New encryption technology closes WLAN security loopholes
Dan Geer
geer at atstake.com
Sun Sep 30 16:01:42 EDT 2001
> Or in other words, the first requirement for perimeter security is
> a perimeter.
Wireless networks have no interior. Merging them with a
perimeter-protected network will yield a network with
the character of the wireless net. This is at once the
the beauty of community nets and the end of network security
as a principle area of focus -- the apps are where the action
is now. Within my firm's experience, fully 70% of the fatal
application vulnerabilities seen in the field are design flaws
so there is certainly work to be done.
--dan
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list