

Here again, a sufficiently long WPA2 password offers protection from brute force attacks. Without Perfect Forward Secrecy they could read the saved transmissions from Monday. To illustrate what this means, assume that bad guys captured all your Wi-Fi transmissions on Monday and learned your password on Tuesday. Improvement 2: WPA3 adds Perfect Forward Secrecy (PFS or FS). How long is long enough? This changes over time but my best guess is 15 characters long.

But, if the WPA2 Wi-Fi password is long enough, brute force guessing might take years, if not decades, to stumble across the password. WPA3 makes it impossible to perform off-line brute force guessing. The official terminology for this is off-line brute force guessing. The encrypted password is in that conversation and bad guys can save a copy of the conversation and guess a billion passwords a second. Improvement 1: With WPA2 it is possible for bad guys to listen to the over-the-air conversation when a device first joins a Wi-Fi network.

So, don't upgrade your router just to get WPA3. May 18, 2021: In a nutshell: WPA3 is more secure that WPA2, but not in any meaningful way. And yes, if the data in the VPN tunnel is a secure (HTTPS) web page, then it is triple encrypted while traveling over the air in your home/office. If a wireless device in your home/office is using a VPN, then the data traveling between that device and the router is, again, double encrypted, once by the router (WPA2 probably) and once by the VPN. When the encrypted web page is traversing the Internet, it is encrypted only once. If the data is a secure (HTTPS) web page, then it is encrypted twice in your home/office, once by the router (with WPA2 probably) and also by the website. Once data leaves the router and goes out on the Internet, none of this applies. Level Setting: All these types of encryption (WEP, WPA, WPA2, WPA3 and WPA Enterprise) apply only between a wireless device (computer, phone, tablet, IoT) and the router.
