Ronny,

You missed my point entirely. If I have secured my machine properly, and 
encrypted my communications, it doesn't matter whether I connect to a rogue 
access point or not because whatever communications are intercepted are of no 
use to the person who has intercepted them unless they have a super computer 
and lots of time to break my encryption.

So the responsibility is on the end user to protect themselves.

Noah.
On Tuesday 14 June 2005 20:30, Ronny wrote:
> Security experts have reignited fears over the potential danger of
> so-called 'evil twin' Wi-Fi phishing scams.
>
> The well-documented attack methodology centres on hackers fooling
> wireless network users into logging onto rogue access points set up to
> emulate legitimate wireless Lan equipment
>
> http://www2.vnunet.com/News/1160672
>  The rest can be got from google .I know you will get it immediately and
> you just used a tech term
>
> Hari Kurup wrote:
> > Ronny, what is the "evil twin scam" all about?
> > Did I miss something?
> > Kurup
> >
> > ______________________________________________________
> > WebMail Powered by Infocom - Let's talk Internet
> > http://www.infocom.co.ug

-- 
Noah.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
"Today's Excellence is tomorrow's mediocrity"
--Robb Thompson
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to