Healthy Paranoia Show 5: Next Stop, the Wireless Zone

Travel into another dimension  – a dimension of wireless networking. That’s right, Healthy Paranoia takes on the subject of 802.11 with the challenges facing a secure deployment. You’ll find out why you should never use WEP (aka wireless equals pwned), that SSID cloaking is a waste of time, and how Greg really feels about Microsoft XP. Joining us on this journey:

Show Notes:


Mrs. Y
Mrs. Y is a recovering Unix engineer working in network security. Also the host of Healthy Paranoia and official nerd hunter. She likes long walks in hubsites, traveling to security conferences and spending time in the Bat Cave. Sincerely believes that every problem can be solved with a "for" loop. When not blogging or podcasting, can be found using up her 15 minutes in the Twittersphere or Google+ as @MrsYisWhy.
Mrs. Y
Mrs. Y
  • chrismarget

    Clarify a couple of points for me?

    1) When you folks say “rogue AP”, does it mean:
    A – Any infrastructure mode 802.11 speaker that you don’t expect to hear, including myfi and smartphone tethers?
    B – An AP with a link to the wired LAN?
    C – Something else?

    2) For the “encrypt the guest WLAN” folks: Does this hypothetical WLAN include L2 isolation between authorized users? ’cause I can’t say I see much sense in encrypting (say) the coffee shop or hotel WLAN if we’re just going to let anyone/everyone in anyway. The attacks requiring L2 adjacency all come right back, don’t they?

  • Ian Bowers

    WEP: We Encrypt Poorly