aboutsummaryrefslogtreecommitdiff
path: root/netsec-assignment2-S4498062/exercise1
diff options
context:
space:
mode:
authorCamil Staps2015-09-17 20:54:06 +0200
committerCamil Staps2015-09-17 20:54:06 +0200
commitb00f4349fe7cd82524b5dcf9d6853f4ec98fa98f (patch)
tree10a317e74ad96b06e8726aaef660d4b520b8733a /netsec-assignment2-S4498062/exercise1
parentAssignment 1 (diff)
Assignment 2
Diffstat (limited to 'netsec-assignment2-S4498062/exercise1')
-rw-r--r--netsec-assignment2-S4498062/exercise11
1 files changed, 1 insertions, 0 deletions
diff --git a/netsec-assignment2-S4498062/exercise1 b/netsec-assignment2-S4498062/exercise1
new file mode 100644
index 0000000..3489e4b
--- /dev/null
+++ b/netsec-assignment2-S4498062/exercise1
@@ -0,0 +1 @@
+From that information I would assume some symmetric cipher is used, which would mean every client can encrypt and decrypt and thus also sniff. So, I wouldn't say WPA2-PSK is secure against clients sniffing traffic in the network, regardless of the key used.