radish wrote:
> 2. Break the WPA encryption
 >[snip]
> decent password is basically impossible unless (and possibly even if)
> you're the NSA. 

This is much too strong of a statement without some qualifications.
WPA with AES-CCMP is strong, WPA with RC4 is substantially weaker, and 
is used in many (most?) places.

And the requirement for "decent password" is not often met. Weak 
passphrases can be detected and cracked with widely available and easy 
to use tools such as kismet.

To be 'decent' a password has to have a lot of entropy, which means true 
random values. Just being long is not sufficient. A passphrase of:
"A SlimDevices Transporter is a great audiophile component" is long, but 
has trivial amounts of entropy, especially among folks on this forum.

A good password looks like:
642435996fa7035bde1adaef4ec16368687a8b74
and this is actually a bad example, as it is not at all random, rather 
its the md5 checksum of a common file.

I generally do not make casual comments about NSA's code breaking 
ability. They are very good. If they want to break in, they probably will.

A chain is only as strong as its weakest link.


-- 
Pat Farrell
http://www.pfarrell.com/

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to