logoalt Hacker News

cluckindanyesterday at 9:10 PM1 replyview on HN

If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?


Replies

cyberaxyesterday at 10:35 PM

Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.