Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
evgen
on Oct 16, 2017
|
parent
|
context
|
favorite
| on:
Predicting, Decrypting, and Abusing WPA2/802.11 Gr...
WPA2 in general. The 4-way handshake is vulnerable. Might be patchable, but there is a ton of embedded stuff out there that will never get updated...
vermilingua
on Oct 16, 2017
|
next
[–]
It has already been patched by some vendors, but you're right, if the IoT has given us anything, it's tonnes of unpatchable consumer gear.
cm2187
on Oct 16, 2017
|
prev
[–]
I guess the question is whether only the AP needs to be patched or the client as well.
ztjio
on Oct 16, 2017
|
parent
[–]
In fact it is only clients that need patching. However, sometimes AP's are also clients. Disable any such features if you have them and are not depending on them.
Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact