Even better, if you're worried about visiting sites while in public maybe you shouldn't be in public!!
--- On Wed, 11/3/10, [email protected] <[email protected]> wrote: > From: [email protected] <[email protected]> > Subject: Re: [Eug-lug] Gizmag: Firesheep session hijacking tool > To: "Eugene Unix and Gnu/Linux User Group" <[email protected]> > Date: Wednesday, November 3, 2010, 11:35 AM > The block? If I understand the > description correctly there > are only a few ways to avoid the exploit. > - Don't use WiFi where a hostile entity can listen. > - Block all cookies, preventing you from using the sites > which use cookies to identify you and which don't > use SSL. > - Don't visit those same sites. > - Force those sites to use SSL. Of course if they > don't > support it, this fails. > > None of these solutions reliably give you the capability > to > visit social media sites from public WiFi. What block > do > you refer to? > > Oh, wait. There is another way. You could VNC > back to > your home network and visit the social media site > indirectly > from there. This way you have encryption at the > vulnerable > part of the connection. Downsides: more complex and > slower. > -- _______________________________________________ EUGLUG mailing list [email protected] http://www.euglug.org/mailman/listinfo/euglug
