Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
iiii240117dMaybe if someone already has too much access to your machine to read the wpa_supplicant config, it's too late to worry about your wifi password?
qwwerty64717d@iiii that would be a case of direct attack. But there are plenty of other scenarios, in which you can have the files stored remotely as backups, you did a `cat` on the file while logging output of the terminal and the passwords reamins in clear in the logfile, etc...
Feels like almost nobody asks "does it have to be stored in the plaintext" and everybody setttles for "config requires elevated access so good enough, it works anyway and i don't care."
I use a radius server.
iiii240117d@qwwerty to access your wifi with the somehow leaked password someone has to be in a very close proximity to your hardware. Even randomly leaking it online is not really a threat as well, unless you're using the same password for wifi and something else. But that's a whole other story.