Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Totally safe, until your local war-driver sniffs out your insecure device and comes back at two in the morning to upload illegal content via your ISP.


Except the attack doesn't get you access to their wireless network. It allows you to redirect someone from their wireless network to your own (spoofed) wireless network and then you can snoop the traffic.


If it works in one way what reason is there to think it won't work the opposite direction? This flaw is in the protocol itself.


You're freaking me out with that scenario




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: