|
As a Captive Portal infrastructure architect for a Wi-Fi operator my bias should be clear. We use the Captive Portal to assist in customer on-boarding and to provide an improved user experience to users who are not entitled to access. That being said, it is possible that a captive portal could be used for abuse. Similarly, there is abhorrent traffic transmitted via HTTP but I certainly don't want this protocol to die. My hope would be for the group to move on to more relevant topics. Cheers! Christian Christian Saunders Shaw Communications Inc. On 17-04-11 08:16 AM, David Bird wrote:
|