I guess if I really wanted to prove it i could log with kismet, but I reckon I already have proved it... (given the outside chance that the default is not logged, if so then basically they should just actually log it at the verbose level which it is not)
"assume nothing" seems certainly the post-torvalds-conversion-to-pc state of affairs. If "assume-nothing" was ever a false state in the first place.
indeed, perhaps... "assume the worst" seems the correct posture post the covid scamdemic eh!
maybe it is a good method to always specify all parameters having scanned a hostapd file with good comments in, but thing is, istm, stuff changes that even negates a well commented config file... and they do not post an up to date commented config file...
like the whole ffmpeg and avconv split eh! like no avconv examples... yet reams of still valid today ffmpeg examples eh! cryptic without examples.
I'd say I had a couple of military grade vulnerabilities... streaming audio over http, and... at least another one.... that without rekeying were extra vulnerable...
drifting off topic but... that nadal complaining of chest pains after lambasting jokovic for not taking the vaccine is.... well, whatever you make of it i guess eh!
I'm wondering, if, at some point in time, some years ago, 600 seconds was considered a reasonable rekeying time, what, now, is considered reasonable? given gpu power and prices coming back down into pleb. like me territory? and stuff like kali linux and wifi pineapple etc. and all the refinements to foreknowledge...
I'm thinking 300?
I guess what I would like building in to openwrt is an auto attack detect and deploy bunker busters... except... what if they live in the flat above LOL?