As I was thinking about network security, what came to mind was the threat posed by someone impersonating a public WiFi hotspot with his own hardware and running a man-in-the-middle attack on my system. The way this would work is that my laptop would connect to the impostor hotspot, because it...