<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping &#124; Ars Technica</title>
	<atom:link href="http://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 12 Apr 2026 15:02:15 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1570277</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 12 Nov 2017 16:57:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1570277</guid>
		<description><![CDATA[Ron Amadeo / Ars Technica:
Pixel and Nexus devices won&#039;t get KRACK patch until December, which shouldn&#039;t matter much since Android doesn&#039;t rely on WPA2 for security

Pixel won’t get KRACK fix until December, but is that really a big deal?
Android never relied on WPA2 for security, so breaking it shouldn&#039;t matter much.
https://arstechnica.com/gadgets/2017/11/pixel-wont-get-krack-fix-until-december-but-is-that-really-a-big-deal/

In October, security researchers discovered a major vulnerability in a Wi-Fi&#039;s WPA2 security called &quot;KRACK.&quot; This &quot;Key Reinstallation Attack&quot; can disrupt the initial encryption handshake that happens when an access point and a device first connect, allowing an attacker to read information assumed to be securely encrypted. It&#039;s possible to totally defeat WPA2 encryption using KRACK, allowing a third party to sniff all the Wi-Fi packets you&#039;re sending out. Any device that uses Wi-Fi and WPA2 is most likely vulnerable to the bug, which at this point is basically every wireless gadget on Earth.

Google and the rest of the OEMs are working to clean up Android&#039;s KRACK epidemic, and, on Monday, Google addressed the bug in the November Android Security Bulletin. A patch was posted this week to the Android Open Source Project (AOSP) repository, and, at the same time, Google started rolling out a November security update to Google Pixel and Nexus devices. But if you read the bulletin closely, you&#039;ll see the November security patch for Google devices does not contain the KRACK fix.

How whack is KRACK on Android, really?

The KRACK vulnerability affects nearly all Wi-Fi devices, but the researchers put a big target on Android specifically when they said the attack was &quot;exceptionally devastating against Linux and Android 6.0 or higher.&quot; The reasoning the post laid out was that because Android could be tricked via KRACK into installing an all-zero encryption key, the researchers claimed it was &quot;trivial to intercept and manipulate traffic sent by these Linux and Android devices.&quot;

KRACK can essentially completely break WPA2 security, but the thing is, while Android does use WPA2 for encryption where available, Android doesn&#039;t rely on WPA2 for security. Android is used to running on a variety of networks. It has to deal with hundreds of carrier configurations around the world, that random coffee shop hot spot that you share with a bunch of strangers, and sometime just connecting to an unencrypted, open Wi-Fi connection. Android already assumes the network is hostile, so even if you break WPA2 security, you&#039;re only treated to a stream of individually encrypted connections. All the Google apps come with their own encryption, and Google&#039;s development documents tell developers to &quot;Send all network traffic from your app over SSL.&quot; Connecting to websites with HTTPS (like Ars Technica!) will still be secure, and all of Android&#039;s back-end Play Services stuff, like the 24/7 connection to Google, is also encrypted.

