So what? The attacker need not attempt a login until they have derived a good password, if they can sniff enough traffic.
REDACTED I'm trying to make a point about entropy, not the security of a particular set up. Besides, you're talking wifi sniffing, aren't you? I'm using a Remote Desktop example.
OK, throw in a VPN to an RDP login with a lock out after three wrong attempts. Then back to my point about the entropy of dictionary words versus random text passwords. If someone is trying to brute force a password in a rate limited scenario, the password does not have to be as complicated compared to a situation where someone can freely brute force a password as fast as their hardware allows, so the entropy gain in using non-dictionary words may not matter, practically speaking, and may actually be a detriment if these passwords are more easily forgotten.