I just moved into a student dorm for a semester abroad, and beforehand I emailed them asking whether they had ethernet ports to plug my router into (I use it to connect all my devices, and for WiVRn VR streaming). They confirmed that I could, but now that I’m here the wifi login portal is asking me to accept these terms from the ISP, which forbid plugging in a router. There’s another clause that forbids “Disruptive Devices” entirely, defined as:

“Disruptive Device” means any device that prevents or interferes with our provision of the 4Wireless to other customers (such as a wireless access point such as wireless routers) or any other device used by you in breach of the Acceptable Use Policy;

So what are my options? I don’t think I can use this service without accepting the terms, but also I was told by the student dorm support that I could bring a router, which contradicts this.

EDIT: some additional context:

  • dorm provider is a company separate from my uni (they have an agreement but that’s it)
  • ISP (ask4) is totally separate from dorm provider, and have installed a mesh network that requires an account. On account creation, there are many upsells including one for connecting more than one device. The “free” plan only allows me to sign in on a single device, and I can upgrade to two devices for 15 pounds.
  • ethernet requires login too
  • VR streaming requires a high performance wifi 6 network, which is why I bought this router (Archer C6 from tp-link)
  • @[email protected]
    link
    fedilink
    English
    220
    edit-2
    2 months ago

    That seems pretty standard stuff. My dorm had the same policy, because they operated their own mesh network and didn’t want students sending out their own radio signals that would have absolutely made their wireless network not work well.

    Is there some reason you need your own router?

    ETA: The student dorm people probably meant a network switch. Regular, non-techy people don’t usually know the difference between a router and a switch.

    • @[email protected]OP
      link
      fedilink
      English
      882 months ago

      Yeah, the interference argument is fair, but I think this is also the ISP (totally separate third party) trying to protect the paid plans they sell for connecting more than one device…

      • @cm0002
        link
        English
        1012 months ago

        trying to protect the paid plans they sell for connecting more than one device

        It’s definitely 90% of the reason

      • @[email protected]
        link
        fedilink
        English
        352 months ago

        So it’s a network operated by a third party? That’s interesting. The handful of universities I’ve been to maintain their own.

        • @kalleboo
          link
          English
          62 months ago

          Where I went to school, originally the dorms were on the university network but a year in they offloaded us onto regular, commercial ISPs. The change was great for us since the university network was very strict on stuff like torrents (using DPI any torrent, even legal, got you disconnected for 24h)

        • @ngwoo
          link
          English
          52 months ago

          My university had student apartments, each had their own router. No weird rules since it wasn’t the university’s network at all, it belonged to whoever lived in the apartment. Full router access, connect whatever, put it in bridge mode and connect your own if you want.

          • @[email protected]
            link
            fedilink
            English
            52 months ago

            If there’s enough space between them, it would be less of an issue. If it was in a multifamily high rise with hundreds of units, I would expect it to cause issues.

            • JackbyDev
              link
              fedilink
              English
              32 months ago

              Is this a problem with 5G networks? There are more channels and they don’t go through walls as well, right?

              • @[email protected]
                link
                fedilink
                English
                22 months ago

                Tl;Dr It’s complicated.

                Do you mean 5Ghz networks (5G is cellular tech, after all)? If so, 5Ghz can travel through walls, but it doesn’t travel as far, because there’s an inverse relationship between range and channel width. Also, 5Ghz has a shorter wavelength; some of the signal’s light will get absorbed by the walls, but not all of it.

                Ultimately, you’d still have the same problem: too many radios sharing a limited range of frequencies on a band would interfere with each other if sufficiently close.

                It would be akin to having everyone playing different music at full volume on their own personal speaker; you’ll inevitably hear the people closest to you. Radios can’t “hear” anything outside of their chosen frequency (channel), but if other people nearby are also on that channel, you might catch or lose some unintended packets, triggering a resend event (TCP) or causing stuttering/lag (UDP).

                The number of channels available for 5Ghz varies by country, with the EU having the most, iirc. In the US, if you try to force your router to use one of the blacklisted channels, your devices will likely not connect (unless they were directly imported), despite being able to use the 5Ghz spectrum.

