wifi access from laptop to starbucks wifi

JD jd1008 at gmail.com
Tue Jun 22 22:00:38 UTC 2010



On 06/22/2010 02:01 PM, Wolfgang S. Rupprecht was caught red-handed 
while writing::
> Bruno Wolff III<bruno at wolff.to>  writes:
>    
>> That depends on your threat model. If you don't trust the wireless operator
>> the wireless encryption isn't that big of a deal since you need to use an
>> encrypted tunnel in any case.
>>      
> No kidding.  You should use some form of end-to-end encryption any time
> you are on the net and don't want your packets looked over.  SSH, HTTPS,
> SMTP w. TLS have their uses.
>
> BTW. Even WPA2-PSK seems to have some weaknesses with respect to
> inter-customer eavesdropping.  There is some claim that the per-host
> keys aren't as securely chosen as they should be.
>
> -wolfgang
>    

WPA2-PSK + AES : I thought it is not possible for inter-customer traffic
to figure out the keys because once the connection is established,
keys change dynamically per the protocol. Perhaps a an expert on the
WPA2-PSK protocl can shed some light on this.



More information about the users mailing list