. . "The environment for the threat to work is an area of non-encrypted wireless connection, such as a wireless internet cafe or other WiFi hotspots." . .