Sigh, the amount of misinformation around KRACK is making me want to pull my hair out. "Stop using all WiFi! Never use public WiFi" *groan*
-
Show this thread
-
Also "Android 6.0 devices are totally pwned!" (more like: they're actually more secure than older devices)
1 reply 1 retweet 13 likesShow this thread -
PSA: If you use WiFi mostly to access the Internet and don't have openly accessible devices in your LAN, you are FINE. Keep calm and WiFi on
4 replies 11 retweets 19 likesShow this thread -
Replying to @marcan42
what does “openly accessible devices” mean in this case?
1 reply 0 retweets 0 likes -
Replying to @cmsimike
Like a NAS or something, especially with no authentication. An actual server you don't want others to have access to, and without TLS.
3 replies 1 retweet 1 like -
Replying to @marcan42
I'm still confused, I thought the attacker can only force a client to join their fake network. How do they get access to LAN-internal stuff?
1 reply 0 retweets 0 likes -
Replying to @assortedhackery @marcan42
is it possible to execute the key reinstallation and have the client maintain their connection with the original network, then decrypt?
1 reply 0 retweets 0 likes -
Replying to @assortedhackery
On Android 6.0 the key zeroization (not really reinstallation) attack doesn't let you do this. Older Androids/other devices, yes.
1 reply 0 retweets 1 like -
Replying to @marcan42 @assortedhackery
The problem is the *precise* impact depends on devices on both sides, versions, settings, crypto algo used, traffic, protocols, etc. Messy.
1 reply 0 retweets 1 like
So it isn't really "lol I'm taking over your WiFi", more like "dedicated attacker w/inside knowledge can attack specific corporate network".
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.