Peter Peerdeman
Introduction
Overview Wireless security Fon network Security scenarios Conclusion Wireless security Fon network Security scenarios Conclusion
Wireless security Open WEP WPA Hot Spot Open WEP WPA Hot Spot
Fon Network Need for wifi Community based Authentication Webinterface hack Need for wifi Community based Authentication Webinterface hack
Security scenarios Spying on users Being spied on Misbehaviour Router Worm Spying on users Being spied on Misbehaviour Router Worm
Conclusion Need for internet Users responsible Free over payed Physical access UMTS / GPRS Need for internet Users responsible Free over payed Physical access UMTS / GPRS
Thank you for your attention!
Peter Peerdeman