In the SU chat yesterday is was raised that the newly released FF plugin Firesheep makes it very easy (obviously it was already possible, just difficult) for an attacker to session sidejack another user.
This is achieved by copying the sessions cookies from any http transmission that the attacker can see, and then using them to connect to the relevant website and impersonate the target user - this works extremely well on unsecured wireless networks where all packets can be read by anyone within range, but will work in other network configurations as well.
So, from the end-user perspective, what practical measures can be used to protect oneself from this kind of attack?