      • @Crashumbc
        link
        English
        42 months ago

        In that case, just set up a router level VPN. The university probably doesn’t give a shit. Which is why the help desk IT kid said it’s fine, probably.

        It’s the 3rd party ISP just being greedy. The ISP may not even care as long as you’re not running an insane amount of traffic through it. Often this type of stuff is added to TOSs to allow them the option, if you’re being a bad actor.

  • @[email protected]
    link
    fedilink
    English
    1452 months ago

    psst

    Hey, kid, don’t tell anyone I told you about this

    *Lifts coat

    iodine
    https://code.kryo.se/iodine
    Description: tool for tunneling IPv4 data through a DNS server
    This is a piece of software that lets you tunnel IPv4 data through a DNS
    server. This can be usable in different situations where internet access is
    firewalled, but DNS queries are allowed.

    • @phoneymouse
      link
      English
      31
      edit-2
      2 months ago

      You got the goods! I used an HTTP tunnel when I was in college.

      • u/lukmly013 💾 (lemmy.sdf.org)
        link
        fedilink
        English
        262 months ago

        I also like the idea of ptunnel

        Ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies.

          • @Crashumbc
            link
            English
            42 months ago

            Yeah, any off the shelf network intrusion software would probably immediately flag either of those based solely on the amount of traffic.

          • billwashere
            link
            English
            12 months ago

            Well it would be obvious. Any decent network tool would be able to filter traffic on a port or type (ICMP, DNS, etc).

            “Wonder why this kid has 2.5Gb of DNS traffic last week? That isn’t normal. Maybe we should go check it out”

            The trick to staying hidden is to look like noise. And this would not be noise.

        • @Itdidnttrickledown
          link
          English
          32 months ago

          In 2014 when I was in the hospital for a week I got a visit from their IT. Seems like pushing 5 to 10 gig a day through a ssh connection triggered something. Just a gig of ICMP of any variety would trip a alarm.

    • 𝕸𝖔𝖘𝖘
      link
      fedilink
      English
      162 months ago

      Man, I wish I knew this back then. I used Google translate as a proxy. Then that was blocked, so I used babelfish’s built-in translation engine which was touch and go. This would have helped a lot lol

    • @[email protected]
      link
      fedilink
      English
      92 months ago

      I love things that can route internet over something that should not be used for that. For example I’m thinking of making same thing over SMS and Veloren/Minecraft (or anyother videogame)'s private chat or something.

      • Andromxda 🇺🇦🇵🇸🇹🇼
        link
        fedilink
        English
        72 months ago

        No, this is specifically for DNS over UDP (Port 53). What you’re looking for is just an HTTPS proxy. There is no difference between a DoH connection and any other HTTPS connection.

        • @Itdidnttrickledown
          link
          English
          02 months ago

          Except on my networks all port 53 tcp/udp and port 853 for that matter are forwarded to my dns per firewall rules. I also block all encrypted dns as well as dns over https blocked. Its my dns or nothing. I also have a vpn and proxy blocklist that updates twice a day. PFblockerNG is effective when maintained.

    • billwashere
      link
      English
      12 months ago

      This is a very neat tool that I’ve bookmarked for further research. But I think you’re missing the point. He doesn’t need to hide network traffic, he needs a Wifi6 router. Now maybe you could setup a router to go through this service to further obfuscate the traffic but I don’t think this alone solves his purpose.

      But I’m very glad you posted it because I love learning about little tricks like this to get around overly restrictive networks.

  • @[email protected]
    link
    fedilink
    English
    1082 months ago

    The reason they don’t want you using your own WiFi access point is probably because dorms are prone to over congestion if everyone sets up their own WiFi network.

    If you wanted to fuck with them-and you don’t mind spending money-then you could set up your WiFi and get internet via mobile carrier or starlink, so that you never actually have to agree to their terms. Then when/if someone comes around to bitch at you you can watch them slowly come to the conclusion that they’ve got nothing on you.

    Otherwise your options are to follow the rules to the letter and live without vr streaming, or accept that you might get in trouble. Some WiFi routers can be configured to not advertise their network; annoying because you’ll have to manually enter the network information on every device, but it might keep you from getting caught.

    As for connecting multiple devices without paying; there’s probably some creative ways to tunnel all your traffic through a single device to get around that. Could still get you in trouble if you’re caught.

