<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>wifi security on Referently.com</title>
    <link>https://referently.com/tags/wifi-security/</link>
    <description>Recent content in wifi security on Referently.com</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 18 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://referently.com/tags/wifi-security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How Enterprise WiFi Authentication Actually Works: 802.1X and RADIUS Explained</title>
      <link>https://referently.com/how-enterprise-wifi-authentication-actually-works-802.1x-and-radius-explained/</link>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/how-enterprise-wifi-authentication-actually-works-802.1x-and-radius-explained/</guid>
      <description>Every corporate WiFi network that prompts for a username and password rather than a passphrase is running 802.1X authentication backed by a RADIUS server. The mechanism is invisible to end users but structurally different from home WiFi in ways that matter enormously for security. Understanding how it works explains why enterprise networks handle compromised credentials, device theft, and regulatory compliance requirements in ways that passphrase-based networks cannot.
The Limitation of PSK Authentication Home and small office WiFi uses a pre-shared key: one passphrase, shared among all users and all devices.</description>
    </item>
    
    <item>
      <title>The KRACK Attack: What It Was, What It Taught Us, and Where WPA2 Stands Today</title>
      <link>https://referently.com/the-krack-attack-what-it-was-what-it-taught-us-and-where-wpa2-stands-today/</link>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/the-krack-attack-what-it-was-what-it-taught-us-and-where-wpa2-stands-today/</guid>
      <description>In October 2017, security researcher Mathy Vanhoef published a paper describing Key Reinstallation Attacks — KRACK — against the WPA2 four-way handshake. The disclosure triggered emergency patches across every major operating system, router firmware, and WiFi chipset vendor simultaneously. It was the most significant WiFi security event between WEP&amp;rsquo;s collapse in the early 2000s and WPA3&amp;rsquo;s introduction in 2018. Understanding what KRACK was, and what it actually threatened, clarifies both the state of WPA2 security today and how the WiFi security ecosystem responds to structural vulnerabilities.</description>
    </item>
    
    <item>
      <title>Why Open WiFi Networks Are No Longer Necessarily Dangerous (OWE and Enhanced Open)</title>
      <link>https://referently.com/why-open-wifi-networks-are-no-longer-necessarily-dangerous-owe-and-enhanced-open/</link>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/why-open-wifi-networks-are-no-longer-necessarily-dangerous-owe-and-enhanced-open/</guid>
      <description>For fifteen years, the standard advice was simple: never use public WiFi without a VPN. The concern was legitimate — open networks transmitted all traffic in cleartext, readable by anyone in radio range with a packet capture tool. Sitting in a coffee shop and watching an unencrypted HTTP session between a neighboring laptop and a banking site was technically trivial. Sniffing credentials required nothing more than Wireshark and proximity.
That threat model has changed in two independent directions: the web has largely moved to HTTPS, and WPA3 introduced Opportunistic Wireless Encryption for open networks.</description>
    </item>
    
    <item>
      <title>WPA3 vs WPA2: What Changed and Whether You Need to Upgrade</title>
      <link>https://referently.com/wpa3-vs-wpa2-what-changed-and-whether-you-need-to-upgrade/</link>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/wpa3-vs-wpa2-what-changed-and-whether-you-need-to-upgrade/</guid>
      <description>WPA3 has been the current WiFi security standard since 2018. WPA2, its predecessor, has been deployed since 2004 and remains the majority protocol on networks worldwide. The gap between them is not cosmetic — there are genuine security improvements in WPA3 — but the threat model that justifies urgency depends on who is operating the network and what data crosses it.
What WPA2 Actually Provides and Where It Falls Short WPA2 introduced AES-CCMP encryption to WiFi, replacing the broken WEP and transitional TKIP protocols that preceded it.</description>
    </item>
    
  </channel>
</rss>
