Yeah, all your traffic being routed through the google servers.
Default DNS is Google's on those. It seemed there was some pre-caching going on but could've been all in my head. I switched DNS for sure.
Yeah, all your traffic being routed through the google servers.
After successfully updating one of my AExp, I went to update my 4th-gen (the one before the tallboys). It went well, until it didn't. Finished with an error and then fell off the network. When I went to look at it, no status light at all. Power cycle, attempt at hard reset - nothing. But I unplugged it for 30 min or so and then when I plugged it in it booted up normally. New firmware and everything! Not the smoothest, but in the end it worked out.
Aerohive makes some capable access points with very Apple-like design:
![]()
The status light is normally just white. No blinking. If it detects a problem, it goes either solid orange or slowly blinking orange. It's more angular than I would expect something from Apple to be, but is very close in terms of operation and internals. The antennas are very good.
Apple today released new firmware updates for its Wi-Fi base stations, including the AirPort Express, AirPort Extreme, and AirPort Time Capsule. The 7.7.9 update is available for 802.11ac base stations, while the 7.6.9 update is available for 802.11n base stations.![]()
Release notes for the update were not provided by Apple, but it is likely that this firmware update fixes the KRACK Wi-Fi vulnerabilities that affected many modern Wi-Fi networks and devices.
The KRACK vulnerability had the potential to allow attackers to exploit weaknesses in the WPA2 protocol to decrypt network traffic to sniff out credit card numbers, usernames, passwords, photos, and other sensitive information. Apple released KRACK security updates for other devices earlier this year.
The new firmware updates can be installed using the AirPort Utility app for iOS or macOS.
Apple has allegedly stopped development on its AirPort wireless routers in 2016, and to our knowledge, the company does not plan to produce another product in the AirPort family in the near future.
Update: Support documents for the security contents of the 7.7.9 and 7.6.9 updates confirm that the KRACK Wi-Fi vulnerability has been addressed alongside a few other security issues.
Article Link: Apple Releases Firmware Update 7.7.9 and 7.6.9 for AirPort Base Stations [Updated]
Using their DNS doesn't route all your traffic through their servers. The person you replied to is making an absurd claim. Even if they meant DNS, it's incorrect.Default DNS is Google's on those. It seemed there was some pre-caching going on but could've been all in my head. I switched DNS for sure.
iPhone camera bumpWhen was the last time Apple released an asymmetrically shaped product?
This update comes more than a month after my eeros were updated to patch the vulnerability. I’m glad I jumped off the AirPort bandwagon last year.
My download speed went from 60 to 117mbps and my upload speed from 5 to 11mbps after applying these updates. Anyone else seen speed increases like this?
My download speed went from 60 to 117mbps and my upload speed from 5 to 11mbps after applying these updates. Anyone else seen speed increases like this?
[doublepost=1515177349][/doublepost]Ever since this update, I had to re-establish connections to the wireless signal for many of my devices. Additionally, I get occasional messages that the password has changed, when it hasn't and it won't establish a connection even after re-entering the password and finally, the signal just disappears and re-appears for no apparent reason. Anyone else having issues?
Apple today released new firmware updates for its Wi-Fi base stations, including the AirPort Express, AirPort Extreme, and AirPort Time Capsule. The 7.7.9 update is available for 802.11ac base stations, while the 7.6.9 update is available for 802.11n base stations.![]()
Release notes for the update were not provided by Apple, but it is likely that this firmware update fixes the KRACK Wi-Fi vulnerabilities that affected many modern Wi-Fi networks and devices.
The KRACK vulnerability had the potential to allow attackers to exploit weaknesses in the WPA2 protocol to decrypt network traffic to sniff out credit card numbers, usernames, passwords, photos, and other sensitive information. Apple released KRACK security updates for other devices earlier this year.
The new firmware updates can be installed using the AirPort Utility app for iOS or macOS.
Apple has allegedly stopped development on its AirPort wireless routers in 2016, and to our knowledge, the company does not plan to produce another product in the AirPort family in the near future.
Update: Support documents for the security contents of the 7.7.9 and 7.6.9 updates confirm that the KRACK Wi-Fi vulnerability has been addressed alongside a few other security issues.
Article Link: Apple Releases Firmware Update 7.7.9 and 7.6.9 for AirPort Base Stations [Updated]
Using their DNS doesn't route all your traffic through their servers. The person you replied to is making an absurd claim. Even if they meant DNS, it's incorrect.
Yes, I’ve had the same issue on my latest generation Airport Time capsule. I have rolled back the firmware to 7.7.8[doublepost=1515177349][/doublepost]Ever since this update, I had to re-establish connections to the wireless signal for many of my devices. Additionally, I get occasional messages that the password has changed, when it hasn't and it won't establish a connection even after re-entering the password and finally, the signal just disappears and re-appears for no apparent reason. Anyone else having issues?