nanog mailing list archives
Re: Comcast storing WiFi passwords in cleartext?
From: Töma Gavrichenkov <ximaera () gmail com>
Date: Thu, 25 Apr 2019 10:22:46 +0300
On Thu, Apr 25, 2019, 3:06 AM William Herrin <bill () herrin us> wrote:
Risk is threat times vulnerability times impact. No impact, no risk. For example, if the credentials for my grocery store loyalty card are compromised, I do not actually care. It has no impact.
A fun fact: my employer has a product which basically does brute force protection for web forms. One of, if not the, biggest customers for that product is a grocery store chain, and exactly with their loyalty card portal. Sometimes, the impact or the absence thereof is a matter of perception. -- Töma
Current thread:
- Re: Comcast storing WiFi passwords in cleartext?, (continued)
- Re: Comcast storing WiFi passwords in cleartext? K. Scott Helms (Apr 25)
- Re: Comcast storing WiFi passwords in cleartext? Mark Foster (Apr 24)
- Re: Comcast storing WiFi passwords in cleartext? William Herrin (Apr 24)
- Re: Comcast storing WiFi passwords in cleartext? Valdis Klētnieks (Apr 24)
- Re: Comcast storing WiFi passwords in cleartext? Mike Bolitho (Apr 24)
- Re: Comcast storing WiFi passwords in cleartext? Royce Williams (Apr 24)
- Re: Comcast storing WiFi passwords in cleartext? Stephen Satchell (Apr 25)
- Re: Comcast storing WiFi passwords in cleartext? Töma Gavrichenkov (Apr 26)
- Re: Comcast storing WiFi passwords in cleartext? Rich Kulawiec (Apr 26)
- Re: Comcast storing WiFi passwords in cleartext? Töma Gavrichenkov (Apr 26)
- Re: Comcast storing WiFi passwords in cleartext? Töma Gavrichenkov (Apr 25)