This page has moved to a new address.

Does Wireless Networking Have to Be Insecure?