Комментарии:
Just eat the damn orange!
ОтветитьFarktard approves of your work!
ОтветитьGreat video as always!
ОтветитьWhy I am watching this ? I have a lot of things to do and I don't even care .
ОтветитьGood stuff!
ОтветитьIt's nice to see you showing an actual implementation of the method used for deriving a PSK. It helps to build the understanding of the topic. Thank you.
ОтветитьOnce again thanks for sharing this insight.
ОтветитьOh this reminds me of Radio wing Army.
ОтветитьIm assuming you can't just auth on a normal wireless connect with the 256bit key as it would then try to run the function on that?
Ответитьnice
ОтветитьExceptional explanation and demo. Well done and appreciated.
ОтветитьYou're good man. !!! To the point and no nonsense. Thx
Ответитьgood explanation.
ОтветитьWhat is more secure WPA2 psk or
WPA/WPA2 psk?
(Both with AES)
I don't know if wpa/wpa2 means that it is encrypted 2 times by wpa and wpa2 or it means that it works with wpa for devices that don't support wpa2 (which would be like having wpa, thats bad)
Good video thank you
ОтветитьVery clear, thank you!
ОтветитьI gave this question to Chat-GPT but failed me to answer well then your video pop-up and it was creative way to explain it. Thank you so much <3
Ответить