Updated FAQ (markdown)

wiire-a 2017-12-26 10:25:58 +01:00
parent 9c8754b66f
commit bf1c9a6680

2
FAQ.md

@ -30,7 +30,7 @@ The pixie-dust attack exploits the fact that on some devices these "secret numbe
- Enrollee, Registrar?
If you want to go in depth of all the possible configurations, methods and nuances of the protocol read the specification. But to put it simple, the Enrollee is the Access Point, the Registrar the client or attacker.
If you want to go in depth of all the possible configurations, methods and nuances of the protocol read the specification. But to put it simple, the Enrollee is the Access Point, the Registrar is the client or attacker.
- What methods are supported?