hey guys... time to change the subject/name.. give that the initial OP thread has diverged!! On Tue, Jun 22, 2010 at 2:01 PM, Wolfgang S. Rupprecht <wolfgang.rupprecht@xxxxxxxxx> wrote: > > Bruno Wolff III <bruno@xxxxxxxx> writes: >> That depends on your threat model. If you don't trust the wireless operator >> the wireless encryption isn't that big of a deal since you need to use an >> encrypted tunnel in any case. > > No kidding. You should use some form of end-to-end encryption any time > you are on the net and don't want your packets looked over. SSH, HTTPS, > SMTP w. TLS have their uses. > > BTW. Even WPA2-PSK seems to have some weaknesses with respect to > inter-customer eavesdropping. There is some claim that the per-host > keys aren't as securely chosen as they should be. > > -wolfgang > -- > users mailing list > users@xxxxxxxxxxxxxxxxxxxxxxx > To unsubscribe or change subscription options: > https://admin.fedoraproject.org/mailman/listinfo/users > Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines > -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines