Easily share Wifi Passwords with friends on iOS 11

When a nearby contact with an iOS device wants to connect to a hotspot you are familiar with (e.g. your device knows the password), you can easily share the password with their device:

It’s small additions like this that put a smile on my face 🙂

Keystroke Recognition Using WiFi Signals


We’re all doomed:

In this paper, we propose a WiFi signal based keystroke recognition system called WiKey. WiKey consists of two Commercial Off-The-Shelf (COTS) WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end.

Obviously that must not be accurate at all, right? Erm, wrong:

WiKey achieves more than 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%.

Keystroke Recognition Using WiFi Signals (Paper) →

WarSting: A Wi-Fi scanning sword for Hobbits.

To celebrate the launch of the new Hobbit flick, we made a version of Sting that turns blue near unsecured Wi-Fi networks. And when you slash the sword, Sting will jump on the network, and publish a message: “{YOUR WI-FI NETWORK} has been vanquished!”

Instructables included, source on GitHub.

WarSting: A Wi-Fi scanning sword for Hobbits. →
Warsting Source (GitHub) →


re:publica ’13 Visitor Flow Analysis Using the Conference Wifi


How did the visitors of re:publica 2013 move from one session to the other? By mapping the wireless connections onto the floor plan we can visualize the visitor flow.

(Translated the above from German. Lovely word, that Besucherstromanalyse … which translates to visitor flow analysis)

re:log – Besucherstromanalyse per re:publica W-LAN →