Dragonblood vulnerabilities disclosed in WiFi WPA3 standard Dragonblood vulnerability discovered by the same security researcher who discovered the KRACK attack on WPA2 April 10, 2019 https://www.zdnet.com/article/dragonblood-vulnerabilities-disclosed-in-wifi-wpa3-standard/
WPA3 Wi-Fi no more secure than WPA2, researchers claim April 11, 2019 https://appleinsider.com/articles/19/04/11/wpa3-wi-fi-no-more-secure-than-wpa2-researchers-claim
New Dragonblood vulnerabilities found in WiFi WPA3 standard Two new Dragonblood bugs allow attackers to recover passwords from WPA3 WiFi networks August 3, 2019 https://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard/
Recovering Wi-Fi Password via Dragonblood Attack Costs $1 of Computing Power August 6, 2019 https://www.securityweek.com/recovering-wi-fi-password-dragonblood-attack-costs-1-computing-power
The researcher, Vanhoef confirmed that the side channel attacks are fixed with Hash-to-Element: https://twitter.com/vanhoefm/status/1410134225743921154?s=21 I found this and also another security feature: https://community.synology.com/enu/forum/2/post/143390 (Link to forum post as the WiFi Alliance page does not seem to be publicly available. Note that Windows is just adding Hash-to-Element in the upcoming Windows 10 21H2, so it may take a while before both clients and routers support it. Not sure if an OS update is enough or new WiFi drivers are also needed.