<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=7839&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / New Wifi Vulnerability]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=7839</link>
		<description><![CDATA[The most recent posts in New Wifi Vulnerability.]]></description>
		<lastBuildDate>Sun, 08 Mar 2026 00:21:35 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62601#p62601</link>
			<description><![CDATA[<p>Yeah, I do the same. At least for desktops. I have a separate Wifi server for laptops only, and only turn it on to update them so they are ready to go into the field. <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /> The rest of the time, it stays off and this is a Wifi free house.</p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Sun, 08 Mar 2026 00:21:35 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62601#p62601</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62517#p62517</link>
			<description><![CDATA[<div class="quotebox"><cite>chris2be8 wrote:</cite><blockquote><div><p>My home network is entirely wired, with wifi disabled on my router.</p></div></blockquote></div><p>Same here, my router is actually a small custom built PC that doesn&#039;t even have wifi.</p><p>A router provided by the ISP (or even a self-bought off-the-shelf router) is another gaping security hole that I would never allow in my home.</p>]]></description>
			<author><![CDATA[dummy@example.com (tux_99)]]></author>
			<pubDate>Fri, 27 Feb 2026 20:53:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62517#p62517</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62516#p62516</link>
			<description><![CDATA[<p>My home network is entirely wired, with wifi disabled on my router. This provides another justification for taking the time to set it up like that.</p>]]></description>
			<author><![CDATA[dummy@example.com (chris2be8)]]></author>
			<pubDate>Fri, 27 Feb 2026 17:28:36 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62516#p62516</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62513#p62513</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>Ed. Ahh, I see I have reached the perfect post count. big_smile</p></div></blockquote></div><p>I think I have a better understanding of the phrase, &quot;The devil is in the details.&quot; <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /></p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Fri, 27 Feb 2026 15:14:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62513#p62513</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62511#p62511</link>
			<description><![CDATA[<p>DNS spoofing is a very old attack, as are most of the others mentioned. There are undoubtedly more which were not, and calling a fix for one a &quot;defence&quot; is like plugging one hole in a colander and calling it &quot;sealed&quot;.<br />What&#039;s new here is breaking client-isolation so those old attacks all work again. It&#039;s basically ARP spoofing, and that was a gold-mine in terms of what you could do once you had control of the stream. DNS fuckery is <em>a</em> problem, but it&#039;s really just the tip of the iceberg.</p><p>If you use &quot;coffee shop&quot; style public wifi (which I personally think is a terrible idea), use a VPN or tunnel (preferrably with a pinned host cert).<br />If you administer the same, use separate access points and segregate them from your main network.</p><p>Ed. Ahh, I see I have reached the perfect post count. <img src="https://dev1galaxy.org/img/smilies/big_smile.png" width="15" height="15" alt="big_smile" /></p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Fri, 27 Feb 2026 13:23:07 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62511#p62511</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62510#p62510</link>
			<description><![CDATA[<p>DNS spoofing is one use of the new attack(s). There are several and some applications are discussed in the article.</p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Fri, 27 Feb 2026 13:10:51 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62510#p62510</guid>
		</item>
		<item>
			<title><![CDATA[Re: New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62503#p62503</link>
			<description><![CDATA[<p>Or just use separate AP(s) for your untrusted/guest network, and put them on an isolated VLAN... Like sensible people have been doing for about as long as wifi has been a thing - because wifi has been subject to a variety of security issues since day one, and untrusted devices or networks cannot, by definition, be trusted.</p><div class="quotebox"><blockquote><div><p>I&#039;m now wondering if Stubby actually works in Devuan 6 yet? Or is it still in &#039;development&#039;? That&#039;s one possible useful defense.</p></div></blockquote></div><p>Assuming you are talking about <a href="https://dnsprivacy.org/dns_privacy_daemon_-_stubby/" rel="nofollow">this</a> stubby, now I&#039;m wondering if you even understand the article you linked... What does a DNS stub-resolver have to do with anything, and how is it supposed to be a &quot;defence&quot; against a layer-2 port-spoofing attack?</p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Fri, 27 Feb 2026 05:17:34 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62503#p62503</guid>
		</item>
		<item>
			<title><![CDATA[New Wifi Vulnerability]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=62500#p62500</link>
			<description><![CDATA[<p>Incoming security issue. A whole new set of attacks has been discovered that can affect nearly any public Wifi network. <br /><a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/" rel="nofollow">AirSnitch Breaks Wiki Encryption in Homes and Offices</a></p><p>I rarely use Wifi at all. But I&#039;m now wondering if Stubby actually works in Devuan 6 yet? Or is it still in &#039;development&#039;? That&#039;s one possible useful defense. Or a full VPN. Which I guess I ought to learn to configure. <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /></p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Fri, 27 Feb 2026 00:20:50 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=62500#p62500</guid>
		</item>
	</channel>
</rss>
