H
HN HRCB stories | rights | sources | trends | system | about
home / arstechnica.com / item 47167763
+0.12 New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises (arstechnica.com)
291 points by DamnInteresting 6 hours ago | 142 comments on HN | Mild positive Editorial · v3.7 ·
Summary Digital Privacy & Security Acknowledges
A technical security news article reporting on a Wi-Fi encryption vulnerability affecting residential and enterprise users. The editorial content engages with digital security and privacy protections under UDHR Articles 3, 12, and 19, raising public awareness of threats to network security and encrypted communications. However, the site's extensive third-party tracking infrastructure (Snowplow, GTM, Permutive, GAM, Xandr) creates structural tension: the article promotes encryption and privacy awareness while the site simultaneously collects granular behavioral data about readers, demonstrating disconnect between editorial message and platform practice.
Article Heatmap
Preamble: +0.12 — Preamble P Article 1: ND — Freedom, Equality, Brotherhood Article 1: No Data — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.08 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.12 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.18 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: +0.06 — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Weighted Mean +0.12 Unweighted Mean +0.11
Max +0.18 Article 19 Min +0.06 Article 27
Signal 5 No Data 26
Confidence 6% Volatility 0.04 (Low)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.27 Editorial-dominant
FW Ratio 55% 12 facts · 10 inferences
Evidence: High: 0 Medium: 2 Low: 3 No Data: 26
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.12 (1 articles) Security: 0.08 (1 articles) Legal: 0.00 (0 articles) Privacy & Movement: 0.12 (1 articles) Personal: 0.00 (0 articles) Expression: 0.18 (1 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.06 (1 articles) Order & Duties: 0.00 (0 articles)
HN Discussion 20 top-level · 26 replies
jeroenhd 2026-02-26 16:10 UTC link
madjam002 2026-02-26 16:12 UTC link
Does anyone know of any good firewalls for macOS? The built in firewall is practically unusable, and if client isolation can be bypassed, the local firewall is more important than ever.

I often have a dev server running bound to 0.0.0.0 as it makes debugging easy at home on the LAN, but then if I connect to a public WiFi I want to know that I am secure and the ports are closed. "Block all incoming connections" on macOS has failed me before when I've tested it.

sippeangelo 2026-02-26 16:17 UTC link
Bit of a sensational title? This doesn't "break WiFi encryption", only device isolation if the attacker is already in the same network.
benlivengood 2026-02-26 16:20 UTC link
As far as I can tell, all of these attacks require the attacker to already be associated to a victim's network. Most of these attacks seem similar to ones expected on shared wifi (airports, cafes) that have been known about for a while. The novel attacks seem to exploit weaknesses in particular router implementations that didn't actually segregate traffic between guest and normal networks.

I'm curious if I missed something because that doesn't sound like it allows the worst kind of attacks, e.g. drive-by with no ability to associate to APs without cracking keys.

stebalien 2026-02-26 16:22 UTC link
The article is hot garbage, here's the abstract from the paper (https://www.ndss-symposium.org/ndss-paper/airsnitch-demystif...):

To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear. In this paper, we undertake a structured security analysis of Wi-Fi client isolation and uncover new classes of attacks that bypass this protection. We identify several root causes behind these weaknesses. First, Wi-Fi keys that protect broadcast frames are improperly managed and can be abused to bypass client isolation. Second, isolation is often only enforced at the MAC or IP layer, but not both. Third, weak synchronization of a client’s identity across the network stack allows one to bypass Wi-Fi client isolation at the network layer instead, enabling the interception of uplink and downlink traffic of other clients as well as internal backend devices. Every tested router and network was vulnerable to at least one attack. More broadly, the lack of standardization leads to inconsistent, ad hoc, and often incomplete implementations of isolation across vendors. Building on these insights, we design and evaluate end-toend attacks that enable full machine-in-the-middle capabilities in modern Wi-Fi networks. Although client isolation effectively mitigates legacy attacks like ARP spoofing, which has long been considered the only universal method for achieving machinein-the-middle positioning in local area networks, our attack introduces a general and practical alternative that restores this capability, even in the presence of client isolation.

ProllyInfamous 2026-02-26 16:23 UTC link
>Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.

>The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises.

