The so-called “Krack” attack. Of course article fails to mentions how to implement this. Presumably they are referring to the practice of monitoring for a handshake than using another computer to kick something off the network and wait for it to automatically reconnect (hence asking for the handshake). But then you still have to use the handshake to determine the WIFI password. But I thought that was old news???
#tech