Yes, very good and interesting analysis of some WPA3 flaws. Unfortunately the side channel attack requires at least unprivileged access to the victim (dragonblood.pdf: 7.2 Attack Scenario). In other words: The attacker must install code on the target device.
Additionally, most of the flaws are already patched:
SAE side-channel attacks
https://w1.fi/security/2019-1/
EAP-pwd side-channel attack
https://w1.fi/security/2019-2/
SAE confirm missing state validation
https://w1.fi/security/2019-3/
EAP-pwd missing commit validation
https://w1.fi/security/2019-4/
Additionally, most of the flaws are already patched:
SAE side-channel attacks
https://w1.fi/security/2019-1/
EAP-pwd side-channel attack
https://w1.fi/security/2019-2/
SAE confirm missing state validation
https://w1.fi/security/2019-3/
EAP-pwd missing commit validation
https://w1.fi/security/2019-4/