On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:

I have a Rogers-supplied router and cable modem package, which twice has shown significant usage when I was out, once with the original unit and once with their replacement Cisco.  That makes me suspicious of the current state of authentication for wi-fi schemes (and I use the term "schemes" advisedly: they used to horribly leaky (;-))

What's a good approach? I have considered

--dave

I've set up MAC address lists, after a surprising number of reboots to unwedge the router  (did I even mention I hate flaky PC-style software?).

How can my hacker avoid them? Wait until my wife's Mac drops off-line and steal her MAC?

--dave

-- 
David Collier-Brown,         | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
davecb@spamcop.net           |                      -- Mark Twain