MITM attacks in public Wi-Fi networks without rogue access points
Guest Post: New attack can evade security mechanisms by spoofing a legitimate access point to send a forged ICMP redirect message.
Guest Post: New attack can evade security mechanisms by spoofing a legitimate access point to send a forged ICMP redirect message.
Guest Post: Decoupling the control loop from full path congestion control helps to bypass bottleneck routers, reducing video buffering.
Guest Post: Around one third of Wi-Fi users in China are using 200+ Mbps fixed ‘broadband’ Internet access.
Guest Post: The ambitious goals of improving NUS’s network performance and security.
Geoff Huston discusses technical presentations from RIPE 83.
Guest Post: Combining crowdsourced and probe measurements for Wi-Fi performance evaluation.
Guest Post: Bangladesh’s Janata Wi-Fi project is solving high mobile Internet prices with tea stall vendors and custom technology.
Guest post: There is a tradeoff between achievable throughput and coverage of wireless signals — using multiple channels can deliver better results.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Feedback is sought on recent BBR patches that seek to increase throughput for WiFi and lower queuing delays.