Jump to content

Intel MaxFi


Chisoxfn
 Share

Recommended Posts

Was reading an article on this stuff (maybe I called it by the wrong name, but I think its called MaxFi) and man is it going to be sweet.

 

Its supposed to be released at some point this year and its basically wifi on steroids with a 30 mile radius. Once this is out, then a wireless society can't be too far behind us, well for those people that have laptops and other devices that they want to use online.

 

I have no idea how this will interact with cell phones, but it will also be good for those people in rural areas without access to broadband.

 

Personally I'm pretty pumped for this product. ITs nice being able to use my laptop anywhere on school campus, I couldn't imagine being able to just use it anywhere. Damn would that be badass :headbang

 

Just imagine being able to get online and catching the Sox game or what not on streaming video or something. Its just a matter of time before everything is streaming.

Link to comment
Share on other sites

You could always password protect the system and hope some hacker doesn't get on.

 

I'm guessing though, that eventually it will be the broadband providers that use this technology and then the subscribers will have like an access code or something built into their computer or what not.

 

But ya, security is definately an issue.

Link to comment
Share on other sites

You could always password protect the system and hope some hacker doesn't get on. 

 

I'm guessing though, that eventually it will be the broadband providers that use this technology and then the subscribers will have like an access code or something built into their computer or what not.

 

But ya, security is definately an issue.

The deal with security is that everything you do is being sent over the open. It's not very hard to setup a sniffer and read whatever is going on over the radio waves. So people can pull stuff like credit card numbers and what-not at will.

Link to comment
Share on other sites

Thought this article was quite interestin,

 

RESEARCHERS at the Queensland University of Technology have discovered an easily-exploited vulnerability which can be used to take down most 802.11 wireless networks.

 

The flaw operates at lower network layers than most previously-discovered security flaws in 802.11 networking, and affect any network operating at the 2.4GHz frequency - which is the sole frequency used by the most popular wireless protocol, 802.11b.

 

Associate Professor Mark Looi's PhD students Christian Wullems, Kevin Tham and Jason Smith discovered the flaw while investigating wireless security mechanisms.

 

Mr Wullems will present at an Institute of Electrical and Electronic Engineers (IEEE) Wireless Telecommunication Symposium in the US tomorrow and AusCERT has issued an advisory today.

 

The researchers said the vulnerability was "trivial" - or easy - to exploit. Testing was carried out in the small hours to avoid accidentally taking down other networks, and the researchers used a laptop running Linux Fedora Core 1 and a Compaq Ipaq running Familiar Linux.

 

The attack works by sending signals used at the physical and MAC address layers which are used to warn that devices are busy. As it applies to the 2.4GHz frequency, 802.11b is most vulnerable. The 802.11g standard also uses the 2.4GHz spectrum but depending on configuration, some 802.11g networks would be able to ignore such an attack.

 

"I don't think it's necessarily going to cause widescale panic," Professor Looi said of the discovery. "The hopeful effect will be it's going to cause a lot of organisations to evaluate carefully what they use wireless networks for, and put in place necessary actions to prevent problems."

 

Several well-publicised security vulnerabilities have been discovered in 802.11b concerning wireless encryption protocol or WEP, which can be relatively easily penetrated.

 

However unlike the WEP problems, the flaws discovered by the QUT researchers cannot be addressed using encryption and will not be addressed by the emerging 802.11i standard.

 

Professor Looi said despite the WEP flaws, many organisations were not cautious enough about their wireless networks. He recommended any organisation running an 802.11b or 802.11g network to carry out a radio survey to determine how far away their network can be accessed.

 

"If they discover they can be attacked from out on the street or the carpark, for example, they need to think seriously about re-planning their network," he said.

 

AusCERT senior security analyst James Gillespie said proprietary solutions would also be useless against the attack.

 

"If it's in 2.4GHz and using DSSS (direct sequence spread spectrum) in the physical layer, it doesn't matter if you're using encryption or any of the new Cisco LEAP protocols or anything like that... it's at the lowest level," Mr Gillespie said.

 

However he pointed out that the vulnerability could not be used to intercept data.

 

Despite the ease with which the vulnerability could be exploited, he said AusCERT did not expect that to see widespread network attacks using the newly-discovered method.

 

"It doesn't have rewards for most people - there are of course instances where a targeted DOS would serve the purpose of the attacker, however most attackers have been interested in taking down entire networks, not just a wireless network," he said.

 

Mr Gillespie said relevant vendors had been informed about the vulnerability under embargo to determine the effectiveness of the attack, mitigating factors and whether software or hardware upgrades would be required.

 

The discovery will lend some prestige to local research.

 

"Absolutely - any vulnerabilities that are discovered lend a certain amount of prestige to the organisation being the first to discover it, fully document it and present it," Mr Gillespie said.

 

"It also shows that Australian IT research and development is up there with the rest of the world, and we're not just a bunch of surfers in Brisbane."

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...