Wrong. N900 is perfectly able to "crack" WPA2 password in reasonable time, if given good enough Rainbow Table for given SSID. I used term "crack" in quotes, cause via Rainbow Tables, most computing work is done *before* actual attack (without need for things like handshake - only SSID), on big machine(s), for weeks or even months. Sure, doing rest of computation on N900 (and checking all hashes) will be slower than on 2500 mHz Core2Duo, but it's nothing like lifetime or even weeks What You're talking about, is probably bruteforcing password, which is more than lifetime (for strong passwords) even for big machines, or clouds of big machines Rainbow Tables are different thing - some kind of compromise between storage needed and computational power required. More info can be found on Wikipedia. Well, for scope of this post is enough to say, that they don't call it Rainbow Tables without purpose