Firesheep, Addendum

I’m adding this update because I want to be as accurate as possible when I report on the state of things, and I may have posted some misinformation in my original post about the Firesheep plugin.

When I discussed it, I described it as a plugin that can sniff out any unsecured cookie being transmitted from any site to any user as long as the would-be identity thief is on the same unsecured wireless network. This is, apparently, untrue on a number of levels:

  1. Firesheep has to be configured to sniff for specific networks… so unless someone was specifically trying to steal cookies from, the plugin wouldn’t pick it up. This makes things safer for smallish sites like mine, because an identity thief would be attracted to huge sites with lots of users (they’re more likely to actually collect something useful that way).
  2. This security hole is not restricted to wireless, it’s just that wireless is the easiest way to collect the information.
  3. Just turning on SSL won’t completely fix the problem, because there’s an extra step involved in making sure that cookies sent to a browser are properly secured.

If you want more information about this issue, the man who created the plugin speaks in greater detail in this post.

Related posts

Introducing The Pen and Cape Society

C. B. Wright

Schlock Mercenary Nominated for Hugo Award

C. B. Wright

I Finally Found a Compelling Argument against Self-Publishing

C. B. Wright

Leave a Comment