New WEP attack implemented successfully: what was a theory just a few days ago is now a reality. The final nails have now been hammered firmly into the coffin of the 802.11b Wireless Equivalent Privacy (WEP) encryption system. Research. The authors of the above paper exploited the weaknesses noted in the Fluhrer, Mantin, and Shamir paper, which is to be presented the middle of this month.
The trick now is to find methods of encapsulating data inside secure encrypted channels that don't require a corporate infrastructure. Although SSH and SSL solutions abound, can the average business user without a company virtual private network (VPN) retrieve mail and conduct other personal or professional work with any degree of protection?
The 802.11b container turns out to be a fishbowl.