----

I wardrove back in the early 2000s (¡WEP lol!). Spent a few years working in data centers. Now, reasonably paranoid. My personal network does not implement WiFi; my phone is an outgoing landline; tape across laptop cameras, disconnected antenna; stopped using email many years ago...

Technology is so fascinating, but who can secure themselves from all the vulnerabilities that radio EMF presents? Just give me copper/fiber networks, plz.

----

>the next step is to put [AirSnitch] into historical context and assess how big a threat it poses in the real world. In some respects, it resembles the 2007 PTW attack ... that completely and immediately broke WEP, leaving Wi-Fi users everywhere with no means to protect themselves against nearby adversaries. For now, client isolation is similarly defeated—almost completely and overnight—with no immediate remedy available.

zekica 2026-02-26 16:25 UTC link
This only works for one SSID. Even then, one thing that can mitigate this is using Private-PSK/Dynamic-PSK on WPA2, or using EAP/Radius VLAN property.

On WPA3/SAE this is more complicated: the standard supports password identifiers but no device I know of supports selecting an alternate password aside from wpa_supplicant on linux.

this-is-why 2026-02-26 16:33 UTC link
Even if they can rewrite the MAC and force a new one via ping, which are usually already disabled, they still can’t eavesdrop on the TLS key exchange. I fail to see how this is a risk to HTTPS traffic? It’s a mitm sure but it is watching encrypted traffic.
kevincloudsec 2026-02-26 16:46 UTC link
every tested router was vulnerable to at least one variant. that's what happens when a security feature gets adopted industry-wide without ever being standardized, not a bug.
vxxzy 2026-02-26 17:03 UTC link
Had to read through all the cruft to get:

"If the network is properly secured—meaning it’s protected by a strong password that’s known only to authorized users—AirSnitch may not be of much value to an attacker."

jcalvinowens 2026-02-26 17:16 UTC link
This is a big deal: it means a client on one wifi network can MITM anything on any other wifi network hosted on the same AP, even if the other wifi network has different credentials. Pretty much every enterprise wifi deployment I've ever seen relies on that isolation for security.

These attacks are not new: the shocking thing here that apparently a lot of enterprise hardware doesn't do anything to mitigate these trivial attacks!

economistbob 2026-02-26 17:17 UTC link
I just read the paper, and my take is that practically every home wifi user can now get pwned since most WiFi routers use the same SSID and 2.4 and 5Ghz. It can even beat people using Radius authentication, but they did not deep dive on that one. I am curious about whether the type of EAP matters for reading the traffic.

Essentially everyone with the SSID on multiple access point MAC addresses can get pwned.

Neighhood hackers drove me to EAP TLS a few years ago, and I only have it on one frequency, so the attack will not work.

The mitigation is having only a single MAC for the AP that you can connect to. The attack relies on bouncing between two. A guest and regular, or a 2.4 and 5, etc.

I need to research more to know if they can read all the packets if they pull it off on EAP TLS, with bounces between a 2.4 and 5 ghz.

It is a catastrophic situation unless you are using 20 year old state of the art rather that multi spectrum new hotness.

It might even get folks on a single SSID MAC if they do not notice the denial of service taking place. I need to research the radius implications more. TLS never sends credentials over the channel like the others. It needs investigation to know if they get the full decryption key from EAP TLS during. They were not using TLS because their tests covered Radius and the clients sending credentials.

It looks disastrous if the certificates of EAP TLS do not carry the day and they can devise the key.

That is my take.

ErneX 2026-02-26 17:32 UTC link
The attacker needs to be connected to a wireless network if I understood this correctly?
mlhpdx 2026-02-26 17:48 UTC link
It seems like this attack would be thwarted by so called “multi PSK” networks (non-standard but common tech that allows giving each client their own PSK on the same SSID). Is that true?
jwr 2026-02-26 18:01 UTC link
Incidentally, this client isolation thing can be extremely annoying in practice in networks you do not control. Hardware device makers just assume that everything is on One Big Wi-Fi Network and all devices can talk to all other devices and sing Kum-Ba-Yah by the fire.

Then comes network isolation and you can no longer turn on your Elgato Wi-Fi controlled light, talk to your Bose speaker, or use a Chromecast.

blobbers 2026-02-26 18:08 UTC link
If you're a panicking IT guy, from the original paper:

"WPA2/3-Enterprise. These attacks generally do not work against WPA2/3-Enterprise networks..."

