Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
[off topic rant]MiXdNuTs said:I know that you can use Linux to easily snatch passords and such out of the air if good encryption is not in place.
I would say that, for a public hotspot (easy access plus low detection risk plus lots of users == high profile target), WEP should be considered worthless. It's too easy for a hacker to invest the ~4 hours of WEP cracking time and have that much opportunity to grab data.sparkles said:while wep is by no means completely secure, it at least makes a hacker *try* to get your information from you, which will be sufficient to deter most pople from bothering.
although VPN does add to security, it still can be defeted. There are a few tools for Linux that I have seen specificly for high-jacking a vpn connection in progress. Its still better then nothing, but I wouldn't trust it with any sensitive information.//edit: This is why I mentioned VPN earlier. Once you have a VPN tunnel in place, your whole connection is secure from a wireless standpoint. I think it should mandatory for any wireless connection used for non-trivial purposes.
Good point. I think, thought, that here we're back to "too complicated to mess with." The gain of breaking a single user's VPN (with content of unknown value) versus the rest of the unsecure users at a hotspot is probably sufficient protection in and of itself.Xipher said:although VPN does add to security, it still can be defeted. There are a few tools for Linux that I have seen specificly for high-jacking a vpn connection in progress. Its still better then nothing, but I wouldn't trust it with any sensitive information.
Actually, the fact they are using VPN tends to mean they have something worth value to hide.lomn75 said:Good point. I think, thought, that here we're back to "too complicated to mess with." The gain of breaking a single user's VPN (with content of unknown value) versus the rest of the unsecure users at a hotspot is probably sufficient protection in and of itself.