Re: Large scale concert production TCP/IP networking
WPA2 is still quiet susceptible to a brute force attack, so "unbreakable" is erroneous in this case. True, a well-constructed key could take a ridiculously long time to crack, but it can be done. Also, it is not necessary to have more than one device on a WLAN 'logging in and out' to launch an attack. If I wanted to drive you nuts, a simple de-auth flood from my smart phone would drive you spare and the odds of you detecting me are close to nil.
Regardless of encryption or other technologies, it is still true that the 2.4GHz and 5.2GHz bands can be rendered unsuitable for the passing of 802.11 wireless traffic with very little effort and skill. As an IT security professional and a minor-league sound guy, I would never rely on 802.11a/b/g/n wireless as my sole path for mission critical data communication.
That is my $0.02.
Hacking of the actual login passkey can only occur if there are multiple devices logging into and out of the router during the time that the hacker has access to listen to the incoming and outgoing data packets and use packet injection. For now,WPA2 passkeys are unbreakable if used correctly.
WPA2 is still quiet susceptible to a brute force attack, so "unbreakable" is erroneous in this case. True, a well-constructed key could take a ridiculously long time to crack, but it can be done. Also, it is not necessary to have more than one device on a WLAN 'logging in and out' to launch an attack. If I wanted to drive you nuts, a simple de-auth flood from my smart phone would drive you spare and the odds of you detecting me are close to nil.
Regardless of encryption or other technologies, it is still true that the 2.4GHz and 5.2GHz bands can be rendered unsuitable for the passing of 802.11 wireless traffic with very little effort and skill. As an IT security professional and a minor-league sound guy, I would never rely on 802.11a/b/g/n wireless as my sole path for mission critical data communication.
That is my $0.02.