Yes, I was getting a little bit excited there.
Only thinking based on general principles, noting for Whonix users that may not be aware:
WEP is completely busted
However, WEP has been shown to be a relatively weak security protocol, having numerous flaws. Hence, it can be ‘cracked’ in a few minutes using a basic laptop computer.
For example, WEP fails to protect the information against forgery and replay attacks, hence an attacker may be capable of intentionally either modifying or replaying the data packets without the legitimate users becoming aware that data falsification and/or replay has taken place. Furthermore, the secret keys used in WEP may be ‘cracked’ in a few minutes using a basic laptop computer . Additionally, it is easy for an attacker to forge an authentication message in WEP, which makes it straightforward for unauthorized users to pretend to be legitimate users and hence to steal confidential information .
History of recent attacks on various WPA/WPA2 protocols
There is a history over the last few years of finding weakenesses in WPA/WPA2 protocols e.g. successful attacks on standards using PSK encryption keys, TKIP, MSChapV2 etc:
etc etc (there is pages and pages of similar)
You’re right insofar as you use a suitably long passphrase and use updated/recommended protocols, that probably all of those major hacking tools will fail, since they are mostly attempting to bruteforce passwords via rainbow tables, dictionary words etc.
I can’t find information to indicate otherwise on the security guru forums.
But, it is worth noting how many failures keep popping up in the wireless protocols, and the fact that it is a broadcast protocol makes it suceptible to jamming attacks, potential eavesdropping etc. The ethernet protocol on the other hand does not face anywhere near the same scale of risks being a hardwired connection.