New encryption technology closes WLAN security loopholes

Dan Geer geer at atstake.com
Sun Sep 30 16:01:42 EDT 2001


 >  Or in other words, the first requirement for perimeter security is
 >  a perimeter.
 
Wireless networks have no interior.  Merging them with a
perimeter-protected network will yield a network with
the character of the wireless net.  This is at once the
the beauty of community nets and the end of network security
as a principle area of focus -- the apps are where the action
is now.  Within my firm's experience, fully 70% of the fatal
application vulnerabilities seen in the field are design flaws
so there is certainly work to be done.

--dan




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list