If someone is targeting you that precisely they are sorting through your trash for a coffee maker, then I would posit you are already in deep trouble and they'd likely do something easier like wait for you to leave and insert physical access into your network then...
Exactly! Sniffing passwords out of coffee makers is hard to scale. Lots of tech needed/knowledge. Wrenchs scale linearly with people given wrenchs, and typically one does not need training to apply brute force with wrench. You may be able to save on labor even as other primates can use the wrenchs better and with more force than humans.
Most offices are going to notice if someone abducts the IT manager and beats the wifi password out of them. They're probably not going to notice that someone took away the trash they threw out.
And you propose what instead, that the target verifies their coffee maker manufacturers disable the JTAG interface on production units so that they can throw it away without worrying about this?
Seems like the wrong solution to an already absurd/niche threat model.
The irony, of course, being that those can generally be properly wiped to safely resell. Or, if it matters, the thing should have been using full disk encryption so it's irrelevant.