View Single Post
Posts: 76 | Thanked: 15 times | Joined on Feb 2008
#50
Originally Posted by Benson View Post
So, you think the encryption with WPA happens after wireless transmission? Seriously, it's a matter of degree; how much/good of encryption is good enough. There's no functional difference for a snooper whether you put all your traffic through an (encrypting) VPN, or run it over an (encrypting) WPA link, or whatever; either way, they have free access to your data, but need to decrypt it to get any use out of it. Just a matter of how much horsepower or how bright a mathie they have access to.I didn't watch this , but the description says "Cracking weak WPA Preshared Keys". So, don't use a weak key... or get stronger encryption, whatever. But to deny that these encryption methods are encryption is just plain wierd.
And on a practical level, WEP is stuff-every-script-kiddie-must-know-to-avoid-being-rotfled-off-the-playground, and attainable on any decent hardware in minutes. WPA still, AFAIK, requires 10s of GB in tables and ~an hour to crack easy PSKs, and is practically impossible for hard ones. I expect only serious types are set up with mobile table-based WPA busters.
I use the "best" encryption I have available while using wireless at home or work; anything is of course better than nothing. I'm not trying to spread any FUD around here, just looking for a portable solution to my own FUD With so many public hotspots out there, I'd like to find a way to make the N810 a secure device for transmitting confidential information.