    If you’re doing anything that could get you in trouble with the school make sure you save the email in which they told you using your own router is allowed.

    • @[email protected]
      link
      fedilink
      English
      82 months ago

      Some WiFi routers can be configured to not advertise their network; annoying because you’ll have to manually enter the network information on every device, but it might keep you from getting caught.

      Just name the network something like Samsung S20 Personal Hotspot. They’re not gonna look into why a student created a Hotspot with their phone.

      Or, shit - lock the fucking door.

        • @[email protected]
          link
          fedilink
          English
          32 months ago

          IT does? Damn, didn’t know - my bad. Where I’m from IT doesn’t have the keys, and the people that do have the keys know better than to try entering people’s dorms, unless it’s really something critical. Wifi doesn’t qualify.

          • @computergeek125
            link
            English
            22 months ago

            Where I went to college, they probably didn’t directly have the key, that’d have to go through maintenance. But one of the things you signed on to initially was for maintenance to enter if they needed to while you were out.

            Plus, at least half of the WAPs were actually in rooms and not hallways, so to service the network beyond IDF problems they’d have to get in

    • @[email protected]
      link
      fedilink
      English
      52 months ago

      You don’t actually need internet for the VR streaming part, so you could just set up a router not plugged into the wall

      • @utopiah
        link
        English
        -32 months ago

        You do if you are rendering in the cloud, e.g NVIDIA CloudXR. Not sure what OP plans to do.

        • @mojofrododojo
          link
          English
          42 months ago

          NVIDIA CloudXR

          that’s an incredibly tiny edge case.

          • @utopiah
            link
            English
            -12 months ago

            Sure yet it’s a perfectly legitimate one. I’m not OP, it might be exactly their use case.

            • @mojofrododojo
              link
              English
              32 months ago

              in a dorm room?

              realtime cloud VR rendering for use in a dorm room?

              A lab, sure.

              A dorm bedroom?

              pfft

              • @utopiah
                link
                English
                02 months ago

                I’m not sure if you played PCVR in the Summer but imagine that in a tiny room… it’s just way too hot. Again I’m NOT saying it’s good, or bad, I’m only saying you made assumption about OP usage. I’m not sure if you tried CloudXR but basically, it works and it’s not that complex to setup (e.g 1h) so it’s relatively faster and cheaper than building and owning a gaming PC.

                I don’t understand why you are even arguing about a legitimate usage.

                • @mojofrododojo
                  link
                  English
                  2
                  edit-2
                  2 months ago

                  because I’ve been into vr for about a decade and know no one who uses cloudXR. 120hz ain’t gonna happen over a college dorm network. 90hz on quest 2 would be very challenging.

                  wait, you realize, his requirement for streaming has NOTHING to do with cloud rendering right?

  • @pivot_root
    link
    English
    782 months ago

    You shall not use or attempt to use a device or software (such as NAT, Address Masquerading, Proxying, or the connection of an additional wireless router) that would allow you to connect more than the number of devices set out in the Service Information to the Network.

    One of the ways they detect this is by checking the TTL of the packets coming from the “one” device is less than expected. If your router is using OpenWrt, you can configure an iptables rule to reset the TTL of outgoing packets to the default.

    • @[email protected]OP
      link
      fedilink
      English
      22 months ago

      My router is an Archer C6 from TP-Link. I’ve never used OpenWrt, but I have used Linux on my laptop & server for many years. Is this worth looking into/possible without any prior networking knowledge?

      • @pivot_root
        link
        English
        22 months ago

        It’s pretty straightforward to use, in my experience. There’s a web UI, so you won’t need to worry about the nitty gritty details unless you go beyond what’s supported through that.

  • Dark Arc
    link
    fedilink
    English
    74
    edit-2
    2 months ago

    So most dorms don’t want you using your own routers because a bunch of student routers causes A LOT of inference.

    You should probably reach out not to the dorm folks but the university networking folks as they’re the ones that will ultimately make the decision on whether or not to turn things off/disconnect you.

