Introduction - Federal Communications Commission

The deauthentication protocol could be used to engage in Wi-Fi blocking in a variety of ways. For example, the blocking operator can deauthenticate by sending a single deauthentication frame to the access point used by the target device while spoofing the target’s MAC address in … ................
................