Jabra pulls a 1994 microsoft reaction in the year 2009. "The vulnerability is purely theoretical". I thought we were over this.
Jabra claims that the cipher is so resistant that it would take a huge amount of effort. Jabra, do us all a favor and google for "downgrade attack". No need to break anything if you agree to not use encryption (or 0bit key) - see SSL v.2.o
http://uswww03.gnnetcom.com/jabra/cc_stream/white/DECT_Security.pdf
Credit: Security4all tweet
Update:RPW pointed out that thedocument is from 2007 not from 2009, oops ;)
Update: strings.py Version 0.0.11
-
This new version brings @ support for option search. strings_V0_0_11.zip
(http)MD5: 2047669C7F4AB00F75553F396C812E2DSHA256:
08DF9078B5EA41D50A3B06D2915B542...
5 hours ago
0 comments
Post a Comment