Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What's so surprising about this? I don't get it. It's decades old news, unencrypted network traffic can be sniffed. And the solution is almost a decade old as well: use TOR (www.torproject.org) or JAP ( http://anon.inf.tu-dresden.de/index_en.html ) to hide your traffic from your local network operator. Be it your favorite dictator, government, employer, husband/wife, girlfriend/boyfriend or mother.

Even if on a WPA encrypted network, the AP operator (or anyone between the AP and the internet provider) can steal your data. (Of course the internet provider could do this as well, they are just probably less of a problem than the next guy with firesheep or an open AP set up for logging your sessions and passwords.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: