We all recall the "accidental" capturing of unencrypted WiFi communications by the Google Maps Streetview cars and carts as they cruised the world's highways and byways. Well now, they've gone one better.
As far as Donovan Colbert (author of the linked article above) could tell, either his brand-new Android tablet was amazingly clairvoyant or it obtained WiFi access details from a Google server.
Most of us would suspect the latter.
Colbert explains the story in detail (we suggest you read it) but in short, he turned on a brand new Android-based tablet, authenticated with his Google account and all of a sudden, the tablet had connected with his personal WiFi hotspot. In addition, the tablet's hotspot list had been populated with pretty-well every hotspot Colbert had ever used, including one 50km away!
As Colbert suggests, this could put a lot of free WiFi users in breach of the terms of service, which generally state that the access keys may not be shared.
Worse, it means that secured corporate keys are also being "backed up" on Google's servers.
Having read the article closely, iTWire has a couple of questions about how this worked - for instance if Colbert needed the WPA key to authenticate to the hotspot, how was he able to tunnel through said hotspot to get the key which the tablet then used to set up the connection? Perhaps the tablet was having a quiet chat (via BlueTooth?) with his smartphone and the two of them conspired to achieve the break-in!
iTWire has asked Google for comment, but Google has informed us that it cannot respond until the US-based experts are available in the morning.
An update to this story is available here.