Quote:
Originally Posted by ChrisH
One of the reasons for the kiosks is to better secure the WPA keys. There is now no need for the field crew to print the keys at all. Instead they are loaded directly into the kiosk. It is possible to make a printout of them, but that would take a deliberate effort by somebody who knows what they are doing. There is little value in doing so just for kicks, so anybody who did so would probably have another goal in mind, which brings us back to "social engineering" (the current euphimism for espionage where I work)
|
At events I've been to in the past there were print-outs of instructions on how to configure the bridges which includes the teams key. The "new-style" bridges last year couldn't be configured with the kiosk so teams had to manually configure them. These print-outs often got pushed aside and could easily be lifted. I haven't yet been to an event this year so I do not know if the print-outs are still being given.
However what is to keep someone from bringing their own DAP-1522, walking up the kiosk and programming it with any teams key. After that they have a wireless bridge that gets them on the same network as the robot as long as they change the bridges static IP. I am not sure if the field would attempt to detect if this happens but I cannot think of a reason it wouldn't work.
The kiosks may be different this year but in the past there was no reason I could not enter another team at the events number and get their settings instead.
I am not suggesting anything happened, just pointing out that it is possible.