tk_saturn's right. I've done extensive research in wireless security. Unless the WPA/WPA2 key is in the attacker's dictionary file, they won't be able to get it. There are other ways of cracking WPA, but they totally rely on how stupid the user is. Even with GPU helping, it took me two days to get through a wordlist that was 700 some megabytes and still didn't have my key. You're not fooling yourself if you think WPA is better. The only advancements in WPA security weakness discovered in the past years involved TKIP cracking which does not get you the PSK, just the MIC.
But back to topic. What people have said is correct, unfortunately Acekard can't run in DSi mode, so it can't help you if you have a WPA key or are doing anything that involves 802.11g (DSi has 802.11g).
I've also noticed if you're operating in place with lots of networks on the same channel, it won't see or be able to connect to any of them unless you use an advanced connection (happens with my repeater). I can't use a repeater near the damned thing.