William Arbaugh

William Arbaugh
shocked solved
would be shocked if they solved the problem.
depend security system
Security technologies depend on the correctness of the system they're actually checking.
exists exploit problem trivial using whether
This problem exists whether you use WEP or not, but it is trivial to exploit if not using WEP,
environment insecure medium protocol security shared since unless words
If you look at the 802.1x, they tell you the 1x protocol is insecure when used in a shared medium environment unless a security association is established. Since 802.11 doesn't do that, so by IEEE's own words it is insecure,