Not judging but I love how the term "researcher" has been adopted as a way to guise whitehat activities.<p>I wish I could use that to get out of speeding tickets<p><i>"Officer I am just a researcher and trying to determine if the 55mph speed limit sign is really the law and if it's possible to break it"</i>
Is this some kind of artificial test or is it a real issue? What I mean is that the article mentions running through about 400,000 passwords per second and the hack took 20 minutes. But wouldn't most servers or routers block the user out after so many failed logins? How do they get around that?
Wasn't this done months ago? (/me looks for the article)<p>Well, this was more generic: <a href="http://news.ycombinator.com/item?id=1907513" rel="nofollow">http://news.ycombinator.com/item?id=1907513</a><p>Oh, it was over a year ago: <a href="http://it.slashdot.org/story/09/12/07/2322235/WPA-PSK-Cracking-As-a-Service?from=rss" rel="nofollow">http://it.slashdot.org/story/09/12/07/2322235/WPA-PSK-Cracki...</a>