This has been something that has bothered me for a while. It is always recommended that you should not trust public wifi - but I think this is a farce given the advancements we’ve made in modern browsers and HTTPS.
Do we still need to worry?
This has been something that has bothered me for a while. It is always recommended that you should not trust public wifi - but I think this is a farce given the advancements we’ve made in modern browsers and HTTPS.
Do we still need to worry?
A man in the middle attack or spoofed DNS or poisoned DNS on a public WiFi with the right coding can make fake sites appear legitimate. Inserting credentials can store them in a local DB and pass them on to the right website. Your session looks legitimate to the end user. This has been done before. It also depends on the security of the sites that you go to, downgrade of TLS to SSL is a real thing. How Hackers Spoof DNS Requests With DNS Cache Poisoning
Don't Use Public Wi-Fi Without DNS Filtering
VPN is not a full proof solution, however and I’d suggest having good EDR, and a reliable DNS provider.
On a side note I rarely use public wifi, I usually tether my phone, with VPN to my home router. At that rate I know where the traffic is going at all times and to an extent how reliable the DNS is.
I’d agree with you to a degree that HTTPS is much more wide spread these days that limits some of the attacks.
As @brad_voris has said, there are still a number of attacks that a malicious public wifi access point can do to intercept / downgrade security.
VPN’s are a good thing to use, but only if you can trust the provider. If the VPN provider is malicious, they can carry out the attacks that a malicious access point could. My suggestion would be to role your own VPN server using something like pivpn (https://www.pivpn.io/) on a digital ocean droplet.
Thanks for your response! I’d argue that most modern browsers protect you against these attacks - but I can’t verify that. Give me a few weeks to get settled into my new house and I’ll prove it to you in my lab. Blog post incoming!
How many people have old phones, tablets or older laptops they travel with? The age old issue of people not updating or upgrading will always be a problem.
This is especially prevalent with Android devices.
Look forward to reading your blog post!
Great conversation. Love the thoughts and input.
A few actionable thoughts:
Note: depending on VPN client configuration, it is possible that others can communicate with your host on the same network even if you are using a VPN.
Very good points @christian_taillon, especially on the different firewall profiles! Alot of people don’t take this in to consideration.
I’ve done something similar to this. I have a wireguard VPN tunnel paired with Pi Hole. I have it on anytime i leave the home network. It works wonders.
I would add my 2 cents: to specific individuals that need to be highly secured, I suggest to use a portable FW/VPN box between the public WiFi and the owned devices (phones, computers).