The problem with only using this approach to authenticate users is that the credentials are not tightly coupled to an individual. That is, a valid user can easily give his/her credentials to another user who desires access to the network, or the user may simply be tricked into revealing his/her credentials via an advanced phishing technique. This has alarming implications that question the overall reliability of any security technique (including 802.11i) that depends on information supplied by the user