Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, without the alliance stating what methods were used to look for attacks, its hard to take that seriously... it's the same line used in just about any security breach.

Is this attack likely to generate log evidence on affected APs in their default configuration, or is it so far down the stack that no evidence is generated and nobody could refute this claim?




Nope, definitely further down the stack. This is part of the protocol that deals with retransmission of lost packets. Nobody logs those.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: