New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

That guest network you set up for your neighbors may not be as secure as you think.

Ars Technica
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks - NDSS Symposium

NDSS Symposium
@nono2357 Would this potentially be something where Yggdrasil might actually help?

@dutch_connection_uk no expert, but I believe yggdrasil's initial handshake negotiation to establish an encrypted connection would be fully compromised if the WiFi network itself is compromised.

This all boils down to not using WiFi networks that you don't control or trust. An important note from the paper's author, it's a lot easier to set up a fake AP and MITM that way.

@nono2357

Thanks for linking the original article, from that:

To prevent malicious Wi-Fi clients from attacking other clients on the same network

So a prerequisite is to be able to connect to the network. That I see already as the bigger problem, no need to Airsnitch a client if you have already access to the network.