I'm gonna sing the doom song now: doom doom doo-doom DOOM doom doom DOOM
This tweet is unavailable
1
1
Use protocol-level encryption, like you should be doing anyway...?
1
Although I'd be substantially more worried if it included access to the WPA Enterprise credentials used.
1
what percentage of IT departments do you think consider authenticated wireless traffic to be untrusted?
1
I'm going to guess it's far under 100%.
1
Replying to @khuey_
Is it more or less than the percentage that consider traffic from random Ethernet jacks in public areas of the office to be trusted?

Oct 16, 2017 · 2:30 AM UTC

1
Replying to @davidbaron
probably more :)