On Wed, Oct 18, 2017 at 02:28:01PM -0400, J C Nash wrote:
> You are right that the audience needs to be identified.
>
> My view is that a lightning talk could present an overview of the exploit and
> the measures that have been taken to address it.
Then we'll have to presume only knowledge of Wi-F
You are right that the audience needs to be identified.
My view is that a lightning talk could present an overview of the exploit and
the measures that have been taken to
address it. Possibly particular places that might remain vulnerable (here I'm
thinking of my 10 year old Linksys WRT54GL
-- l
On Wed, Oct 18, 2017 at 04:30:43PM +, John Nash wrote:
> Via ACM, I came across
That's an odd place to get such notices. Unfortunately, due to embargoes,
you're unlikely to get advance notice of all issues to your liking. You can try
and parse the flood of CVEs every day, or subscribe to your
On 2017-10-18 16:30, John Nash wrote:
> Via ACM, I came across
>
> https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/
>
> I'm wondering if anyone would give a lightning talk about this for the
> November meeting.
>
> A
Via ACM, I came across
https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/
I'm wondering if anyone would give a lightning talk about this for the November
meeting.
Also if anyone has done any patching because of this ye