Hashcat Developer Discovers Simpler Way To Crack WPA2 Wireless Passwords

Someone’s going to need to translate the likely length of a crack. The quote “that last step could take hours or days” isn’t all that helpful.

If we have a WPA2 (max) 63 printable ASCII character random password, is the crackable time of this attack still on the order of “a couple of days”?

i.e. can casual users mitigate this attack by just increasing their WPA2 password length? To what size?

Or is this attack some sort of end-around where the size of the WPA2 ascii key doesn’t matter. It’s not clear to me,