Jim Thompson on the Supposed MacBook Wi-Fi Exploit

Jim Thompson:

Ellch and Maynor didn’t present a paper titled, “we can create a covert channel by having control of the software on both sides of a communication link” because its trivial to do so. Instead they did exacty that, but colored it so people would be mystified, perplexed and think that there was some new exploit buried deep in the 802.11 protocol, when, point-in-fact, there is not.

(Via Glenn Fleishman.)

Friday, 4 August 2006