this post was submitted on 27 Aug 2024
17 points (87.0% liked)

Cybersecurity

5626 readers
88 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

It seems i have the option but i have a vague memory of someone telling me not to bother with it unless i had a good reason

you are viewing a single comment's thread
view the rest of the comments
[–] vzq@lemmy.blahaj.zone 13 points 2 months ago (1 children)

The drawback is that evildoers can still attack the WPA2 handshakes and can force devices to downgrade, so you’re still getting effectively WPA2 level security until you actually turn off WPA2.

But if it doesn’t cost you anything, you can just turn it on and make their life just s little bit harder.

[–] Mountain_Mike_420@lemmy.ml 6 points 2 months ago (1 children)

Maybe vlan or DMZ a wpa2 network and use wpa3 with no fallback to wpa2 on the main/lan network?

[–] weker01@sh.itjust.works 1 points 2 months ago (1 children)

In my case that would mean that over 70% would be in the DMZ... It would be the main network

[–] Mountain_Mike_420@lemmy.ml 1 points 2 months ago

Yeah but as long as important data is not able to be accessed via the wpa2 network then you are all good.