    A cheap networking switch would probably be okay by them to get some more wired connections in your dorm room (routers aren’t really a great way to do that).

    https://www.amazon.com/Linksys-Business-LGS105-Unmanaged-Enclosure/dp/B00FV12VSW/ref=mp_s_a_1_1_sspa?crid=3PUXDK6TFLZIT&dib=eyJ2IjoiMSJ9.zm2b2eGNCSReGFJuUskv6-s3cUVDK12lfqOmf729Jjx1nw8mI07xRjx4RZCcnWDhplIUW-7IOfSn6R7TMu0yVy_k9hGXtOs0SNS7RO8sN4RI5aa_8-iwSOXz6biaUH5pE27eM8eYyBzJl9tkYxX4erfrbMwkWwhSrqIKQGOSqx1DQ1z5ZiDGCyQ_u0k8IhaN1Ra-Zpsr07cg-ZjJnDz6lA.iHHYMOhPc6OW0LmOOPkf8taxFxWnD5Sbwy_NxZwTQbU&dib_tag=se&keywords=network+switch&qid=1725717407&sprefix=network+%2Caps%2C186&sr=8-1-spons&sp_csd=d2lkZ2V0TmFtZT1zcF9waG9uZV9zZWFyY2hfYXRm&psc=1

    As a secondary concern, using a router will cause a double NAT for all your connected devices (universities don’t operate in the way ISPs do). That could cause some weird networking shenanigans, particularly for anything peer-to-peer like online games.

    • @[email protected]OP
      link
      fedilink
      English
      102 months ago

      That’s good advice, however this dorm is not part of my uni (just a partner to provide housing) and the internet provider whose T&C I’m expected to accept and sign up for 1y of are a totally separate legal entity, that has a bunch of upsells for stuff like “connect more than 1 device” (which my router/AP would basically be bypassing, and I think that’s what these clauses are about). About the interference, is it possible to limit it severely while still having a reliable connection just within my room? I only really want to connect:

      1. Laptop (wired)
      2. Phone
      3. VR for streaming from laptop
      • @[email protected]
        link
        fedilink
        English
        11
        edit-2
        2 months ago

        You can do a few things to reduce interference if the device broadcasting the signal supports it. Unifi APs support these settings. Most routers with WiFi probably do not support transmit power.

        1. Adjust transmit power to lower setting
        2. Higher the frequency, shorter the range (but that frequency may be highly used in the area), so #3 is the better option
        3. Analyze the frequency usage and picking a frequency that is least used
        4. If 2.4Ghz band isn’t necessary disable it and only use 5Ghz since it’s a higher frequency it again has a lower range.
        5. You could also faraday cage your room so the signal won’t leak out, but thats probably more work than its worth.
      • @Crashumbc
        link
        English
        42 months ago

        You may want to update your OP. Not being part of the University, makes a HUGE difference and will affect your options. Typically, when people say “dorms” it’s direct University provided housing.

        Options in this case:

        1. Just play dumb, nobody expects anyone to actually read TOS.

        2. Setup a router level VPN.

        3. Buy your own hotspot for Internet access. (May be cheaper to just pay for additional devices)

  • @Alk
    link
    English
    532 months ago

    Mine didn’t either when I lived in a dorm. I got around the network block.

    1. Plug Xbox 360 into ethernet wall port
    2. Log into uni network, get internet
    3. Plug router directly into pc.
    4. Assign router same ip as Xbox
    5. Spoof router mac address to match xbox
    6. Unplug from pc
    7. Quickly swap cable in wall from Xbox cable to router cable, Indiana Jones style
    8. Internet for 1 month. Repeat monthly.
    • @[email protected]
      link
      fedilink
      English
      202 months ago

      TIL you aren’t a wireless professional until your hacks comes with a cinematic soundtrack.

    • @shoki
      link
      English
      52 months ago

      this gives me playstation 1 CD swap vibes

      (inserting a legal cd to pass verification and then swapping it for your own cd)

    • @Agent641
      link
      English
      12 months ago

      deleted by creator

    • @Agent641
      link
      English
      12 months ago

      Hacker on steroids.

  • billwashere
    link
    English
    502 months ago

    I work in university IT so I have some experience here. Some schools are better than others but in general providing IT services for students is like trying to wrangle a herd of starving feral cats who are all in heat.

