Using an active or passive scan, can I detect all devices connected to or transmitting via a Wifi network?

I know that it’s possible to do a passive scan on all channels to see if an access point sends a beacon. However, is it also possible to listen to general Wifi traffic on that channel and assemble a list of all active devices – both “clien… Continue reading Using an active or passive scan, can I detect all devices connected to or transmitting via a Wifi network?

Is it sufficient to just change the password of a container after a leak?

Let’s assume, an attacker gains access to an encrypted container with a weak password. They start a brute-force attack and I assume they will succeed. To protect any content which has been added to the container after the leak, I decide to… Continue reading Is it sufficient to just change the password of a container after a leak?

Is it still not advisable to use recent versions of EncFS >1.7 to encrypt Dropbox?

I’d like to use EncFS to encrypt files synced with Dropbox. Unfortunately, its Wikipedia page https://en.wikipedia.org/wiki/EncFS mentions security concerns from an audit of version 1.7:

EncFS is not safe if the adversary… Continue reading Is it still not advisable to use recent versions of EncFS >1.7 to encrypt Dropbox?