![]() ![]() ![]() |
|
The open VPN android app just seems to be a client. I need something that works from my phone when I'm out and about.
Nord seems to be consistently rated highly by experts and play store users so I think I'll try it.
Mike
MikeAqua:
The open VPN android app just seems to be a client. I need something that works from my phone when I'm out and about.
Nord seems to be consistently rated highly by experts and play store users so I think I'll try it.
Yes, the app is just the client. You would need to install an open VPN server at your home/premises. This can be installed on many different kinds of devices, including some routers.
I've gone and updated my iPhone and iPad to iOS 11.1 public beta 3, which is apparently patched (I can't find any specific comment from Apple saying that this specific release is patched, but they have said that their latest betas are - so I assume this includes the public beta 3).
Spark are going to have to pull finger, how many of their Android phones are even on the October Security patch level? (Google are apparently including the patch in the November Patches)
Watched this explanation which tried it's hardest to be explainable for non-technical people.
BarTender:
Watched this explanation which tried it's hardest to be explainable for non-technical people.
Still over my head!
My brief understanding of it is that a malicious person could trigger a reset of the sequenced encryption process on a vulnerable device and because the encryption data gets repeated, some simple math could applied between the two lots of data to get the key.
Paul1977:
BarTender:
Watched this explanation which tried it's hardest to be explainable for non-technical people.
Still over my head!
I think this one may be better:
Michael Murphy | https://murfy.nz
Referral Links: Quic Broadband (use R122101E7CV7Q for free setup)
Are you happy with what you get from Geekzone? Please consider supporting us by subscribing.
Opinions are my own and not the views of my employer.
My understanding was that WPA2 was 'crackable' 2+ years ago , so not secure regardless. (?)
Give all the non patchable androids out there, and there are millions, as mid/low price Androids will NEVER get any patches & updates (I have 2 samsungs that will never get any updates)
- should companies close down internal wifi competely , or change the pass & only let patched devices connect
- Many companies have a guest wifi , should that be shut down as well, just to mitigate any liability (as vistors often are give access to guest wifi)
- is closing down company wifi a necessary reaction, necessary to mitigate any possible liability of either IT or the company itself ?
most company ph's & laptops could hardly be considered secure regardless , unless completely locked down & install of any apps blocked
Paul1977: I’m most interested in how vulnerable unpatched iOS and Windows are (particularly iOS which is not yet patched in the latest general release 11.03).
The paper shows they are the least vulnerable, but I’m finding it difficult interpreting what the specific risks are for these devices.
As I read it they are only vulnerable to the group key attacks - CVE-2017-13080 and CVE-2017-13081. As these are used for transmitting broadcast and multicast frames, the amount of sensitive information you could decrypt would be negligible.
1101:
- Many companies have a guest wifi , should that be shut down as well, just to mitigate any liability (as vistors often are give access to guest wifi)
If someone tried to assert liability on the company's part in relation to our guest WiFi, I would simply argue there is no scope for liability because: -
- Guest Wifi is free;
- Therefore, the company has received no consideration;
- Therefore, the company has no duty of care.
The solution is an Accept page which includes a waiver the user must agree to.
Mike
MikeAqua:
If someone tried to assert liability on the company's part in relation to our guest WiFi, I would simply argue there is no scope for liability because: -
- Guest Wifi is free;
- Therefore, the company has received no consideration;
- Therefore, the company has no duty of care.
The solution is an Accept page which includes a waiver the user must agree to.
As a general proposition, in respect to whether one entity owes a duty of care to another for the purpose of liability in tort for negligence, the first three matters are either not decisive or even irrelevant. The last idea will help but only if the Ts&Cs are properly drafted, which pretty much 95% of NZ companies will fail at.
Patch for Grandstream fw confirmed to be released asap.
- NET: FTTH, OPNsense, 10G backbone, GWN APs, ipPBX
- SRV: 12 RU HA server cluster, 0.1 PB storage on premise
- IoT: thread, zigbee, tasmota, BidCoS, LoRa, WX suite, IR
- 3D: two 3D printers, 3D scanner, CNC router, laser cutter
MikeAqua:
If someone tried to assert liability on the company's part in relation to our guest WiFi, I would simply argue there is no scope for liability because: -
- Guest Wifi is free;
- Therefore, the company has received no consideration;
- Therefore, the company has no duty of care.
The solution is an Accept page which includes a waiver the user must agree to.
It's also not uncommon for guest wifi to not even use WPA2 and just be unencrypted (with a guest portal login and a disclaimer), potentially more commonplace in cafes, hotels, etc than at businesses. This type wifi network is unaffected by KRACK as they were never secure in the first place.
But assuming your guest wifi is using WPA2 and APs are patched or not affected then it is the vulnerability in THEIR phone that is being exploited, not your network. IANAL, but I don't see how you could be held liable for that.
|
![]() ![]() ![]() |