Moreover, in many approaches, the (untrusted) host can either learn about the guest’s identity, too, or she can at least recognize guests who have already connected before based on identification attributes visible to the access point during the transport of authentication traffic, exposing the guest to both community operator and host.