diff options
author | Camil Staps | 2015-09-17 20:54:06 +0200 |
---|---|---|
committer | Camil Staps | 2015-09-17 20:54:06 +0200 |
commit | b00f4349fe7cd82524b5dcf9d6853f4ec98fa98f (patch) | |
tree | 10a317e74ad96b06e8726aaef660d4b520b8733a /netsec-assignment2-S4498062/exercise1 | |
parent | Assignment 1 (diff) |
Assignment 2
Diffstat (limited to 'netsec-assignment2-S4498062/exercise1')
-rw-r--r-- | netsec-assignment2-S4498062/exercise1 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/netsec-assignment2-S4498062/exercise1 b/netsec-assignment2-S4498062/exercise1 new file mode 100644 index 0000000..3489e4b --- /dev/null +++ b/netsec-assignment2-S4498062/exercise1 @@ -0,0 +1 @@ +From that information I would assume some symmetric cipher is used, which would mean every client can encrypt and decrypt and thus also sniff. So, I wouldn't say WPA2-PSK is secure against clients sniffing traffic in the network, regardless of the key used. |