What kinds of attacks are eliminated in WPA2-PSK if for each device there’s a different (secret) PSK?
With regular WPA2-PSK there’s the fact that every device shares the same PSK, hence it’s possible to impersonate the AP by setting up an Evil Twin and watching the traffic. This isn’t possible without knowing the PSK, so for a setup where …