So, yeah. The wpa_supplicant bug only lets you *impersonate* an AP. It does *NOT* let you MITM it or passively decrypt. This is important.
The demo video isn't a MITM of the AP, it's a total takeover with direct routing out to the internet. Note how he ran a script for that.
-
-
Indeed you're correct (https://www.youtube.com/watch?v=sg-t7w8hAi0#t=1m14s …), though the effect is the same
-
Only for public services. Biggest (implied) impact of these WiFi bugs is for private networks. Many other attack scenarios for public ones.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.