• I tried to delete this post...sorry. I did not think carefully enough before I posted The answer was obvious.

    The original question was that if I can spoof a coworker's MAC, then I can see his data, but it would be encrypted with his key...just as if you captured it on a analyzer. (Usually MAC spoofing is associated with joining a ESS). Slow day...

Page 1 of 1
  • 1