So this is a protocol attack, not an encryption attack. If you're using proper encryption per client, there is no attack available.

aspenmayer 2026-02-26 18:30 UTC link
I think this might be the repo?

https://github.com/zhouxinan/airsnitch

Edit: it’s the same repo as linked in the paper, so it seems likely to be the correct repo, though I didn’t originally find it via the paper.

fabioyy 2026-02-26 18:56 UTC link
macsec can encrypt data in ethernet for lan, maybe it can solve this
api 2026-02-26 20:07 UTC link
Client isolation is helpful in the real world, but it's yet another band aid for the deeper more fundamental problem.

If a device is insecure when placed directly onto the Internet with no firewall, it is insecure. Full stop. Everything else is a hack around that fact. Sometimes you have to do that since you can't fix broken stuff, but it's still broken.

sgalbincea 2026-02-26 20:34 UTC link
I'd like to see more enterprise-grade equipment tested.
runjake 2026-02-26 16:16 UTC link
Little Snitch is probably the most popular one, written my devs who deeply understand macOS firewall architecture.

https://obdev.at/products/littlesnitch/index.html

tiger3 2026-02-26 16:17 UTC link
LittleSnitch
iamnothere 2026-02-26 16:19 UTC link
Many businesses and universities, and likely some government offices, rely on client isolation for segmenting their networks. It’s a big deal.
strongpigeon 2026-02-26 16:32 UTC link
That's my read as well. It's bad for places that rely on client isolation, but not really for the general case. I feel like this also overstates the "stealing authentication cookies": most people's cookies will be protected by TLS rather than physical layer protection.

Still an interesting attack though.

strongpigeon 2026-02-26 16:34 UTC link
A tad sensationalist perhaps, but "hot garbage" is a bit much.
tialaramex 2026-02-26 16:37 UTC link
The attacker doesn't need to be connected to the victim's network, only to the same hardware, the hardware's loss of isolation is the unexpected problem.

Their University example is pertinent. The victim is an Eduroam user, and the attacker never has any Eduroam credentials, but the same WiFi hardware is serving both eduroam and the local guest provision which will be pretty bare bones, so the attacker uses the means described to start getting packets meant for that Eduroam user.

If you only have a single appropriately authenticated WiFi network then the loss of isolation doesn't matter, in the same way that a Sandbox escape in your web browser doesn't matter if you only visit a single trusted web site...

JKCalhoun 2026-02-26 16:38 UTC link
You would like the film The Conversation (1974).
amiljkovic 2026-02-26 16:55 UTC link
The Ars article mentions: “Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target’s operating system.” Not sure, but I think this could then be further used for phishing.
upboundspiral 2026-02-26 17:02 UTC link
What about XFinity, which by default shares the wifi you pay for with strangers to create access points around the city?
nixpulvis 2026-02-26 17:14 UTC link
IIUC the issue is, you could have a "secure" network and a guest network sharing an AP, and that guest network can access clients on the secure network. Someone did mention the xfinity automatic guest network, which might be a pain to disable?

This is likely not a big deal for your home network, if you only have one network, but for many enterprise setups probably much worse.

Waterluvian 2026-02-26 17:21 UTC link
Like as in me being on the Guest network at a business can then read traffic of the Corporate network?
Sytten 2026-02-26 17:27 UTC link
They still need to be able to connect to one of the network no? So a home network without guest would be fine is my understanding?
jcalvinowens 2026-02-26 17:31 UTC link
> Essentially everyone with the SSID on multiple access point MAC addresses can get pwned

You still have to be able to authenticate to some network: the spoofing only allows users who can access one network to MITM others, it doesn't allow somebody with no access to do anything.

In practice a lot of businesses have a guest network with a public password, so they're vulnerable. But very few home users do that.

supernetworks 2026-02-26 18:02 UTC link
EAP TLS provides strong authentication, is much better than the other enterprise authentication options, but will not block these lateral attacks from other authenticated devices. The second half of the deployment is putting each identity into a VLAN to defend against the L2/L3 disconnects that can occur.

I work on https://supernetworks.org/. We propose a solution to these flaws with per-device VLANs and encourage per-device passwords as well.

