[mythtv-users] Packet sniffing consumer electronic devices
Jay Ashworth
jra at baylink.com
Wed Dec 4 17:05:29 UTC 2013
----- Original Message -----
> From: "Jay Ashworth" <jra at baylink.com>
> > > Airgap. It is the only way to be sure :-)
> >
> > Most of these devices are equipped with wireless. So the air gap may
> > not help.
>
> We'll assume that you realize that "air gap" is a term which means "there
> is no logical connection between two networks", and that wifi isn't
> pertinent and that the proper reply I should have made here was just
>
> "I see what you did, there. :-)"
>
> Cheers,
> -- jr 'but if that was a troll, you're *really* good' a
It was neither humor, not a troll; Jedi was right and I was, embarassingly,
wrong. I wasn't paranoid enough, which is a stance that doesn't happen to
me real often -- just ask any of my friends. :-}
I hadn't considered "rogue consumer wifi-equipped devices", even though
that was *the topic sentence*. How silly of me.
That said, if you sweep your physical space for rouge APs (there are commercial
systems to do this in real time) and make sure your own APs are locked down
(WPA2+TKIP, with frequent key changes, at minimum), then you can reduce the
attack surface past what's practical to attempt to exploit for anything
except the top 5-nines targetted attacker.
Cheers,
-- jra
--
Make Election Day a federal holiday: http://wh.gov/lBm94 100k sigs by 12/14
Jay R. Ashworth Baylink jra at baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274
More information about the mythtv-users
mailing list