Talk:Firesheep

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

The "Security Now" podcasts (#'s 272 and 273) discuss what using WiFi encryption (both WEP and WPA) does to prevent Firesheep from listening in to browser sessions on a public Wifi hotspot. In #272 (http://media.grc.com/sn/sn-272.mp3) the concept of using encryption to foil Firesheep is discussed. In #273 (http://media.grc.com/sn/sn-273.mp3) the difference between WEP and WPA encryption and what that means to Firesheep is discussed. — Preceding unsigned comment added by 67.133.62.41 (talk) 11:24, 8 April 2013 (UTC)[reply]

Kudos[edit]

This is one of the best written articles I have read on a technical subject in Wikipedia. It only provides as much information as is required to understand the subject and the context of the subject, and it does this very well.

Well done. H.E. Hall (talk) 15:54, 7 January 2014 (UTC)[reply]

Countermeasures[edit]

Hey there, I went ahead and removed the countermeasures subsection as well as the warning banner from the top because the past-tense info remaining was in the countermeasures section. Given that this software is defunct, keeping countermeasures on it seems not notable and somewhat original research. Johnathlon (talk) 17:49, 9 December 2020 (UTC)[reply]

It wasn't the written to the best standards, but I do think the article now lacks an aftermath part.
Firesheep caused a big push to https-everywhere: to the usage of add-ons forcing https, and to browser updates forcing https. It caused web developers to realize how important TLS encryption of all communication was. It caused regular people to learn how dangerous public hot-spots can be.
At the time, those were countermeasures for Firesheep. But these measures lived on to be standard security practices. So the aftermath of the Firesheep add-on is definitely something notable enough to be included in the article IMO. 82.143.93.187 (talk) 14:45, 12 July 2023 (UTC)[reply]