![]() |
2008-04-17
, 23:38
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#42
|
FYI for anyone that doesn't already realize it, but WEP, WPA, PSK, hiding SSID or MAC filtering is all a waste of time. It's all hackable today and it only gives a false sense of security. The best we can do is to encrypt everything or start talking in pig latin to throw off hackers.
![]() |
2008-04-17
, 23:47
|
Posts: 422 |
Thanked: 244 times |
Joined on Feb 2008
|
#43
|
Isn't PSK a type of auth/encryption for WPA? So it doesn't make sense talking about them as alternatives.
And if the best thing we can do is encrypt everything, why did you just say it's a waste of time to encrypt everything?
WPA, even PSK, is as I understand it rather strong at the moment, as long as you use a properly obscure and long key, so you're not in the rainbow tables, or caught early in a brute-force attack.
![]() |
2008-04-18
, 02:08
|
|
Posts: 549 |
Thanked: 502 times |
Joined on Feb 2008
@ Bowling Green Ohio (united states)
|
#44
|
The Following User Says Thank You to b-man For This Useful Post: | ||
![]() |
2008-04-18
, 02:30
|
Posts: 422 |
Thanked: 244 times |
Joined on Feb 2008
|
#45
|
![]() |
2008-04-18
, 13:57
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#46
|
Isn't PSK a type of auth/encryption for WPA? So it doesn't make sense talking about them as alternatives.
And if the best thing we can do is encrypt everything, why did you just say it's a waste of time to encrypt everything?
WPA, even PSK, is as I understand it rather strong at the moment, as long as you use a properly obscure and long key, so you're not in the rainbow tables, or caught early in a brute-force attack.
![]() |
2008-04-18
, 14:08
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#47
|
http://maemo.org/community/wiki/installopenvpn/
As for those security methods being a waste of time, I suppose you don't lock your car. I mean, after all, a rock will get into any car.
desiv
![]() |
2008-04-18
, 14:38
|
|
Posts: 1,137 |
Thanked: 402 times |
Joined on Sep 2007
@ Catalunya
|
#48
|
![]() |
2008-04-18
, 18:35
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#49
|
I never said encrypting everything is a waste of time. I should have been a little more clear explaining that the data should be encrypted prior to transmission over wireless. Encrypting your emails and documents before transmitting them is different then sending unencrypted data over a connection you believe (or hope) is secure.
If someone is taking the time, in my opinion, to crack WEP, then they aren't too far away from using other methods to break WPA.
![]() |
2008-04-18
, 23:22
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#50
|
So, you think the encryption with WPA happens after wireless transmission?Seriously, it's a matter of degree; how much/good of encryption is good enough. There's no functional difference for a snooper whether you put all your traffic through an (encrypting) VPN, or run it over an (encrypting) WPA link, or whatever; either way, they have free access to your data, but need to decrypt it to get any use out of it. Just a matter of how much horsepower or how bright a mathie they have access to.I didn't watch this
, but the description says "Cracking weak WPA Preshared Keys". So, don't use a weak key... or get stronger encryption, whatever. But to deny that these encryption methods are encryption is just plain wierd.
And on a practical level, WEP is stuff-every-script-kiddie-must-know-to-avoid-being-rotfled-off-the-playground, and attainable on any decent hardware in minutes. WPA still, AFAIK, requires 10s of GB in tables and ~an hour to crack easy PSKs, and is practically impossible for hard ones. I expect only serious types are set up with mobile table-based WPA busters.
As for those security methods being a waste of time, I suppose you don't lock your car. I mean, after all, a rock will get into any car.
desiv