Public Wifi – A Use Case in Outdoor UsageBy X PHY / March 2, 2021 January 25, 2022 The major security concern for Public internet is the Wifi vulnerability to hacking. Rogue users can easily crack the wifi key to access and control the wifi router to redirect the genuine users to malicious websites. Just like that, Kevin’s laptop was on the verge of being attacked while he was at a coffee shop in a meeting with a client. While discussing a project, he connected with the public wifi to research on the internet.A hacker was also connected to the same network. Utilizing the wifi vulnerability to hacking, he cracked the Wifi password and gained access to the Wifi router. Now he can monitor all the user activity sharing the same network. He particularly targeted the users using NVMe protocol-based storage on their systems. He performed a MITM attack to redirect users into a malicious website by altering the DNS settings.Kevin was redirected to that malicious website and the hacker was able to steal his login credentials. Being unaware of the attack, Kevin continued working online using the Wifi. With the java applet, the hacker tried to unroot a second boot loader, to upload new firmware onto X-PHY® to get access to the data from the laptop. The real-time AI surveillance detected the second boot loader and immediately triggered the Keycode Pro-X within the X-Factor Encryption feature. The file and pattern engine further verified the checksum and signature for the new firmware. Although it is detected as a trusted host device, the verification failed because the signature and the unique serial number of the X-PHY® did not match. So, the boot loader was denied within a few seconds and a notification alert was sent to Kevin’s smartphone via pre-configured Bluetooth (BLE). X-PHY Protection Method1. The AI real-time monitoring activates the Keycode Pro-X upon detecting the upload of new firmware onto the X-PHY®.2. File and pattern engine begin verification of checksum and signature of the uploading boot loader3. The X-PHY® detects the source of the update in a genuine host device.4. Verification of checksum and signature fails as the firmware is not signed for the unique serial number on the X-PHY®.5. Halts the uploading of a second boot loader and sends alerts to the user over BLE. Share This On Your Favorite Social Media!