The Handshake Snooper arbiter could abort after waking from interval sleep.
Flags sent to the script while waiting were enqueued, and triggered later.
The snooper & jammer stayed up while the arbiter slept even after aborting.
Users though they had to manually close the snooper and jammer.
The problem was more apparent the longer the sleep interval chosen was.
Removed 10 seconds verification interval to allow deauths more down time.
Added 60 seconds verification interval to allow for longer snooping times.
Added synchronicity recommendation, favoring sychronous to prevent issues.
Updated language files to reflect interval changes & recommendations.
Fixed a bug caused by outdated code preventing returning from certain point.
Tweaked the sequence, and timing of deauthenticators to improve performance.
The verifier may now run asynchronously, or synchronously for slow systems.
The attack temporarily halts deauthenticators to allow client reconnection.
The attack's checking interval is now customizable.
The attack offers better user feedback via a dynamic log.
Added all missing spacers after a choice operation (missing echo).
Rearranged fluxion_header algorithm to make transitions smoother.
Fixed a bug where captorPID might be missed (not waiting [enough] for it).
Updated fluxion and attacks scripts to use the updated language global identifiers.
Quoted some paths that handn't already been quoted (potential spacing issues).
Updated the exitmode function to deal with FLUXION-started only processes.
Fixed a bug where the "WI not supported" message was displayed when no AP were found.
Added an IO function to handle dynamic, static-text, substitution.
Most spaghetti code has be removed or replaced with better alternatives.
Discarded dead/non-working code to allow for future reimplementation.
Two types of attack are possible, passive, or aggressive using aireplay-ng or mdk3.
A verifier daemon is now responsible for stopping captures and, optionally, deauthentication when a valid hash has been acquired.