Does anyone know if this will prevent MAC authentication from taking place?
If it probes the network with a random MAC but authenticates with its own correct MAC, i dont see that this should prevent MAC authentication from taking place.
On the other hand, if MAC authentication is in place as part of a layered security model, should the random MAC be in the list (is this going to be chosen from the Apple agreed list??) this could in effect authenticate a non authorised device, causing a security breach to the network
TIA
G