From: "Lewis Rosenthal" Received: from [68.132.128.100] (account lgrosenthal@2rosenthals.com HELO [127.0.0.1]) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTPSA id 6680808 for os2-wireless_users@2rosenthals.com; Thu, 30 Mar 2023 20:15:12 -0400 Date: Thu, 30 Mar 2023 20:15:12 -0400 To: OS/2 Wireless Users Subject: =?UTF-8?Q?Wireless_networks_may_leak_data_due_t?= =?UTF-8?Q?o_Wi-Fi_spec_ambiguity_=E2=80=A2_The_Register?= User-Agent: K-9 Mail for Android Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Thought this might be of interest=2E I haven't had an opportunity to fully = digest the implications, though we all pretty much know that *any* connecti= on may contain one or more unsecured segments, so only fully end-to-end enc= ryption cam be considered reasonably private=2E Anyway, the theory described here is interesting (from a protocol analyst'= s POV, at least)=2E Enjoy=2E https://www=2Etheregister=2Ecom/2023/03/30/wifi_spec_ambiguity_leak/