I have no issues hijacking P3, inspire or the A2 ligtbridge setup. I will be submitting a talk at this next years black hat & DefCon conferences on my research. I have used some basic SDRs to frequency hop and understand the key exchange. It is a very simple Man-in-the-Middle attack and works a lot like a WPA brute force /de-auth. I am working on scripting a "land Command" at the moment based on RTH.