For Security, My Wi-Fi Access Point Relies On:
Displaying poll results.36370 total votes.
Most Votes
- What's the highest dollar price will Bitcoin reach in 2024? Posted on February 28th, 2024 | 8470 votes
- Will ByteDance be forced to divest TikTok Posted on March 20th, 2024 | 6289 votes
Most Comments
- What's the highest dollar price will Bitcoin reach in 2024? Posted on March 20th, 2024 | 68 comments
- Will ByteDance be forced to divest TikTok Posted on March 20th, 2024 | 20 comments
Multiple? (Score:4, Insightful)
OpenVPN (Score:5, Insightful)
I use OpenVPN for authentication & encryption, you insensitive clod!
(because my rather old Access Point doesn't support WPA2)
Re:Multiple? (Score:5, Insightful)
Eh. Why bother? Anybody who is able to hack your WPA2 password will easily be able to change their MAC address to a valid one. They're already sniffing your network, after all. The upside is a false sense of added security, the downside is a false sense of added security and more work when setting up new wireless devices.
Re:Just hide the SSID -- problem solved (Score:2, Insightful)
This is trivial to get around.
Re:Multiple? (Score:3, Insightful)
There is no such thing as "secure" or "guaranteed to keep unwanted hackers out" when you are on the internet. The entire point of internet security can be summed up as "make it enough of a pain in the ass for unauthorized people to get in that it's not worth their time, without making it just as hard for authorized people."
When you understand that, then adding MAC filtering to WEP or WPA2 does actually add security, as long as you aren't regularly needing to add new users and devices to your network.
Re:Multiple? (Score:4, Insightful)
I'm arbitrarily responding to you instead of one of the other folks who made the same point. When someone goes to the lengths to hack a WPA2 network, MAC spoofing just isn't any kind of issue. Hacking a WPA2 network is moderately complicated, anybody who is able to do it is also able to change their MAC adress. Worse, hacking the network is also moderately time-consuming, and if someone actually cracks the password, they're not going to want to throw away that work just because they need to change the MAC address: they've already done 98% of the work, they're not doing that again just to avoid the 20 seconds required to change their MAC. Chances are, they're modifying their MAC address anyway!
The "outrun you" argument really doesn't apply, because given two WPA2 networks, you don't know in advance which of them is going to require MAC spoofing, so that's not going to affect your evaluation which of them is easier to get into. Of course it works just fine when you've got WPA2 and your neighbours all run WEP, may god have mercy on their souls.