Thanks for the careful analysis of WPA security, but you ignored the Botnet threat. Cyber-criminals these days have thousands of CPUs and GPUs at their disposal and password cracking is easy to distribute among many processors. So figure on 10 billion WPA guesses per second if you are a valuable enough target. Also your suggestion to pick at least one number, one special character, one cap, etc. is dubious advice. Most users are very predictable in what numbers and special characters they pick and where they place them. For short passwords, such as the 8 characters you recommend, this can lower overall strength. And while you wisely suggest fully random passwords, you don't tell readers how to generate them. Please take a look at Diceware (diceware.com) which produces easy to remember and easy to type random passphrases. At 10 billion guesses/second, a 5 word diceware passphrase (for example "range eliot md kafka third") would take 45 years to crack. You don't have to enter WPA passwords all that often. Why mess around with short, weak passwords?