Hmmmm,

There seems to be some semantics involved here?

I am no expert in this area, but my understanding is that a deauthentication attack only requires one successful connection and so would...