More practically the risk for these attacks is as follows. A simple password makes sense for easy setup on a guest network, that's treated as untrusted. These passwords can probably be cracked from sniffing a WPA2 key exchange -- who cares says the threat model, the network is untrusted. But this attack lets the insecure network pivot out into the secure one.

Chihuahua0633 2026-02-26 18:05 UTC link
Adding exceptions for certain protocols, IP ranges (maybe multicast, even) are certainly ways around this, but I imagine with every hole you poke to allow something, you are also opening a hole for data to leak.
wtallis 2026-02-26 18:08 UTC link
Even when not using client isolation, I've run into similar problems simply from having a computer connected over Ethernet instead of WiFi, and whatever broadcast method a gadget uses for discovery didn't get bridged between wired and wireless. (Side note: broadcast traffic on WiFi can be disproportionately problematic because it needs to be transmitted at a lowest common denominator speed to ensure all clients can receive it. IIRC, that usually means 6Mbps.)
ProllyInfamous 2026-02-26 18:09 UTC link
For all users reading this on their own home network: DISABLE ALL GUEST NETWORKS

It seems as if approved guest access now == system-wide access (at the hardware level). User compartmentalization no longer works.

ProllyInfamous 2026-02-26 18:11 UTC link
Only WPA2/3-Enterprise networks which offer no guest network access.
ectospheno 2026-02-26 18:14 UTC link
Access points frequently have multiple BSSIDs even if just for broadcasting on 2.4 and 5 at the same time. Any multiple AP scenario will have them regardless. Couple that with weak duplicate MAC checking and shared GTK (WPA2-PSK) and the attack becomes trivial. I imagine old hardware will be broken forever. Especially pre 802.11w.
supernetworks 2026-02-26 18:16 UTC link
This attack exploits multi PSK networks precisely. If it's all one PSK the attacker can already throw up a rogue AP for WPA3 or just sniff/inject WPA2 outright. The back half of a secure multi PSK setup is deploying VLANs for segmentation, to block these attacks.

WiFi provides half-way measures with client isolation features that break down when the packets hit L3, or in some cases the broadcast key implementations are deficient allowing L2 attacks. The paper is about all of the fun ways they could pivot across networks, and they figured out how to enable full bidirectional MITM in a wider class of attacks than commonly known or previously published.

supernetworks 2026-02-26 18:20 UTC link
Hostapd now has support for multi pass SAE /WPA3 password as well. We have an implementation of dynamic VLAN+per device PSK with WPA3 (https://github.com/spr-networks/super) we've been using for a few years now.

Ironically one of the main pain points is Apple. keychain sync means all the apple devices on the same sync account should share a password for wireless. Secondly the MAC randomization timeouts require reassignment.

The trouble with SAE per device passwords is that the commit makes it difficult to evaluate more than one password per pairing without knowing the identity of a device (the MAC) a-priori, which is why it's harder to find this deployed in production. It's possible for an AP to cycle through a few attempts but not many, whereas in WPA2 an AP could rotate through all the passwords without a commit. The standard needs to adapt.

gh02t 2026-02-26 18:20 UTC link
I mean, yeah, isn't that the main purpose of client isolation? It sucks when you're on something like a locked down university dormitory network but it also stops (or at least, inhibits) other people from randomly turning on your lightbulb or worse, deploying exploits on your poorly engineered IoT device and lighting you up with malware.
drnick1 2026-02-26 19:04 UTC link
It is hard to disagree with this approach. While I still use WiFi, it is a separate subnet and only whitelisted MACs are allowed to use it. Cameras and microphones are always unplugged when not in use, and my phone runs GrapheneOS. I also removed the hands-free microphone in my car, as well as the cellular modem.
vanhoefm 2026-02-26 19:23 UTC link
I'm a co-author on the paper: I would personally indeed not use the phrase "we can break Wi-Fi encryption", because that might be misinterpreated that we can break any Wi-Fi network.

What we can do is that, when an adversary is connected to a co-located open network, or is a malicious insider, they can attack other clients. More technically, that we can bypass client isolation. We encountered one interesting case where the open Wi-Fi network of a university enabled us to intercept all traffic of co-located networks, including the private Enterprise SSID.

In this sense, the work doesn't break encryption. We bypass encryption.

