Ronny, You missed my point entirely. If I have secured my machine properly, and encrypted my communications, it doesn't matter whether I connect to a rogue access point or not because whatever communications are intercepted are of no use to the person who has intercepted them unless they have a super computer and lots of time to break my encryption.
So the responsibility is on the end user to protect themselves. Noah. On Tuesday 14 June 2005 20:30, Ronny wrote: > Security experts have reignited fears over the potential danger of > so-called 'evil twin' Wi-Fi phishing scams. > > The well-documented attack methodology centres on hackers fooling > wireless network users into logging onto rogue access points set up to > emulate legitimate wireless Lan equipment > > http://www2.vnunet.com/News/1160672 > The rest can be got from google .I know you will get it immediately and > you just used a tech term > > Hari Kurup wrote: > > Ronny, what is the "evil twin scam" all about? > > Did I miss something? > > Kurup > > > > ______________________________________________________ > > WebMail Powered by Infocom - Let's talk Internet > > http://www.infocom.co.ug -- Noah. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ "Today's Excellence is tomorrow's mediocrity" --Robb Thompson _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
