I'm using an Alfa AWUS036H and the latest Xiaopan download. I start up Inflator, scan for valid routers with WPS and select the strongest router (my own as it's 15 feet away). Select my router from the list and proceed to the next page. I can see that inflator recognizes Reaver 1.4 installed. Without adding any settings of my own, I begin the process. I've been running this now for 24 hours and it's just past the 50% mark. I didn't even realize it but I see that every pin being entered twice. In the course of the last 24 hours, I have only seen a couple of timeouts so my router and the ALFA are getting along pretty well without fuss. I searched out this problem on the net and could only find one solution which can be seen at the following Google Reaver source page below. This goes into great detail about an http://code.google.com/p/reaver-wps/issues/detail?id=80 As you can see, the problem is resolved at the very bottom. Reaver update R68 appears to fix the issue. That was a good while ago in 2012 and it eppears that there are lots of new updates since then. "Good, sounds like the removal of M2D message support (not needed for the attack) fixed it. " I'm fairly new to Linux and Xiaopan so I'm not sure how to tell which update Xiaopan uses or how to go about manually updating. Kinda looks like it's C code and would require compiling. Well beyond my skills but I'm hanging in there and working hard to understand everything I can. There is only so much my brain can process though in a single day though. Does anyone else have this issue? As of now, it looks like after 24 solid hours I've reached what most people reach in 12 hours. I have it running on a little lap top so I can leave it running another good while to see if it completes.. By everyone elses standard it should complete sometime under the next 24 hours. any thoughts or help would be greatly appreciated. Spiff .