[quote name='GrilledWitOnions']Wifi on DS has to be WEP security as best, right? It doesn't support WPA2? I remember wanting to do wifi but it was too much of a hassle to temporarily change to a different security setting, and I didn't want to go with a permanent, weaker setting... which I don't think is all that weak anyway. My understanding is that WEP can be broken but it's not as easy as simply jumping on an unsecured connection, you have to work at it. Anyone want to fill me in on if WEP is substantially less secure than WPA2?[/quote]
first off if someone wants in your networks they can. WPA2-PSK isn't "cracked" but with a common SSID and coWPAtty & those lovely rainbow tables its been broken.
Now the question - If you really dont want someone on your network WEP works fine. 95% of the people wont get in. The neighbor across the street wont connect their laptop to your network. Thats good enough for me.
That being said..someone one will get in if they want to. Now WEP has been cracked, the huge problem is these "interesting packets" or IV's. If someone wanted to they can capture these IV's and eventually get your wireless key. Thats cutting out all the boring details. It can be done in under 5 minutes with them slamming your AP(access point) for these IV requests. WEP has a very small key size(40bit later 128bit), those IVs I mentioned are just too small. WEP's IV size is only 24bits, & is finally uses RC4. IEEE decided that WEP was weak and decided to make WPA which took care of these problems which means we have AES which is very strong. Just a matter of time
first off if someone wants in your networks they can. WPA2-PSK isn't "cracked" but with a common SSID and coWPAtty & those lovely rainbow tables its been broken.
Now the question - If you really dont want someone on your network WEP works fine. 95% of the people wont get in. The neighbor across the street wont connect their laptop to your network. Thats good enough for me.
That being said..someone one will get in if they want to. Now WEP has been cracked, the huge problem is these "interesting packets" or IV's. If someone wanted to they can capture these IV's and eventually get your wireless key. Thats cutting out all the boring details. It can be done in under 5 minutes with them slamming your AP(access point) for these IV requests. WEP has a very small key size(40bit later 128bit), those IVs I mentioned are just too small. WEP's IV size is only 24bits, & is finally uses RC4. IEEE decided that WEP was weak and decided to make WPA which took care of these problems which means we have AES which is very strong. Just a matter of time