In regards to actual security, I would be just as scared to connect to the MIFI point, as any wireless network. I believe some of the same measures would be able to provide security.
For example, using openVPN (encryption) to connect back to a VPN server for surfing. Disabling the SSID (trivial security through obfuscation), using a strong authentication algorithm to MIFI point, carry your very own faraday cage.
First is one against the pre-set WPA-TKIP PSK’s that are based on the mac address of the access point, and have limited entropy. That one is something you can completely mitigate by doing the usual smart thing of changing your SSID to something unique (for which no one is likely to have precomputed PSK hashes lying around cn their hard drive), and setting a strong, long, random pre-shared key. For bonus points, strengthening your config with WPA2-AES vs the default WPA-TKIP gives and extra cushion.
As for the admin interaface hack linked earlier, that one is going to require a firmware update, best I can tell once they come out. NoScript would be well advised of course, but even it won’t be complete protection.
I need to get more familiar with the admin interface hack before saying much more though.
Viewing 3 reply threads
You must be logged in to reply to this topic.
– EH-Net Live!Thurs Oct 29 @ 1:00 PM US ET. Details Coming Soon!