Difference between revisions of "Mesh/Challenges"
Jump to navigation
Jump to search
(Security) |
|||
Line 4: | Line 4: | ||
Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications? | Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications? | ||
It is a feature, not a bug. People should use end-to-end encryption with [https://www.eff.org/https-everywhere HTTPS Everywhere] and not relay on security of the network. [[User:Mitar|Mitar]] ([[User talk:Mitar|talk]]) 19:58, 9 August 2013 (PDT) |
Revision as of 18:58, 9 August 2013
Security It's possible that malicious actors could install malicious software on mesh nodes they control such as sslstrip via Entware. This would allow them to capture sensitive information from less savvy users.
Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications?
It is a feature, not a bug. People should use end-to-end encryption with HTTPS Everywhere and not relay on security of the network. Mitar (talk) 19:58, 9 August 2013 (PDT)