Conclusion and Netstumbler logs
This all assumes that the information being broadcasted from the wireless access points was true. It is very possible that some of the wireless access points may have been honeypots broadcasting out false information. Using the tools in the Auditors Security Collection CD, it is very easy to spoof a MAC address, and pretend to be another vendor's WAP.
About 71% of the WAPs I detected did not have WEP turned on, which is in line with wardriving results in the USA and other parts of the world. Just because WEP is disabled, however, doesn't necessarily mean that the network is completely open. Most of the WAPs found in Taipei used some type of user/password authentication to gain Internet access. Of course, since WEP is not used, this traffic can be sniffed and fed back into the WAP.
The most interesting SSID found was test_dontuse . The popular vendors in Taipei seem to be D-Link, Melco (Buffalo), and Senao. Unlike the United States, Linksys is almost non-existent here.