Legal & Ethical Use

This site is for education and authorized security research. We advocate a permission-first, lab-safe, and data-minimizing approach. Nothing here is legal advice—consult your counsel where applicable.

Purpose & Principles

Reminder: Unauthorized interception, access, or interference can violate communications, computer misuse, and monitoring laws in many jurisdictions.

Permission & Scope

Operate only under a written agreement that clearly defines:

# Example scope (lab)
Authorized: Test SSID LAB-5G on channels 36/44 with 10 dBm max power.
Clients: Company-owned laptops listed in Appendix A.
Time: Sept 1–5, 09:00–17:00 local.
Prohibited: Production SSIDs, emergency comms, third-party systems.

Lab-Safe Practices

Data Handling & Privacy

Technique-Specific Boundaries

Wi-Fi

BLE

RFID/NFC

Sub-GHz

IR

SDR

Responsible Disclosure

  1. Reproduce in a controlled lab first.
  2. Notify the vendor/owner privately.
  3. Agree on timelines and remediation windows.
  4. Provide minimal evidence, no sensitive data.

Quick Checklist

Code of Conduct

FAQ

Can I test my neighbor’s Wi-Fi?

No. Only test systems you own or are contracted to assess.

Is deauth always illegal?

Usually—it’s unlawful interference unless lab-contained or authorized.

Can I publish captures?

Never raw. Redact, anonymize, and ensure you have owner permission.