[9535] in cryptography@c2.net mail archive
Re: New encryption technology closes WLAN security loopholes
daemon@ATHENA.MIT.EDU (Dan Geer)
Sun Sep 30 16:14:35 2001
To: cryptography@wasabisystems.com
In-reply-to: Your message of "Mon, 24 Sep 2001 14:26:23 EDT."
<v03110705b7d5554df277@[165.247.220.34]>
Date: Sun, 30 Sep 2001 16:01:42 -0400
From: Dan Geer <geer@atstake.com>
Message-Id: <20010930200142.DCDC46275C@juarez.atstake.com>
> Or in other words, the first requirement for perimeter security is
> a perimeter.
Wireless networks have no interior. Merging them with a
perimeter-protected network will yield a network with
the character of the wireless net. This is at once the
the beauty of community nets and the end of network security
as a principle area of focus -- the apps are where the action
is now. Within my firm's experience, fully 70% of the fatal
application vulnerabilities seen in the field are design flaws
so there is certainly work to be done.
--dan
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com