If you don't rely on client/network isolation, you are safe. More importantly, if you have a router broadcasting a single SSID that only you use, we can't break it.

vanhoefm 2026-02-26 19:27 UTC link
I'm a co-author on the paper: I would personally not use the word break but instead bypass, to indeed clarify we can't just 'break' any network. We specifically target client isolation, which is nowadays often used, and that proved possible to bypass. If you don't rely on client/network isolation, you are safe.
Editorial Channel
What the content says
+0.40
Article 12 Privacy
Medium Coverage Framing Practice
Editorial
+0.40
SETL
+0.53

Directly engaged: The article reports on encryption vulnerabilities and Wi-Fi security, both central to protection from interference with privacy and protection of communications.

+0.30
Article 19 Freedom of Expression
Medium Coverage Practice
Editorial
+0.30
SETL
+0.30

Directly engaged: The article exercises freedom of expression and the right to seek and receive information. The independent reporting on security issues supports informed public discourse and dissemination of matters of public concern.

+0.20
Preamble Preamble
Low Framing Coverage
Editorial
+0.20
SETL
+0.20

The article addresses digital security threats, which connects to the Preamble's commitment to protecting human dignity and rights against interference.

+0.20
Article 3 Life, Liberty, Security
Low Coverage Framing
Editorial
+0.20
SETL
+0.24

The article reports on Wi-Fi encryption vulnerabilities, which are threats to digital security and the right to security of person in networked environments.

+0.10
Article 27 Cultural Participation
Low Coverage
Editorial
+0.10
SETL
+0.10

Weakly engaged: The article contributes to scientific and technical knowledge by reporting on security research and encryption technology. This aligns with the right to share in scientific advancement.

ND
Article 1 Freedom, Equality, Brotherhood

Not directly engaged by article content (equal dignity and rights of all humans).

ND
Article 2 Non-Discrimination

Not engaged (non-discrimination); article does not address discrimination issues.

ND
Article 4 No Slavery

Not engaged (slavery and servitude).

ND
Article 5 No Torture

Not engaged (torture, cruel treatment).

ND
Article 6 Legal Personhood

Not engaged (recognition before law).

ND
Article 7 Equality Before Law

Not engaged (equality before law).

ND
Article 8 Right to Remedy

Not engaged (access to remedies).

ND
Article 9 No Arbitrary Detention

Not engaged (arrest, detention).

ND
Article 10 Fair Hearing

Not engaged (fair trial).

ND
Article 11 Presumption of Innocence

Not engaged (presumption of innocence).

ND
Article 13 Freedom of Movement

Not engaged (freedom of movement).

ND
Article 14 Asylum

Not engaged (asylum).

ND
Article 15 Nationality

Not engaged (nationality).

ND
Article 16 Marriage & Family

Not engaged (marriage, family).

ND
Article 17 Property

Not engaged (property rights).

ND
Article 18 Freedom of Thought

Not engaged (thought, conscience, religion).

ND
Article 20 Assembly & Association

Not directly engaged (assembly, association).

ND
Article 21 Political Participation

Not engaged (political participation).

ND
Article 22 Social Security

Not engaged (social security).

ND
Article 23 Work & Equal Pay

Not engaged (work, fair conditions).

ND
Article 24 Rest & Leisure

Not engaged (rest, leisure).

ND
Article 25 Standard of Living

Not engaged (adequate standard of living).

ND
Article 26 Education

Not directly engaged (education).

ND
Article 28 Social & International Order

Not engaged (international order).

ND
Article 29 Duties to Community

Not engaged (community duties).

ND
Article 30 No Destruction of Rights

Not engaged (limitation clause).

Structural Channel
What the site does
0.00
Preamble Preamble
Low Framing Coverage
Structural
0.00
Context Modifier
ND
SETL
+0.20

Neutral structural alignment; the site provides a platform for this content without special structural features supporting or undermining the preamble.

0.00
Article 19 Freedom of Expression
Medium Coverage Practice
Structural
0.00
Context Modifier
ND
SETL
+0.30

Neutral structural alignment. The site provides a platform for journalism with identified author and editor, supporting the exercise of Article 19 rights. No observed structural barriers to publication or distribution.

