> Unfortunately, our attacks against WPA3 also work against EAP-pwd, meaning an adversary can even recover a user's password when EAP-pwd is used. We also discovered serious bugs in most products that implement EAP-pwd. These allow an adversary to impersonate any user, and thereby access the Wi-Fi network, without knowing the user's password.
> Due to the severity of some of our (implementation-specific) attacks against EAP-pwd, we will briefly delay the release of the full details of the vulnerabilities that we discovered. Please use this short time window to update your devices, we plan to provide the full details in as little as a few hours.
I don't get it. Everything is super easily spoofed/hacked. You have to design your shit from the PCB up with proprietary everything to ensure any remote possibility of security.
Thomas Gomez
welp
Leo Long
WPA2 is not easy lol
super nice. I havent paid for internet in 4 years.
Samuel Martinez
imagine pushing a cryptographic protocol for standardization without proper public peer review process
Luke Sanchez
just use randomly generated 35 character password for your WPA2 hackers on suicide watch
WPA2 doesn't fucking matter in normie space because WPS is fucking broken so you just sidestep WPA2 and pwn the router by brute forcing the pin with reaver.
Takes like five minutes and a $50 antenna that injects.
Tyler Ross
I bet your WPS is wide open for reaver pin cracking
Cooper Peterson
>not using pfSense >not configuring your own goddamn router you built from parts