    First of all I have never seen 802.1x implemented (Ethernet authentication) in the wild that wasn’t almost immediately removed. It’s a shitty protocol that’s terrible to debug. I totally get why they restrict APs … my god if every student had one it would be a pain. It would be like standing in a crowded room with everyone shouting and you’re trying to pick out one conversation 20 ft away.

    My guess is you’re basically in a situation like my son was at ECU. It’s likely not really a university dorm but closely affiliated hence the reason of a third party. Or the central university IT is abysmal and can’t be bothered. Either way the only reason to use 802.1X is because they think it’s more secure, when in fact it’s way more trouble than it’s worth. You can do the same thing by controlling downstream routing or MAC filtering. The ECU “dorm” did that and it wasn’t much better honestly. You had to go into a website to add your MAC address to get access to the WiFi. Firstly how do you do that when your computer can’t talk to anything. Chicken and egg problem. Secondly for the ones who figured out how to do that using your phone, good luck getting a history major to figure what even what a MAC address was.

    My suggestion is don’t bother. If they’ve implemented 802.1x they’re a micromanaged IT and will catch you eventually. I’d also guess they have completely overtaxed their egress traffic and your speeds are abysmal.

    On a related note, when you graduate never ever rent from an apt complex that generously process WiFi or Ethernet. It will almost always suck, they will have no one to provide adequate tech support, and they are just using it as another revenue stream.

    Sorry I don’t have better advice but if they control the network there isn’t really much you can do.

    • Amanda
      link
      fedilink
      English
      5
      edit-2
      2 months ago

      I was once responsible for a student house (we don’t have dorms in the US sense, this is the closest we have) and I have similar experiences but less extreme. My favourite was when I had forgotten to configure DHCP filtering and someone plugged in a router the wrong way so it started offering DHCP (that didn’t work) to everyone in the building, in a race with our upstream ISP.

      • Amanda
        link
        fedilink
        English
        52 months ago

        Also, the times rats got into the networking room and ate random cables. I should add the network was built by volunteer students in the ‘90s.

      • billwashere
        link
        English
        12 months ago

        I did this a work one time… sorta the same thing. I installed pfsense VM and left the DHCp server on. I killed the network in our office for about 15 minutes.

  • @SulaymanF
    link
    English
    502 months ago

    This isn’t rare and not altogether a bad idea.

    My university had a problem of students bringing their own WiFi routers before the dorms had WiFi. Students would set them up incorrectly and cause a series of problems with colliding DHCP servers and interference and it would cause outages for nearby wired students.

    A lot of IT departments locked the network down for these reasons.

    • @pivot_root
      link
      English
      252 months ago

      Students would set them up incorrectly and cause a series of problems with colliding DHCP servers

      That’s an IT problem, not a user problem. The downstream ports should have been isolated at both the link and packet layers. Configuring a router to share an unrestricted LAN between a dorm full of untrusted users is a disaster waiting to happen.

      • @maniii
        link
        English
        112 months ago

        A lot of Unis have IT on a shoestring budget.Especially the CompSci dept have the most idiotic IT “professionals” working there.

        Usually it is the Sciences dept like Mech-E or Tech-E or Elec-E who run massive Compute nodes for Rendering Physics or Fluid dynamics or something something research …

        Unfortunately, the Unis that have massive student dorms on-campus tend not to isolate their networks properly and allow students to directly connect to all depts Networks without any barriers. The isolation happens between LAN and Internet which is where most of the controls and filtering happens.

        It would be nice if each dept had their own VPN servers and proper network isolation at the LAN instead of the crazy monkey wiring everything to everything else on-campus.

  • @fishos
    link
    English
    482 months ago

    Users are often dumb. Imagine 100 people who think they know what they’re doing trying to set up a bunch of custom networking.

    That’s your dorm.

    Most dorms either outright prohibit using personal hardware like that or require the schools IT department to install it themselves and set it up.

    Run a network of your own someday and you’ll understand. It’s hard enough to get your own network working perfectly without a bunch of wildcards popping up everywhere.

    • billwashere
      link
      English
      112 months ago

      Do you know how many times I have killed my own network at home and I control EVERYTHING!! I’m the only wildcard…. Of course I have ADHD and documentation is not my strong suit 🤣

    • @[email protected]
      link
      fedilink
      English
      82 months ago

      I’ve never seen this happen. The reality is unless it’s a dorm full of CS students most don’t know fuck all about WiFi, networks, or want to pay for their own routers. It’s better to talk to the few who would attempt something like this.

      No what this actually is is the ISP trying to make money charging for more devices.

    • @repungnant_canary
      link
      English
      22 months ago

      If someone deploys their router using a uni network as wan then I don’t see how that could affect other uni network users? I can imagine some internal services might not work behind such a router but it would be illogical of the user to blame anyone but themselves.

      • @[email protected]
        link
        fedilink
        English
        22 months ago

        The post mentioned a wireless mesh network, so it sounds like the ISP/provider already has a bunch of wireless access points set up to cover the whole building. One of the problems with high-density living spaces is that there are only a limited number of communication channels WiFi can use, so if everyone living there also runs their own wireless networks they use up all the available channels and have to cross-talk over eachother, leading to everything slowing down.

      • @fishos
        link
        English
        12 months ago

        If everything is set up perfectly, it should work, sure. Now how many people do you think even know the difference between WAN and LAN? You expecting the bio or art major to not make any mistakes at all? Or the business major?

        • @repungnant_canary
          link
          English
          12 months ago

          But if the bio or art major can seriously affect your network then is that even their fault? What if someone had skill and malicious intent?

          • @fishos
            link
            English
            02 months ago

            Lmao you are oblivious if you think it’s possible to set up a network that someone CANT fuck up while having physical access to it.

            It’s not magic.

            The point is NETWORKS ARE COMPLICATED. Users are generally dumb. The point is you don’t expect them to have the knowledge to do it right. So they’ll break something. Users with actual knowledge could yes, break things even worse.

            That’s EXACTLY why they’re restricting hardware use.

            Welcome to the conversation, smh

            • @repungnant_canary
              link
              English
              42 months ago

              I do know from experience that networks are complicated and users are dumb, but I still think that if someone with barely any knowledge and without malicious intent can mess with your network then something’s wrong with the setup.

  • @[email protected]
    link
    fedilink
    English
    472 months ago

    Shit, ask4? I think they were the isp when I was at uni about a decade ago. I’m sorry to hear they’re still kicking.

    If it’s still the same as back then, all the dorms are essentially on the same lan and they’re using Mac filtering at the gateway. Since this was before Https became ubiquitous this meant you could sniff other people’s http requests.

    What you do (what we did) was sign up with one device and setup a proxy on it. I think we used squid-cache. But anything that will masquerade the traffic as coming from that one device should do the trick.

  • @nutsack
    link
    English
    43
    edit-2
    2 months ago

    pretend you didn’t read it and press the button

  • @xylogx
    link
    English
    422 months ago

    As someone who has administered networks and written policies like this the concern here is that you will run an open network that may be used for piracy, hacking, DDOS or to send bomb threats. Tracing down this type of behavior is required by law and allowing students to run open networks makes this near impossible.

    • @[email protected]
      link
      fedilink
      English
      162 months ago

      Not only that, but managing wifi channel congestion in a dorm is a pita.

      It’s tough enough when you fully control the airspace, to have nice clean coverage and overlapping cells.

      But then add dozens or hundreds of individually managed APs in a tiny space…with DFS and/or 160MHz channel widths?

      Ops best bet is to get their own 5g home internet and plug in.

      You’ll be hard pressed to get a router to talk to a captive portal sign in…but if OP wants to get creative, this can easily be fixed with a dumb switch and a Linux PC with two NICs. You could use windows for this, but why would you?

  • @AreaKode
    link
    English
    382 months ago

    Assuming they have their own wifi, they just don’t want you using wifi off of your own router. A wired connection should be fine.

    • @[email protected]OP
      link
      fedilink
      English
      112 months ago

      Unfortunately, connecting to the ethernet port still prompts me to log into the network (make an account and accept these terms)

      • @cm0002
        link
        English
        412 months ago

        Accept the terms and ignore them

          • @[email protected]OP
            link
            fedilink
            English
            62 months ago

            Would that work even if the T&Cs are for a third party (the ISP), while the correspondence is with my dorm provider (not legally related to my uni, they just have a partnership)?

              • @pivot_root
                link
                English
                142 months ago

                Turn off SSID broadcasting entirely. Hidden networks require more technical expertise to discover than most people have.

