Comment Re:Multiple? (Score 1) 458
Cracking WEP takes about a minute, given a reasonable amount of traffic (and this is read-only). Once in, you grab a MAC that you've seen get traffic and impersonate it (more or less). MACs aren't at all secret, so WEP is basically open.