TPLinkHackers from Hak5 group in far 2008 developed a “espionage” Access Point which was intercepted on itself all WiFi-connections around.

Technically, this is was accomplished by a positive answer to absolutely everything identification requests WiFi Beacon Frames. If the laptop was looking for an SSID of Starbucks, spyware AP says, “Thats Me!” if he is looking for the ID of any other public hotspot – spy device again responds, “Thats Me!”.  Whatever the access point is not looking around user devices – hotspot allows them to connect to itself. Continue reading