KRACK is a big deal for some devices, but it&#039;s mainly those that use WPA2 as their primary form of security. A lot of times this is IoT stuff like video cameras or &quot;dumber&quot; devices like a printer.]]></description>
		<content:encoded><![CDATA[<p>Ron Amadeo / Ars Technica:<br />
Pixel and Nexus devices won&#8217;t get KRACK patch until December, which shouldn&#8217;t matter much since Android doesn&#8217;t rely on WPA2 for security</p>
<p>Pixel won’t get KRACK fix until December, but is that really a big deal?<br />
Android never relied on WPA2 for security, so breaking it shouldn&#8217;t matter much.<br />
<a href="https://arstechnica.com/gadgets/2017/11/pixel-wont-get-krack-fix-until-december-but-is-that-really-a-big-deal/" rel="nofollow">https://arstechnica.com/gadgets/2017/11/pixel-wont-get-krack-fix-until-december-but-is-that-really-a-big-deal/</a></p>
<p>In October, security researchers discovered a major vulnerability in a Wi-Fi&#8217;s WPA2 security called &#8220;KRACK.&#8221; This &#8220;Key Reinstallation Attack&#8221; can disrupt the initial encryption handshake that happens when an access point and a device first connect, allowing an attacker to read information assumed to be securely encrypted. It&#8217;s possible to totally defeat WPA2 encryption using KRACK, allowing a third party to sniff all the Wi-Fi packets you&#8217;re sending out. Any device that uses Wi-Fi and WPA2 is most likely vulnerable to the bug, which at this point is basically every wireless gadget on Earth.</p>
<p>Google and the rest of the OEMs are working to clean up Android&#8217;s KRACK epidemic, and, on Monday, Google addressed the bug in the November Android Security Bulletin. A patch was posted this week to the Android Open Source Project (AOSP) repository, and, at the same time, Google started rolling out a November security update to Google Pixel and Nexus devices. But if you read the bulletin closely, you&#8217;ll see the November security patch for Google devices does not contain the KRACK fix.</p>
<p>How whack is KRACK on Android, really?</p>
<p>The KRACK vulnerability affects nearly all Wi-Fi devices, but the researchers put a big target on Android specifically when they said the attack was &#8220;exceptionally devastating against Linux and Android 6.0 or higher.&#8221; The reasoning the post laid out was that because Android could be tricked via KRACK into installing an all-zero encryption key, the researchers claimed it was &#8220;trivial to intercept and manipulate traffic sent by these Linux and Android devices.&#8221;</p>
<p>KRACK can essentially completely break WPA2 security, but the thing is, while Android does use WPA2 for encryption where available, Android doesn&#8217;t rely on WPA2 for security. Android is used to running on a variety of networks. It has to deal with hundreds of carrier configurations around the world, that random coffee shop hot spot that you share with a bunch of strangers, and sometime just connecting to an unencrypted, open Wi-Fi connection. Android already assumes the network is hostile, so even if you break WPA2 security, you&#8217;re only treated to a stream of individually encrypted connections. All the Google apps come with their own encryption, and Google&#8217;s development documents tell developers to &#8220;Send all network traffic from your app over SSL.&#8221; Connecting to websites with HTTPS (like Ars Technica!) will still be secure, and all of Android&#8217;s back-end Play Services stuff, like the 24/7 connection to Google, is also encrypted.</p>
<p>KRACK is a big deal for some devices, but it&#8217;s mainly those that use WPA2 as their primary form of security. A lot of times this is IoT stuff like video cameras or &#8220;dumber&#8221; devices like a printer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1569656</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 18:50:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1569656</guid>
		<description><![CDATA[Dieter Bohn / The Verge: 	
Google patches Wi-Fi KRACK flaw in Android, adds new saturated color display option in Pixel 2 and Pixel 2 XL, releases fix for Pixel 2 “clicking” noise 

https://www.theverge.com/2017/11/6/16616132/google-screen-color-clicking-saturation-update

