Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Perhaps not for honest folk like yourself, but there are obvious ways that it could be used for evil - set up an access point with the same name and MAC address to sniff traffic and/or perform all sorts of man-in-the-middle attacks.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: