• More detail
  • Harvesting
  • Mobile attacker source tracing
  • Connect to everyone
  • Routing table takeover
  • Other stuff