-
Paolo posted an update 8 years, 6 months ago
WPA2 Wifi security has been broken. Kaput. Compromised and now needs to be patch-updated.
https://market-ticker.org/akcs-www?post=232470Oh by the way, when the WPA2 “standard” was being debated and discussed may we examine who was in the room? I have to wonder why this wasn’t caught a long time ago, given that WPA2-AES/TKIP/etc has been around now for a hell of a long time. When something this nasty is found you have to wonder if the process was corrupted either negligently or on purpose.
Note that the US media has thus far ignored this story; I saw it in The Guardian.
Gee, I wonder why…….
Pay close attention to what Karl is asking at the end of his blog posting:
The Giza Forum (Legacy)
Closed Archive of The Old Forum
“The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks. For more information about specific products, consult the database of CERT/CC, or contact your vendor.”
More here: https://www.krackattacks.com/
Cara, notice the key point: “The weakness are in the Wi-Fi stardard”. A standard that will allow a one time use only Key Sequence to be snatched out of the air and re-used. This is exactly how NSA Public Key-Private Key systems are implemented. So, who was in the room that allowed such an exploit to be incorporated into the Standard. Yeah, I have my suspicions.
I’m pretty sure that the usual three letter agencies, Mossad etc., had their reps. Also sure to be there were Cisco’s “we built the internet” boys