The regular, monthly patches for the Pixel are one of the main reasons to buy a Google phone instead of another Android device. This month, however, the company has done more than add the usual security fixes. For the Pixel 2 and Pixel 2 XL, it has also layered on a bunch of bug fixes and new features. The most important of which, as Android Central reports, are new options for color saturation.]]></description>
		<content:encoded><![CDATA[<p>Dieter Bohn / The Verge:<br />
Google patches Wi-Fi KRACK flaw in Android, adds new saturated color display option in Pixel 2 and Pixel 2 XL, releases fix for Pixel 2 “clicking” noise </p>
<p><a href="https://www.theverge.com/2017/11/6/16616132/google-screen-color-clicking-saturation-update" rel="nofollow">https://www.theverge.com/2017/11/6/16616132/google-screen-color-clicking-saturation-update</a></p>
<p>The regular, monthly patches for the Pixel are one of the main reasons to buy a Google phone instead of another Android device. This month, however, the company has done more than add the usual security fixes. For the Pixel 2 and Pixel 2 XL, it has also layered on a bunch of bug fixes and new features. The most important of which, as Android Central reports, are new options for color saturation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1568468</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 29 Oct 2017 04:56:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1568468</guid>
		<description><![CDATA[WPA2 security flaw puts millions of devices at risk - Here&#039;s how to stay safe
https://blog.detectify.com/2017/10/16/wpa2-security-flaw-stay-safe/]]></description>
		<content:encoded><![CDATA[<p>WPA2 security flaw puts millions of devices at risk &#8211; Here&#8217;s how to stay safe<br />
<a href="https://blog.detectify.com/2017/10/16/wpa2-security-flaw-stay-safe/" rel="nofollow">https://blog.detectify.com/2017/10/16/wpa2-security-flaw-stay-safe/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567857</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Oct 2017 16:03:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567857</guid>
		<description><![CDATA[http://etn.fi/index.php?option=com_content&amp;view=article&amp;id=7010&amp;via=n&amp;datum=2017-10-17_15:28:25&amp;mottagare=31202]]></description>
		<content:encoded><![CDATA[<p><a href="http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=7010&#038;via=n&#038;datum=2017-10-17_15:28:25&#038;mottagare=31202" rel="nofollow">http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=7010&#038;via=n&#038;datum=2017-10-17_15:28:25&#038;mottagare=31202</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567424</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Oct 2017 06:52:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567424</guid>
		<description><![CDATA[KrackAttacks: What you need to know
https://safeandsavvy.f-secure.com/2017/10/16/krackattacks-wifi/]]></description>
		<content:encoded><![CDATA[<p>KrackAttacks: What you need to know<br />
<a href="https://safeandsavvy.f-secure.com/2017/10/16/krackattacks-wifi/" rel="nofollow">https://safeandsavvy.f-secure.com/2017/10/16/krackattacks-wifi/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567127</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 05:42:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567127</guid>
		<description><![CDATA[https://www.uusiteknologia.fi/2017/10/17/tietoturvatutkijat-loysivat-langattomista-suojausongelman/?utm_source=dlvr.it&amp;utm_medium=facebook]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.uusiteknologia.fi/2017/10/17/tietoturvatutkijat-loysivat-langattomista-suojausongelman/?utm_source=dlvr.it&#038;utm_medium=facebook" rel="nofollow">https://www.uusiteknologia.fi/2017/10/17/tietoturvatutkijat-loysivat-langattomista-suojausongelman/?utm_source=dlvr.it&#038;utm_medium=facebook</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567120</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 02:29:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567120</guid>
		<description><![CDATA[WHY THE KRACK WI-FI MESS WILL TAKE DECADES TO CLEAN UP
https://www.wired.com/story/krack-wi-fi-iot-security-broken/]]></description>
		<content:encoded><![CDATA[<p>WHY THE KRACK WI-FI MESS WILL TAKE DECADES TO CLEAN UP<br />
<a href="https://www.wired.com/story/krack-wi-fi-iot-security-broken/" rel="nofollow">https://www.wired.com/story/krack-wi-fi-iot-security-broken/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567119</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 02:27:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567119</guid>
		<description><![CDATA[&quot;There are quite a few other IEEE standards that shared the same fate as WPA2, from vehicular communications to healthcare IT, which are only available in a timely fashion for significant sums,&quot; says Emin Gun Sirer, a distributed systems and cryptography researcher at Cornell University. &quot;There&#039;s an academic program, but it only makes standards available to academics six months after they have been published, which is far after they have been implemented and buried deep within devices.&quot;

https://www.wired.com/story/krack-wi-fi-meltdown-open-standards]]></description>
		<content:encoded><![CDATA[<p>&#8220;There are quite a few other IEEE standards that shared the same fate as WPA2, from vehicular communications to healthcare IT, which are only available in a timely fashion for significant sums,&#8221; says Emin Gun Sirer, a distributed systems and cryptography researcher at Cornell University. &#8220;There&#8217;s an academic program, but it only makes standards available to academics six months after they have been published, which is far after they have been implemented and buried deep within devices.&#8221;</p>
<p><a href="https://www.wired.com/story/krack-wi-fi-meltdown-open-standards" rel="nofollow">https://www.wired.com/story/krack-wi-fi-meltdown-open-standards</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 02:25:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567118</guid>
		<description><![CDATA[THE FLAWED SYSTEM BEHIND THE KRACK WI-FI MELTDOWN
https://www.wired.com/story/krack-wi-fi-meltdown-open-standards

ON MONDAY, THE security community scrambled to unpack Krack, a fundamental vulnerability in the ubiquitous, secure Wi-Fi network standard known a WPA2. Though some of the most popular devices are mercifully already protected (like most of those that run Windows and iOS), a staggering population remains exposed to data theft and manipulation every time they connect to WPA2 Wi-Fi. But as another interminable patching process begins, a different conversation is picking up, too, about how to catch flaws in crucial standards more quickly, and make it easier to patch them.
No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on.]]></description>
		<content:encoded><![CDATA[<p>THE FLAWED SYSTEM BEHIND THE KRACK WI-FI MELTDOWN<br />
<a href="https://www.wired.com/story/krack-wi-fi-meltdown-open-standards" rel="nofollow">https://www.wired.com/story/krack-wi-fi-meltdown-open-standards</a></p>
<p>ON MONDAY, THE security community scrambled to unpack Krack, a fundamental vulnerability in the ubiquitous, secure Wi-Fi network standard known a WPA2. Though some of the most popular devices are mercifully already protected (like most of those that run Windows and iOS), a staggering population remains exposed to data theft and manipulation every time they connect to WPA2 Wi-Fi. But as another interminable patching process begins, a different conversation is picking up, too, about how to catch flaws in crucial standards more quickly, and make it easier to patch them.<br />
No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/10/16/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping-ars-technica/comment-page-1/#comment-1567116</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 02:23:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=60294#comment-1567116</guid>
		<description><![CDATA[WPA2 was kracked because it was based on a closed standard that you needed to pay to read
https://boingboing.net/2017/10/17/sdo-eschaton.html?utm_content=buffer259fa&amp;utm_medium=social&amp;utm_source=facebook.com&amp;utm_campaign=buffer

How did a bug like krack fester in WPA2, the 13-year-old wifi standard whose flaws have rendered hundreds of millions of devices insecure, some of them permanently so?

Thank the IEEE&#039;s business model. The IEEE is the standards body that developed WPA2, and they fund their operations by charging hundreds of dollars to review the WPA2 standard, and hundreds more for each of the standards it builds upon, so that would-be auditors of the protocol have to shell out thousands just to start looking.

It&#039;s an issue that Carl Mamamud, Public Resource and the Electronic Frontier Foundation have been fighting hard on for years, ensuring that the standards that undergird public safety and vital infrastructure are available for anyone to review, audit and criticize.

Any impediment to independent scrutiny of standards is a form of high-interest, high-risk technology debt and the bill always comes due.]]></description>
		<content:encoded><![CDATA[<p>WPA2 was kracked because it was based on a closed standard that you needed to pay to read<br />
<a href="https://boingboing.net/2017/10/17/sdo-eschaton.html?utm_content=buffer259fa&#038;utm_medium=social&#038;utm_source=facebook.com&#038;utm_campaign=buffer" rel="nofollow">https://boingboing.net/2017/10/17/sdo-eschaton.html?utm_content=buffer259fa&#038;utm_medium=social&#038;utm_source=facebook.com&#038;utm_campaign=buffer</a></p>
<p>How did a bug like krack fester in WPA2, the 13-year-old wifi standard whose flaws have rendered hundreds of millions of devices insecure, some of them permanently so?</p>
<p>Thank the IEEE&#8217;s business model. The IEEE is the standards body that developed WPA2, and they fund their operations by charging hundreds of dollars to review the WPA2 standard, and hundreds more for each of the standards it builds upon, so that would-be auditors of the protocol have to shell out thousands just to start looking.</p>
<p>It&#8217;s an issue that Carl Mamamud, Public Resource and the Electronic Frontier Foundation have been fighting hard on for years, ensuring that the standards that undergird public safety and vital infrastructure are available for anyone to review, audit and criticize.</p>
<p>Any impediment to independent scrutiny of standards is a form of high-interest, high-risk technology debt and the bill always comes due.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
