Really great article with concrete information applicable to a range of technologies. Thanks!
To bulk up the "How does it work?" section and give a bit more background information, here is the link to a blog I wrote. It includes more details on the KRACK attack and what vulnerabilities in the WPA2 protocol made the attack possible:
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.