Simon Willison’s Weblog

Subscribe

Monday, 16th October 2017

TL;DR on the KRACK WPA2 stuff - you can repeatedly resend the 3rd packet in a WPA2 handshake and it'll reset the key state, which leads to nonce reuse, which leads to trivial decryption with known plaintext. Can be easily leveraged to dump TCP SYN traffic and hijack connections.

Graham Sutherland

# 2:14 pm / wifi, security

An interactive explanation of quadtrees (via) Neat explorable explanation of quadtrees, using interactives built on top of D3.

# 2:47 pm / explorables, d3