Most of what I know about the Marriott WIFI blocking was learned from a thread on NANOG (North American Network Operators Group). I don’t run a network but I find some of the banter on that list fascinating.
Just for completeness, here is what I posted to the google+ thread:
The 802.11 WIFI protocol has a bug where the de-authentication packet is not authenticated. That allows anyone to forge a packet with a different wireless client’s MAC address and have their upstream access point tear down the connection. NANOG had a long thread on this. One interesting thing that came out of the NANOG discussion is that some big-name AP equipment even has provisions for automatically generating these forged de-authentication packets.
Personally I think people should be using a USB or Ethernet cable to tether their computers to their cell phones or hotspots. That would keep Marriotts grubby hands off of the connection.
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, or even use Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for MakeCode, CircuitPython, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.