Re: Is this technically accurate?
This article is technically complete bullshit. If you use traditional encrypted WPA2 where the key is known, you the connection is indeed private as long as the eavesdropper stays passive. But unfortunately the bad guy can force a re-authentication and get the encryption key:
https://security.stackexchange.com/questions/8591/are-wpa2-connections-with-a-shared-key-secure
So a password has no use at all.
The only exception is WPA2-Enterprise in which every user has their own password. with own I mean unique and strong. But networks with SSID "The password is XXXYYYZZZ" are the worst bullshit I've heard of. Its really a pity that people who don't understand even the basics can post articles on the register. I don't know whether its diffie hellman or other details, but I know that, and I'm very angry by this story. Please correct it.
Also, everything your phone does should be encrypted via TLS. The only difference between (traditional WPA2-encrypted or unencrypted) Wi-Fi and usual cable based internet is the fact that more people can jam with your connection. So instead of just the NSA or your ISP also "an angry teen with wireshark" can access your connection. I don't know your standpoint, but personally I don't trust NSA more than "one angry teenager with wireshark and root access". There is HTTPS and everything, use it and trust that. And if you use shitty apps, you shouldn't cover that by using a "secured" Wi-Fi, but by complaining about that. I guess you havent set up secureimap for your mobile phone's mail, but still are using plain old unencrypted imap? Now you want to get a false sense of security by encrypting your internet connection. Complete bullshit.
Lets come to the last part of my rant. Its a nonlinear rant, so this is the least weighting point. Why the hell do you add "root access" to wireshark?? Wireshark warns you when you run it as root. If you're an angry teen, DON'T DO IT. rather run it as an account that has access to monitor the interfaces. I know, to give your account that privilege, you need root, so you can read the statement in the article that way. Its one of the causes why this point is my weakest one.
STILL COMPLETE BS! I'VE EVEN MADE THE EFFORT TO SIGN UP TO POST THIS COMMENT!!!
Its so painstakingly wrong, I really think this article is a troll.