Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 07/26/2016 1:00:39 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: dayglored; ThunderSleeps; ShadowAce; ~Kim4VRWC's~; 1234; 5thGenTexan; Abundy; Action-America; ...
Link Only to an article from Ars Technica on a new man-in-the-middle attack which allows bad guys to gain data from people using WIFI hotspots about Secure websites you may be using, such as your banks or other websites that use HTTPS connections with encrypted connections. It works on any system, Mac, Windows, Linux, etc., because it relies on the industry standard of internet languages of the Hypertext communications after it leaves your computer environment. — PING!

Pinging dayglored, Shadow Ace, and ThunderSleeps for your ping lists due to cross platform security issues.


Multiple Platform Security
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 07/26/2016 1:07:37 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: sauropod

read


5 posted on 07/26/2016 1:27:32 PM PDT by sauropod (Beware the fury of a patient man. I've lost my patience!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Well before everyone freaks out, this attack only works if the network operator deploys it. So unless you are using someone’s network who you can’t trust (or hackers are able to compromise the network you are using through some other means), it’s not going to affect you.

Even you did get hit with this attack, most of the HTTPS security would still remain intact. They would not, for example, be able to decrypt any of the encrypted web traffic that is passed thru HTTPS.


7 posted on 07/26/2016 1:31:28 PM PDT by Boogieman
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

The Ars Technica article talks about using WPAD to leak URLs. Microsoft issued a patch for WPAD in MS16-077.

I looked at the patch and it does indeed fix the problem. However it uses a sledgehammer to do it: It disallows NETBIOS traffic outside of the local subnet for ANYTHING. This is going to create havoc for legitimate file sharing and remote management (esp cloud) and name resolution on routed networks.

It needs a system registry change to undo it. No Group Policy, ugh. This is going to be a major tech support headache.


11 posted on 07/27/2016 11:58:26 AM PDT by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson