... threats
Denial of service due to radio interference or malicious
user
Unauthorized and unaccounted access to the network and
Internet
Eavesdropping and recording other users’ traffic
Faked servers and networks, intercepting/diverting other
users’ traffic
The lack of traceability if many-to-one NAT is used
Possible access to IP-level without authentication => better
possibilities to eavesdrop traffic