|
|
2008-04-17
, 23:38
|
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#42
|
FYI for anyone that doesn't already realize it, but WEP, WPA, PSK, hiding SSID or MAC filtering is all a waste of time. It's all hackable today and it only gives a false sense of security. The best we can do is to encrypt everything or start talking in pig latin to throw off hackers.

|
|
2008-04-17
, 23:47
|
|
Posts: 422 |
Thanked: 244 times |
Joined on Feb 2008
|
#43
|
Isn't PSK a type of auth/encryption for WPA? So it doesn't make sense talking about them as alternatives.
And if the best thing we can do is encrypt everything, why did you just say it's a waste of time to encrypt everything?
WPA, even PSK, is as I understand it rather strong at the moment, as long as you use a properly obscure and long key, so you're not in the rainbow tables, or caught early in a brute-force attack.
|
|
2008-04-18
, 02:08
|
|
|
Posts: 549 |
Thanked: 502 times |
Joined on Feb 2008
@ Bowling Green Ohio (united states)
|
#44
|





| The Following User Says Thank You to b-man For This Useful Post: | ||
|
|
2008-04-18
, 02:30
|
|
Posts: 422 |
Thanked: 244 times |
Joined on Feb 2008
|
#45
|
|
|
2008-04-18
, 13:57
|
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#46
|
Isn't PSK a type of auth/encryption for WPA? So it doesn't make sense talking about them as alternatives.
And if the best thing we can do is encrypt everything, why did you just say it's a waste of time to encrypt everything?
WPA, even PSK, is as I understand it rather strong at the moment, as long as you use a properly obscure and long key, so you're not in the rainbow tables, or caught early in a brute-force attack.
|
|
2008-04-18
, 14:08
|
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#47
|
http://maemo.org/community/wiki/installopenvpn/
As for those security methods being a waste of time, I suppose you don't lock your car. I mean, after all, a rock will get into any car.
desiv

|
|
2008-04-18
, 14:38
|
|
|
Posts: 1,137 |
Thanked: 402 times |
Joined on Sep 2007
@ Catalunya
|
#48
|
|
|
2008-04-18
, 18:35
|
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#49
|
I never said encrypting everything is a waste of time. I should have been a little more clear explaining that the data should be encrypted prior to transmission over wireless. Encrypting your emails and documents before transmitting them is different then sending unencrypted data over a connection you believe (or hope) is secure.
Seriously, it's a matter of degree; how much/good of encryption is good enough. There's no functional difference for a snooper whether you put all your traffic through an (encrypting) VPN, or run it over an (encrypting) WPA link, or whatever; either way, they have free access to your data, but need to decrypt it to get any use out of it. Just a matter of how much horsepower or how bright a mathie they have access to.If someone is taking the time, in my opinion, to crack WEP, then they aren't too far away from using other methods to break WPA.
, but the description says "Cracking weak WPA Preshared Keys". So, don't use a weak key... or get stronger encryption, whatever. But to deny that these encryption methods are encryption is just plain wierd.|
|
2008-04-18
, 23:22
|
|
Posts: 76 |
Thanked: 15 times |
Joined on Feb 2008
|
#50
|
So, you think the encryption with WPA happens after wireless transmission?Seriously, it's a matter of degree; how much/good of encryption is good enough. There's no functional difference for a snooper whether you put all your traffic through an (encrypting) VPN, or run it over an (encrypting) WPA link, or whatever; either way, they have free access to your data, but need to decrypt it to get any use out of it. Just a matter of how much horsepower or how bright a mathie they have access to.I didn't watch this
, but the description says "Cracking weak WPA Preshared Keys". So, don't use a weak key... or get stronger encryption, whatever. But to deny that these encryption methods are encryption is just plain wierd.
And on a practical level, WEP is stuff-every-script-kiddie-must-know-to-avoid-being-rotfled-off-the-playground, and attainable on any decent hardware in minutes. WPA still, AFAIK, requires 10s of GB in tables and ~an hour to crack easy PSKs, and is practically impossible for hard ones. I expect only serious types are set up with mobile table-based WPA busters.
With so many public hotspots out there, I'd like to find a way to make the N810 a secure device for transmitting confidential information.
As for those security methods being a waste of time, I suppose you don't lock your car. I mean, after all, a rock will get into any car.
desiv