From b00f4349fe7cd82524b5dcf9d6853f4ec98fa98f Mon Sep 17 00:00:00 2001 From: Camil Staps Date: Thu, 17 Sep 2015 20:54:06 +0200 Subject: Assignment 2 --- netsec-assignment2-S4498062/exercise1 | 1 + 1 file changed, 1 insertion(+) create mode 100644 netsec-assignment2-S4498062/exercise1 (limited to 'netsec-assignment2-S4498062/exercise1') diff --git a/netsec-assignment2-S4498062/exercise1 b/netsec-assignment2-S4498062/exercise1 new file mode 100644 index 0000000..3489e4b --- /dev/null +++ b/netsec-assignment2-S4498062/exercise1 @@ -0,0 +1 @@ +From that information I would assume some symmetric cipher is used, which would mean every client can encrypt and decrypt and thus also sniff. So, I wouldn't say WPA2-PSK is secure against clients sniffing traffic in the network, regardless of the key used. -- cgit v1.2.3