This is an active attack, not a passive attack, so in theory, it's detectable. Thus, if you feel your laptop is safe surfing the public Wi Fi at airports, then your laptop is still safe from this attack.
With Android, it does allow running tools like sslstrip, which can fool many users. Many devices will be using SSL/TLS, so are fine, like your Amazon echo, which you can continue to use without worrying about this attack.
The obvious patch that device vendors will make is to only accept the first such packet it receives, ignore all the duplicates.Still, they honor his leadership and will treat visitors to Durotar fairly, albeit somewhat roughly.He takes individuals at face value and treats them with respect until their actions prove that they should be dealt with otherwise.You'll need to continue doing this for several years.
Most security vendors will add things to their products/services to defend you. The defense is patching the devices you know about, and preventing vulnerable devices from attaching to your network. Aruba contains WIPS functionality, which means by the time DEF CON roles around again next year, they should have the feature to deny vulnerable devices from connecting, and specifically to detect an attack in progress and prevent further communication.To friends, Thrall is warm and generous, freely swapping stories and information.