                The ISP techs will still be able to find it, but there’s little reason for them to go looking when nothing seems out of the ordinary.

                • @[email protected]
                  link
                  fedilink
                  English
                  42 months ago

                  This is what I was going to recommend. Worse case scenario the internet gets shut off and he has to email somebody and say he won’t do it again. Most likely that nobody will notice or care.

            • @gmtom
              link
              English
              52 months ago

              Yes I did the same thing at my uni halls, said fuck paying for multi device, bought a router, named it like a phone hot-spot and never had issues.

              In reality no one that works there is paid nearly enough to care about the ISP’s terms and conditions, and even if someone from the ISP comes to do maintainance or something, they won’t be there to snoop for rule breakers and even if they are, if the SSID looks like a phone hot-spot, they won’t care, and even if they do they’re not going to trace it back to you directly and even if they do, you have the email saying its okay which will shift any and all blame away from you.

              So just go for it, there’s a 99.999999999999999999% chance you won’t get caught and even if you do you won’t get any blame because you asked the company.

        • @Ejh3k
          link
          English
          72 months ago

          100% the correct answer.

      • @[email protected]
        link
        fedilink
        English
        92 months ago

        I would just accept the terms and disable wifi, or if you don’t want to double nat just use a switch and accept the terms / login on every device connected to the switch.

  • Tarquinn2049
    link
    English
    35
    edit-2
    2 months ago

    If you are really worried about getting caught not following the exact rules as written, you could always pay for multi device connections… then they won’t care.

    But it’s definitely possible to set up your VR router in a way that is not gonna bother anything. Most people in this thread don’t know that your VR router doesn’t need internet access. If the VR stream is all it is doing, it can be isolated from the internet, and the isp won’t know or care it exists.

    The other thing about rules, that they don’t tell us autistic people, is that following rules is actually kind of optional. Certainly more optional than it feels like to us. Think about it in terms of what the people were thinking when they wrote the rules, and who will be enforcing the rules and what they will care about. And what the enforcement of the rules would look like. (In this case, the most likely initial outcome of them enforcing these rules would be either an e-mail or paper letter telling you they noticed you are breaking a rule, possibly with details to help you stop breaking it, but likely not). Try to sus out the “spirit” of the rules rather than the letter of the rules. That is how all the other humans use rules and why to us it always feels like everyone is breaking all the rules and getting away with it.

    If you follow every rule to the letter… you really can’t do anything. At all. Like, literally, even we are breaking rules we don’t yet know about every single day.

    • @[email protected]
      link
      fedilink
      English
      3
      edit-2
      2 months ago

      I have to agree with this comment. I’d probably just set up the router regardless (probably in WiFi AP mode) and not worry about it too much. No one reads the terms and conditions anyway. If someone comes to actually enforce the thing I’d obviously take it down. Hide the ssid if you want to.

      As others mentioned, there are ways to also hide traffic behind a single device, maybe connecting to a VPN on the router level would help with this?

      Back when I was in uni I had terrible wired Internet so I’d try anything. At one point I was using a jailbroken iPhone to share its 4g connection without having to pay extra to the wireless ISP (basically data plan was unlimited but tethering wasn’t). It worked fine, I could use my data on any of the devices over wifi but it was barely faster than the wired network and it was a lot of hassle so I gave it up.

  • @utopiah
    link
    English
    322 months ago

    Not a lawyer but if you have an email that says you can, I’d argue it’s override the ToS assuming the person giving permission actually legally can.

    Anyway I bet what they avoid is reselling access so I believe as long as you don’t pay for yourself then resell to others you’ll be OK.

    • @Knock_Knock_Lemmy_In
      link
      English
      112 months ago

      This. The ISP isn’t going to care about (or notice) a single person using a router. They will notice and care if 1 person is consuming the data of 20.

    • @[email protected]
      link
      fedilink
      English
      42 months ago

      The email says that you can do it. It doesn’t say that you can do it without purchasing the upsell option.

      • @[email protected]OP
        link
        fedilink
        English
        42 months ago

        And importantly, the email is from my dorm (whose contract simply said they provided free fast wifi), while these unexpected T&Cs are from the dorm’s ISP.