To: ShadowAce
Using massive computational resources, the attacker essentially cracks the encryption by making an extremely large number of educated guesses as to what key is being used to secure the wireless data. So brute force is the key and it takes a real whooper of a system to pull it off.
For some strange reason, I'm not too worried about this.
I don't think anyone sitting outside my house looking for a Wi-Fi connection is going to be able to hack my WPA protected network.
16 posted on
11/06/2008 5:03:40 PM PST by
Bloody Sam Roberts
(Do I really need to use the sarcasm tag?)
To: Bloody Sam Roberts
“I don’t think anyone sitting outside my house looking for a Wi-Fi connection is going to be able to hack my WPA protected network.”
Ditto - especially since most of my neighbors have no encryption at all.
19 posted on
11/06/2008 9:30:22 PM PST by
Uhaul
(Time to water the tree of liberty...)
To: Bloody Sam Roberts
So brute force is the key and it takes a real whooper of a system to pull it off.No, what you quoted is the method that the new technique makes unnecessary. Read a few lines farther.
You don't need someone sitting outside of you house. If you have neighbors nearby chances are they can see you signal and can possibly use this technique.
21 posted on
11/07/2008 3:22:54 AM PST by
MichiganMan
(So you bought that big vehicle and now want to whine about how much it costs to fill it? Seriously?)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson