In order to preserve the promise of transparency and open communication, the change log records changes to topics made by both customers and employees. Anyone can dispute a change by clicking the "Dispute" link and entering additional details.
-
Jim Kolodziej, the poster:Removed a reply in this topicReason: User-initiated delete from community
-
DanChange in reply by Dan to Thanks for the quick response!<br /><br />Just to make sure I understand you answer... my device "is" affected - i.e. someone could use this to insert themselves and see the traffic. However, as you use a separate end-to-end encryption, they won't be able to do anything to my garage door opener. Right? <br /><br />You might want to reach out to publications like 'wired' <a href="https://www.wired.com/story/krack-wi-fi-iot-security-broken/" rel="nofollow" target="_blank">here </a>that specifically use garage doors as example of IoT devices that may be affected. <br /><br />Thanks again!<br />Dan.<br /><br />P.s. no affiliation to wired or anything, just a worried customer!.
-
JonChange in reply by Jon to I came here looking to see if I need to just disable the internet features of my Elite Series 8550W or if there will be an update. While you guys address KRACK you guys should also look into the malformed mdns packet myq sends out as well (as it makes other devices on my network unhappy until I vlan'ed it off).<br /><br />per wireshark:<br /><pre>250 2017-09-06 22:08:35.790305 192.168.0.140 224.0.0.251 MDNS 148 Standard query response 0x0000 PTR \2100 SRV, cache flush 62216 33007 62217 \201rF A, cache flush 192.168.0.140 NSEC, cache flush \2100[Malformed Packet]</pre>.
-
JonChange in reply by Jon to I came here looking to see if I need to just disable the internet features of my Elite Series 8550W or if there will be an update. While you guys address KRACK you guys should also look into the malformed mdns packet myq sends out as well (as it makes other devices on my network unhappy until I vlan'ed it off).<br /><br />per wireshark:<br /><pre>250 2016-09-06 22:08:35.790305 192.168.0.140 224.0.0.251 MDNS 148 Standard query response 0x0000 PTR \2100 SRV, cache flush 62216 33007 62217 \201rF A, cache flush 192.168.0.140 NSEC, cache flush \2100[Malformed Packet]</pre><br /><span class="_wysihtml5-temp">\uFEFF</span>.
Loading Profile...


