Pat Farrell wrote:
> The problem is always social engineering, humans simply can't remember 
> strong random things. We have not evolved to do so. So we either use 
> something not random, like the phrase about Transporters in my posting 
> up thread, or we write it down on yellow sticky pads and past them to 
> the monitor.
>   

We're talking about a home network here. It's perfectly acceptable to 
create a random key with lots of entropy and put it in a file on a USB 
key from where you can easily copy & paste it when you want to add a new 
machine. WPA-AES can only be brute forced AFAIK and with a random enough 
key that's practically impossible. With WPA you use a stream cipher and 
the keys are constantly changed so that should be fairly secure, bugs in 
the implementation not withstanding.

The new controller is of interest here, because if I understand it 
correctly, during the initialization process the device transmits your 
home WPA key over an unencrypted wifi link (or encrypted with a 
fixed/guessable WEP key, I forget which). Any NSA agents in your garden 
may steal it. So be particularly vigilant for black vans just after 
ordering your Duet.

Regards,
Peter

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to