An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.
The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that's scheduled for 8 a.m. Monday. An advisory the US CERT recently distributed to about 100 organizations described the research this way:
https://arstechnica.com/information...l-leaves-wi-fi-traffic-open-to-eavesdropping/
Going to be interesting to see the details of this if it’s true.