the PSK for the network, and your sniffer catches the "4-way handshake" another client does with the AP as it joins, you can decrypt all of that client's traffic. If you didn't happen to capture that client's 4-way handshake, you can send a spoofed de-authenticate packet to the target client (spoofing it to make it look like it came from the AP's MAC address), forcing the client to fall off the network and get back on, so you can capture its 4-way handshake this time, and decrypt all further traffic to/from that client. The user of the machine receiving the spoofed de-auth probably won't even notice that his laptop was off the network for a split second. Note that NO man-in-the-middle hassle is necessary for this attack. The attacker just has to capture a few specific frames at the time the target client (re-)joins the network.
With WPA-Enterprise and WPA2-Enterprise (that is, with 802.1X authentication instead of using a Pre-Shared Key), all the per-client per-session keys are derived completely independently, so there's no possibility of decoding each others' traffic. An attacker would either have to sniff your traffic on the wired side of the AP, or possibly set up a rogue AP in the hope that you'll ignore the bogus server-side certificate the rogue AP would send, and join the rogue AP anyway.