Pat Farrell wrote: > The problem is always social engineering, humans simply can't remember > strong random things. We have not evolved to do so. So we either use > something not random, like the phrase about Transporters in my posting > up thread, or we write it down on yellow sticky pads and past them to > the monitor. >
We're talking about a home network here. It's perfectly acceptable to create a random key with lots of entropy and put it in a file on a USB key from where you can easily copy & paste it when you want to add a new machine. WPA-AES can only be brute forced AFAIK and with a random enough key that's practically impossible. With WPA you use a stream cipher and the keys are constantly changed so that should be fairly secure, bugs in the implementation not withstanding. The new controller is of interest here, because if I understand it correctly, during the initialization process the device transmits your home WPA key over an unencrypted wifi link (or encrypted with a fixed/guessable WEP key, I forget which). Any NSA agents in your garden may steal it. So be particularly vigilant for black vans just after ordering your Duet. Regards, Peter _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
