. "The computing power to perform a brute force attack on WPA/WPA2 is now within the purchasing power of a criminal entity, and even more importantly can now be rented from cloud providers such as Amazon." . . .