said by zod5000:I use WPA2-AES with a randomly generated longass password. I figure it'll be a few more years for someone to crack that.

I suppose though, because cpu/power continutes to increase, the ease of brute force attacks gets easier. I guess they should start working on a WPA3.

Nah, a raw brute force on, say, 128 bit AES would take longer than the age of the universe (assuming a reasonably strong key). Then you have the Von Neumann-Landauer Limit to contend with. This principle says that it would take an inordinate amount of energy to do -- more than is available to anyone. Energy is a big problem with brute forcing large keys. There is simply no way around the 2nd law of thermodynamics (unless you want to take into account theoretical reversible computing).

This attack on TKIP appears to have been a result of a mathematical breakthrough (i.e. the researchers found an inherent weakness in the encryption cipher). Without these mathematical "breakthroughs" brute forcing is not feasible, not even with multiple supercomputers.