Difference between revisions of "Mesh/Challenges"

From Sudo Room
Jump to navigation Jump to search
(Security)
 
Line 4: Line 4:


Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications?
Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications?
It is a feature, not a bug. People should use end-to-end encryption with [https://www.eff.org/https-everywhere HTTPS Everywhere] and not relay on security of the network. [[User:Mitar|Mitar]] ([[User talk:Mitar|talk]]) 19:58, 9 August 2013 (PDT)

Revision as of 18:58, 9 August 2013

Security It's possible that malicious actors could install malicious software on mesh nodes they control such as sslstrip via Entware. This would allow them to capture sensitive information from less savvy users.


Countermeasures might include regularly re-flashing nodes, not allowing nodes with changed root passwords, whitelisting applications?

It is a feature, not a bug. People should use end-to-end encryption with HTTPS Everywhere and not relay on security of the network. Mitar (talk) 19:58, 9 August 2013 (PDT)