So the concept of this attack seems similar to Bluetooth exploits that target "discoverable" phones. And the solution for many people was to make their phones non-discoverable, since they were already paired to all the important devices anyway.
In the Airport preferences, there is the "By default, join: Preferred networks" option. In addition, when you click options, you can select to keep searching for preferred networks when one does not find a preferred network. But I'm not sure... is this enough? Or is the system vulnerable even when it is only looking for preferred networks? It would seem like one could spoof enough of the signal of a preferred network in some cases (e.g. when it's a company network with a known name as opposed to my hidden network at home, the name of which no one else really knows).
It seems like, in the long run, there needs to be something like a "non-discoverable" mode for 802.11 to solve this issue....
In the Airport preferences, there is the "By default, join: Preferred networks" option. In addition, when you click options, you can select to keep searching for preferred networks when one does not find a preferred network. But I'm not sure... is this enough? Or is the system vulnerable even when it is only looking for preferred networks? It would seem like one could spoof enough of the signal of a preferred network in some cases (e.g. when it's a company network with a known name as opposed to my hidden network at home, the name of which no one else really knows).
It seems like, in the long run, there needs to be something like a "non-discoverable" mode for 802.11 to solve this issue....