[9535] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: New encryption technology closes WLAN security loopholes

daemon@ATHENA.MIT.EDU (Dan Geer)
Sun Sep 30 16:14:35 2001

To: cryptography@wasabisystems.com
In-reply-to: Your message of "Mon, 24 Sep 2001 14:26:23 EDT."
             <v03110705b7d5554df277@[165.247.220.34]>
Date: Sun, 30 Sep 2001 16:01:42 -0400
From: Dan Geer <geer@atstake.com>
Message-Id: <20010930200142.DCDC46275C@juarez.atstake.com>


 >  Or in other words, the first requirement for perimeter security is
 >  a perimeter.
 
Wireless networks have no interior.  Merging them with a
perimeter-protected network will yield a network with
the character of the wireless net.  This is at once the
the beauty of community nets and the end of network security
as a principle area of focus -- the apps are where the action
is now.  Within my firm's experience, fully 70% of the fatal
application vulnerabilities seen in the field are design flaws
so there is certainly work to be done.

--dan




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post