Hacker News
new
past
comments
ask
show
jobs
points
by
russdill
5 hours ago
|
comments
by
cluckindan
3 hours ago
|
[-]
If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?
reply
by
cyberax
1 hours ago
|
parent
|
[-]
Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
reply