iOS11, macOS High Sierra, 最新 Win10 (version 1709 對唔用 PC
打開機既我實在太多無謂野), Debian/Ubuntu linux (Ubuntu 出左 17.10 版, 用番 Gnome desktop), Arch linux 等操作系統已修補左呢個漏洞, keep your O/S update 即可.
但 Android 就
http://bgr.com/2017/10/16/krack-wi-fi-w ... s-windows/... The biggest problem for client devices (i.e. not routers or Wi-Fi access points) is Android. Researchers suggest that 41% of Android devices are vulnerable to an “exceptionally devastating” version of the attack, which allows attacks to insert fake websites into a network and collect sensitive information.
Google has said that its own Pixel devices will be the first to get a patch for the attack, and that will come on November 6th. Other manufacturers will likely push Android updates to fix the flaw sometime after Google, but given the number of Android devices still being used that won’t get a security update, old Android devices are likely to be the weakest link.Finally, some network equipment manufacturers have already pushed updates to fix the flaw. ZDNet has a list of all vendors that have issued a patch so far :
http://www.zdnet.com/article/here-is-ev ... right-now/... , but the list is largely made up of commerical-grade manufacturers like Cisco and Ubiquiti. It’s worth checking if your router has a firmware update available yet, but for now, your best bet is to make sure all of your client devices are patched and safe, and as ever, be careful about using public Wi-Fi networks that you’re unsure about.