/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Security researchers detail AirSnitch, a series of attacks that bypass Wi-Fi client isolation, enabling machine-in-the-middle attacks in modern Wi-Fi networks

That guest network you set up for your neighbors may not be as secure as you think.  —  It's hard to overstate the role that Wi-Fi plays in virtually every facet of life.

Ars Technica Dan Goodin

Discussion

  • @matthew_d_green Matthew Green on x
    This seems bad for WiFi encryption: https://arstechnica.com/...
  • @hdmoore HD Moore on x
    New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises: https://arstechnica.com/... AirSnitch resets WiFi security back to the bad-old-days of ARP spoofing and trivial MITM. [image]
  • @pkqzy888 Zhiyun Qian on x
    @zhouxinan presented a paper at @NDSSSymposium about our discovery of some serious wifi flaws. An excellent article about our work: https://arstechnica.com/... Paper: https://www.cs.ucr.edu/... GitHub (tool for testing your own network): https://github.com/...
  • @vanhoefm @vanhoefm on x
    We found that Wi-Fi client isolation can often be bypassed. This allows an attacker who can connect to a network, either as a malicious insider or by connecting to a co-located open network, to attack others. NDSS'26 paper: https://www.ndss-symposium.org/ ... GitHub: https://gith…
  • @joebeone Joseph Lorenzo Hall, PhD on x
    Trusting the conference/hotel Wi-Fi because client isolation is enabled? Think again. AirSnitch reveals severe flaws in wireless network implementations, bypassing protections to enable practical machine-in-the-middle attacks on other clients' traffic. https://www.ndss-symposium.…
  • @FSonder@mastodon.ie Frank Sonderborg on mastodon
    Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target's operating system.  The AirSnitch MitM also puts the attacker in the position to wage attacks against vulnerabilities that may n…
  • r/pwnhub r on reddit
    New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
  • r/firewalla r on reddit
    New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
  • r/technews r on reddit
    New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises |  That guest network you set up for your neighbors may not be as secure as you think.
  • r/science r on reddit
    New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises |  AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks