As an aside form talking about the
Electron Gnomes on the latest Embedded
FM
podcast Elecia and Christopher implored us to talk to people about their
awesome podcast to everyone we know.
Okay it isn't, that attack is awesome, but it is a social one rather than a
break of WPA. I bet it would work in a load of environments, I would be
surprised if pentesters didn't already have it in their toolkits.
Really the OS should be doing much more to protect users from this class of
attacks. WPA written today would not be vulnerable to this class of attack at
all.
There are reports
of Malware in the PS Vita Piracy scene. When you have to
pursue shady enterprises to use the hardware you own this is always the risk
you take. Consoles have the coolest security hardware, but it is aimed at
stopping piracy rather than protecting users.
The Grey area jailbreak tools live in make it really hard for users to find
the real tools. Instead the end up with malware.
Here
is 50 minutes on why this was going to happen.
I managed my first SO-50 pass yesterday. Using a tape measure 70cm yagi I made
last year and my baofeng I was able to hear chatter on the repeater for about
30 seconds.
As mediocre as it is I am really happy with success on my first try, I did
attempt to listen to another pass of SO-50, but only heard a two second chirp.
I used
gpredict
on my stream 7 for satellite tracking, and a cheap compass app
on android to verify which way the building pointed.
Next I am going to try using an sdr for the downlink capture. I am hoping it
will be a little easier to get the yagi pointed the correct way and give me a
chance of finding the signal mid pass.