Am I missing something, or is the Android/wpa_supplicant "all zero key" KRACK bug mostly FUD? Surely wrong key = traffic can't flow.
If they've *ever* connected to a public/known WiFi you can already impersonate that and deauth them if you're near.
-
-
Alas. HTTP should just be banned.
-
Except on localhost in isolated network namespaces, and over UNIX sockets. Kill it with fire everywhere else.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.