On Monday, October 16th 2017, the press and social media were flooded with a wireless vulnerability that had been discovered in the WPA2 protocol, which has been dubbed KRACK as a short version of “Key Reinstallation Attack”. By now, most of us are familiar with this vulnerability, however, several manufacturers where already informed about this discovered vulnerability much earlier (read: months). The discoverer of this vulnerability has reported this under the so-called ‘responsible disclosure’ procedure. It is astonishing to me – as “half-techie” that some manufacturers state that they take these “vulnerabilities seriously and are busy addressing this”, but have no solution yet. To me, it appears that they have been ‘sitting’ on the shared information for months…