* 4-way handshake nonce reuse attack
* does NOT allow recovery of WIFI password or 4-way handshake negotiated encryption key (except for linux/android which can be tricked into using all-zero encryption key--lolz)
* does allow the attacker to preform a full MITM attack on a Wi-Fi connected client
* no access point patch can fix this, EVERY client device that connects to WiFi needs to be patched
Invite-only Mastodon server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!