this post was submitted on 27 Aug 2024
17 points (87.0% liked)
Cybersecurity
5626 readers
88 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The drawback is that evildoers can still attack the WPA2 handshakes and can force devices to downgrade, so you’re still getting effectively WPA2 level security until you actually turn off WPA2.
But if it doesn’t cost you anything, you can just turn it on and make their life just s little bit harder.
Maybe vlan or DMZ a wpa2 network and use wpa3 with no fallback to wpa2 on the main/lan network?
In my case that would mean that over 70% would be in the DMZ... It would be the main network
Yeah but as long as important data is not able to be accessed via the wpa2 network then you are all good.