Douglas Schweitzer is going through a series of posts on wireless security, particularly in public environments, including his latest where he responds to my comment on wireless hotspots and security.
I have an alternative suggestion for Douglas though - perhaps he could employ this method as another alternative?