radish wrote: > 2. Break the WPA encryption >[snip] > decent password is basically impossible unless (and possibly even if) > you're the NSA.
This is much too strong of a statement without some qualifications. WPA with AES-CCMP is strong, WPA with RC4 is substantially weaker, and is used in many (most?) places. And the requirement for "decent password" is not often met. Weak passphrases can be detected and cracked with widely available and easy to use tools such as kismet. To be 'decent' a password has to have a lot of entropy, which means true random values. Just being long is not sufficient. A passphrase of: "A SlimDevices Transporter is a great audiophile component" is long, but has trivial amounts of entropy, especially among folks on this forum. A good password looks like: 642435996fa7035bde1adaef4ec16368687a8b74 and this is actually a bad example, as it is not at all random, rather its the md5 checksum of a common file. I generally do not make casual comments about NSA's code breaking ability. They are very good. If they want to break in, they probably will. A chain is only as strong as its weakest link. -- Pat Farrell http://www.pfarrell.com/ _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
