The Real Dangers of Public Wi-Fi
You connect to "Airport_Free_WiFi" and start scrolling. It feels completely normal — and most of the time it is. But public networks have a few specific risks that are worth understanding, because the fix is quick and cheap.
What's actually risky
Evil-twin hotspots
Anyone can set up a Wi-Fi network and name it whatever they want. A laptop in a backpack named "Starbucks Guest" will happily route all your traffic through the attacker first.
Unencrypted captive portals
Some hotels and airports still push you through a login page served over plain HTTP, where the network operator — or anyone pretending to be them — can see or modify it.
Drive-by network probing
Open networks let other devices on the same network scan yours. Outdated systems with file sharing enabled can leak surprising amounts.
What's mostly fine these days
Almost every major site uses HTTPS, which encrypts the content of your traffic end to end. So someone on the same Wi-Fi can see that you visited a site, but not what you did there. That's a big change from a decade ago.
The simple fix
- Turn on a VPN before you connect. Everything goes through an encrypted tunnel — hotspot name doesn't matter.
- Tether to your phone for anything sensitive if you don't have a VPN.
- Disable auto-connect to open networks so your device doesn't silently join a look-alike.
- Keep your firewall on and your OS updated.
One tap, safe Wi-Fi anywhere
Our recommended VPN turns on automatically when you join an untrusted network.
Activate Protection