0.00
Article 27 Cultural Participation
Low Coverage
Structural
0.00
Context Modifier
ND
SETL
+0.10

Neutral structural alignment; the site supports dissemination of technical knowledge.

-0.10
Article 3 Life, Liberty, Security
Low Coverage Framing
Structural
-0.10
Context Modifier
ND
SETL
+0.24

Negative structural signal: the site's own tracking practices (Snowplow, GTM) create security/privacy vulnerabilities for users, contradicting the article's security message.

-0.30
Article 12 Privacy
Medium Coverage Framing Practice
Structural
-0.30
Context Modifier
ND
SETL
+0.53

Significant negative structural signal: The site implements extensive tracking (Snowplow, Google Tag Manager, Permutive, Google Ad Manager, Xandr) that collects behavioral data about users. While a Fides privacy consent system is present, the scope of tracking infrastructure suggests systematic data collection that undermines privacy protections Article 12 defends.

ND
Article 1 Freedom, Equality, Brotherhood

No observable structural signals.

ND
Article 2 Non-Discrimination

No observable structural signals.

ND
Article 4 No Slavery

No observable structural signals.

ND
Article 5 No Torture

No observable structural signals.

ND
Article 6 Legal Personhood

No observable structural signals.

ND
Article 7 Equality Before Law

No observable structural signals.

ND
Article 8 Right to Remedy

No observable structural signals.

ND
Article 9 No Arbitrary Detention

No observable structural signals.

ND
Article 10 Fair Hearing

No observable structural signals.

ND
Article 11 Presumption of Innocence

No observable structural signals.

ND
Article 13 Freedom of Movement

No observable structural signals.

ND
Article 14 Asylum

No observable structural signals.

ND
Article 15 Nationality

No observable structural signals.

ND
Article 16 Marriage & Family

No observable structural signals.

ND
Article 17 Property

No observable structural signals.

ND
Article 18 Freedom of Thought

No observable structural signals.

ND
Article 20 Assembly & Association

No observable structural signals.

ND
Article 21 Political Participation

No observable structural signals.

ND
Article 22 Social Security

No observable structural signals.

ND
Article 23 Work & Equal Pay

No observable structural signals.

ND
Article 24 Rest & Leisure

No observable structural signals.

ND
Article 25 Standard of Living

No observable structural signals.

ND
Article 26 Education

No observable structural signals.

ND
Article 28 Social & International Order

No observable structural signals.

ND
Article 29 Duties to Community

No observable structural signals.

ND
Article 30 No Destruction of Rights

No observable structural signals.

Supplementary Signals
Epistemic Quality
0.61
Propaganda Flags
0 techniques detected
Solution Orientation
No data
Emotional Tone
No data
Stakeholder Voice
No data
Temporal Framing
No data
Geographic Scope
No data
Complexity
No data
Transparency
No data
Event Timeline 20 events
2026-02-26 20:01 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
2026-02-26 20:01 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
2026-02-26 20:01 eval_failure Evaluation failed: Error: Unknown model in registry: llama-4-scout-wai - -
2026-02-26 20:01 eval_failure Evaluation failed: Error: Unknown model in registry: llama-4-scout-wai - -
2026-02-26 19:59 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
2026-02-26 19:59 eval_failure Evaluation failed: Error: Unknown model in registry: llama-4-scout-wai - -
2026-02-26 19:59 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 19:59 eval_failure Evaluation failed: Error: Unknown model in registry: llama-4-scout-wai - -
2026-02-26 19:58 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 19:57 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 19:47 rater_validation_fail Validation failed for model llama-4-scout-wai - -
2026-02-26 19:37 rater_validation_fail Parse failure for model llama-4-scout-wai: TypeError: raw.trim is not a function - -
2026-02-26 19:16 eval_success Evaluated: Mild positive (0.19) - -
2026-02-26 19:11 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
2026-02-26 19:09 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 19:08 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 19:07 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 18:43 credit_exhausted Credit balance too low, pausing provider for 30 min - -
2026-02-26 18:42 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
2026-02-26 18:41 dlq Dead-lettered after 1 attempts: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises - -
About HRCB | By Right | HN Guidelines | HN FAQ | Source | UDHR | RSS
build 3e57f54+egy5 · deployed 2026-02-26 22:02 UTC · evaluated 2026-02-26 22:10:52 UTC