Event JSON
{
"id": "0f42b9c20ed5dfce755cbba27eb6268ced6cde8470b2715c95ee62fcf8f9fef6",
"pubkey": "9d6742ff43235eb568c0bc55fa8acf7e004ca06a7c9e0c3da2b089a098b769b9",
"created_at": 1720552560,
"kind": 1,
"tags": [
[
"t",
"wifi"
],
[
"t",
"infosec"
],
[
"t",
"security"
],
[
"proxy",
"https://mastodon.social/@nixCraft/112758132575452425",
"web"
],
[
"proxy",
"https://mastodon.social/users/nixCraft/statuses/112758132575452425",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.social/users/nixCraft/statuses/112758132575452425",
"pink.momostr"
],
[
"expiration",
"1723144583"
]
],
"content": "WTF? Linksys Velop routers send Wi-Fi passwords in plaintext to US servers https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/ They found that several data packets being transmitted to an AWS server in the US. These packets included the configured SSID name and password in clear text, identification tokens for the network within a broader database, and an access token for a user session, potentially paving the way for a man-in-the-middle (MITM) attack. #security #infosec #wifi",
"sig": "4cce8c16853b7621281c4c3bbedd9da30c84adf2b7cc07facffaa4f3de2f66fce1ffb8f41ddffc7064d4251b0943263ebdbf43405a7c1117068e790f353eba1d"
}