Quote Originally Posted by rory_20_uk View Post
Look at what the WiFi says before connecting. It requests access which is granted. If the network was secured it would be denied.
There you go.

Like I said, someone is going to have to do the dirty work and unearth case law, technical protocols, industry standards. And it ain't me. I am working myself through a stack of secret emails that were passed to me and some of them have very interesting senders and receivers.

Yup, this could be an all-nighter.