Many wireless routers automatically set up a non-password protected 'guest access'? Really?

(all emphases above are mine (for clarity))

None of this was the case for me - when I logged on to my guest network, I was able to connect to any site I wished. And that is consistent with the way that my machine displayed the “newKarl-guest” network in the window that lists all available networks and their security status. Of the five or six available, it was the only one that was not password protected (as indicated by a closed padlock on my Mac).

I have a lot of stuff that looks like this on my network but I’m not sure. Is there any way to find out for sure?

Can the guest network be renamed?

Using the names “Loading…” or “FBI Surveillance Van 35-b” might deter usage…

I have a unsecured ‘guest’ account however if you log on to it all you get is a ‘web page’ (locally stored) which asks you for the guest account password. So you still can’t get anywhere w/o a password, just a different format of it.

I ran into this at a site I do consulting for. They had Time Warner business Internet service and I called TWC to get them to turn off the WiFi and put the box in bridge mode. They did that.

A week later, I was doing work at the site, and festooned in the wiring closet was a coax splitter, a second router (with wall wart), a power-over-Ethernet injector (with wall wart), and an access point. I carefully disconnected all of that and gave it to my site contact, with an explanation that if TWC asked about it, it was unwanted and they could take it back if they wanted.

By the way, this was two floors underground in a concrete sub-basement, so it wouldn’t do anybody any good anyway.

I’m waiting for the lawsuits when this ISP practice causes someone technical or legal problems. It won’t be fun for the person who gets raided and has their computers and phones confiscated and searched for illegal porn or terroristic threats. People should read their contracts but how many have the legal let along technical prowess to understand any of it?
Companies, at least, should be running this stuff through their lawyers and refusing the public access points.

I can’t imagine that a homeowner would be liable for anything someone did while connected to the guest wireless set up by Comcast, given that it’s a completely separate network. I’d think that Comcast would provide the address of the person who accessed the guest wireless and the police would go after that person directly.

BTW, the guest wireless thing is a good idea on Comcast’s part. Most people have limited data plans on their mobile devices so they’d value being able to access guest wireless when they’re out and about. And if a sufficient number of Comcast customers have the guest wireless enabled, you could have fairly comprehensive coverage wherever you go. That would be a good incentive to sign up for Comcast internet at home rather than the service offered by the phone company. Cablevision in southern Connecticut has something similar and they also install access points at public places like the commuter train stations.

In the few blocks within range of my home monitoring station, the apparently-public SSIDs are “xfinitywifi” and don’t share an exact MAC address with anything else within range. I have also seen “getVerizonFIOS” in the past, but it isn’t showing up today so I can’t tell if it shares a MAC address with a customer’s SSID.

I’m sure there are ISPs that do this incorrectly, but around here they seem to be properly configured and isolated from customer networks.

Comcast is being sued over this. It’ll be interesting to see where this goes.
http://www.fastcolabs.com/3039682/comcast-was-sued-for-quietly-making-your-homes-internet-part-of-the-sharing-economy

You’d probably need to log into it using a different Comcast account. So while you could double your bandwidth, it would come at the cost of purchasing an additional account. You’d be better off just upgrading your existing account.

My (UK) ISP is BT. When I signed up, one of the selling points was the ability to log into their own ‘hotspots’ wherever another customer who also had the service was located. It was made clear to me how it worked and I had to explicitly agree to it.

I have used it a few times: At an airport, I was able to use this free service instead of paying for the airport wifi, and when my wife was in hospital recently, her tablet connected free of charge there too. The hospital rakes in a substantial markup if you have to pay.

Remember, like all public wifi hotspots, the link between your computer and the router is unencrypted and can be intercepted (unless you are encrypting your own transmissions by using a VPN or an https connection). Yes, you must give your Comcast login and password to get access into the network, but that is not the same as using a passkey to secure your wifi connection.

So, just like when you connect to the internet at McDonalds, don’t do anything that you wouldn’t want your neighbors to see.