Bruno Wolff III <br...@wolff.to> writes:
> That depends on your threat model. If you don't trust the wireless operator
> the wireless encryption isn't that big of a deal since you need to use an
> encrypted tunnel in any case.

No kidding.  You should use some form of end-to-end encryption any time
you are on the net and don't want your packets looked over.  SSH, HTTPS,
SMTP w. TLS have their uses.

BTW. Even WPA2-PSK seems to have some weaknesses with respect to
inter-customer eavesdropping.  There is some claim that the per-host
keys aren't as securely chosen as they should be.

-wolfgang
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

Reply via email to