Skip to main content

Nervous about using public Wi-Fi while you travel? You shouldn’t be. Here’s why

When you’re out and about, and especially when you’re traveling, you might find yourself feeling quite a bit of anxiety when logging into public Wi-Fi. Maybe you’re sitting in an airport waiting for your flight, and the siren call of that Wi-Fi network is making your ears itch. You’ve got one of the best laptops you can buy, but you’ve always heard that public Wi-Fi is dangerous, or your work strictly prohibits it. So what is a traveling techie to do? I sat down with Chester Wisniewski, Principal Research Scientist for Sophos to find out just how terrible it was.

Funny story. It turns out it’s not so bad.

Recommended Videos

Most of what you’ve heard about public Wi-Fi likely dates back a decade or more. That’s where the terrible reputation comes from. But things have changed, and it’s important to understand how, and part of the how includes the why. There’s a little history to go over to see how we got here though.

“Today if I go to Starbucks and I try to hack you, I get nothing. At best the most I’ll see is ‘Adam is going to Facebook’ but I have no idea what he’s doing on Facebook. I don’t know if he’s logging in as him, or if he’s logging in as his alter ego. I have no concept because all of that is encrypted and protected at the application layer rather than the network.”

How we got here

Many moons ago, the internet was largely unsecured. We relied on our networks to keep our network traffic protected. As a result, people were vulnerable to attacks with cute names like “evil twin” and “man in the middle.” These attacks allowed a hacker to see everything that was happening as it flowed through the internet. Type in www.facebook.com and enter your username and password and all of that was just sitting there, waiting to be intercepted. But it was cool because the network protected everything.

Hands over a laptop with lines of binary code.
EThamPhoto / Getty Images / EThamPhoto / Getty Images

But just under a decade ago, a man named Edward Snowden popped up on the world’s radar and everyone suddenly realized that everything we do on the internet could be watched and/or collected. When that happened, we all freaked out. Fortunately, we freaked out in a good way; we started locking everything down as much as possible.

This brings us to where we are today. Says Wisniewski “Today if I go to Starbucks and I try to hack you, I get nothing. At best the most I’ll see is ‘Adam is going to Facebook’ but I have no idea what he’s doing on Facebook. I don’t know if he’s logging in as him, or if he’s logging in as his alter ego. I have no concept because all of that is encrypted and protected at the application layer rather than the network.” Spoiler alert, I wasn’t logging in at all, and in fact, I never go to Facebook, but that’s another article for another time.

How things are today

It took some time for all of this to be put into place, but in 2019, Google reported that almost 92% of all traffic on the internet was encrypted. It turns out the answer was in our address bar all this time. The “s” in “https://” indicates that the traffic you’re generating is encrypted. It uses Transport Layer Security (TLS) to encrypt data sent over the internet, and it does this at the application level. It’s worth noting that “the application level” refers to both the website, such as facebook.com and the Facebook app.

The only information that leaks unencrypted is DNS lookup information. For example, if you open a browser and go to www.digitaltrends.com, and someone intercepts your signal, they can see that you went to the best tech website ever, but they wouldn’t be able to see what you did when you got there. Even that is changing according to Wisniewski. Both Firefox and Google Chrome hide DNS lookup information by default, and most other web browsers offer the ability to do so. Windows 11 has a system-wide option that you can enable to hide that information in any browser.

So what that all boils down to is that for the most part, public Wi-Fi is about as safe as you can reasonably ask for.

Additionally, HTTP Strict Transport Security (HSTS) adds another layer of security. HSTS basically teaches your computer what a website looks like on your first visit. Every subsequent visit confirms for your browser that you’re at the correct one. There’s even an HSTS preloaded list of tens of thousands of domains that your browser knows about even before your first visit. This prevents man-in-the-middle attacks from sending you to the wrong site made up to look like the right site and compromising your traffic.

Exceptions to the rule

So what that all boils down to is that for the most part, public Wi-Fi is about as safe as you can reasonably ask for, but there are a few caveats to that. This will sound similar to our Scream trailer smart home hacking article, but similar circumstances call for caution in this case. If you are the kind of person who routinely handles extremely sensitive information and/or information that other people would really want, then you should think twice before connecting to any network that you or your company/agency didn’t set up yourselves. While the encryption we use every day is robust enough to handle casual attackers, if you handle information that others would literally kill for, public Wi-Fi is not for you.

Three young professionals working on devices at a coffee shop bar.
Image used with permission by copyright holder

Another big caveat comes in the form of companies whose policies specifically forbid you from using public Wi-Fi. If you work for such a company or agency, simply don’t do it. In the company’s opinion, there aren’t enough protections in place, and they sign your paychecks, so who are you to argue? The bottom line is, companies have rules and as an employee, it’s your job to follow them, despite what a tech website has to say about the matter.

Finally, check in with your gut. If you feel uncomfortable logging into your bank from your local airport, don’t. After all, this is your data. You can use a banking app to log in from your phone on 5G or LTE which is about as secure as networks can get.

Other ways to stay safe

So are there ways that you can make your web traffic even safer? I asked about VPNs for example. One theory is that a Virtual Private Network is a good way to hide data, and to an extent, Wisniewski agrees. But in cases like that, he describes a VPN as “reassigning trust.” While most of your traffic is already encrypted, using a VPN shifts the unsecured stuff (like DNS lookups for example) over to the VPN. If you trust your VPN more than the network engineers at Starbucks, that will help you out with the limited amount of data that isn’t already encrypted.

One of the most important messages Wisniewski left me with was a warning against clicking through security messages. When you’re visiting a website, and your browser pops up a warning saying the site may not be safe, it’s probably not safe. The problem may be as simple as a typo, or an expired security certificate, but suffice it to say, if you’re getting a warning, there’s a reason. Double-check everything, and when in doubt, just skip it and come back another time.

In general, for most people, public Wi-Fi is safe, and the reason for that is because as a society, we’re a lot more security conscious than we were even 10 years ago.

Beyond that, password managers are a great tool to use to stay safe on the internet, regardless of how you’re connecting. Password managers are inherently stringent when it comes to security, and they prevent reuse or oversimplification of passwords. Plus, if a password suffers a breach, it’s simple enough to change.

But the overall message here is that in general, for most people, public Wi-Fi is safe, and the reason for that is because as a society, we’re a lot more security conscious than we were even 10 years ago. As such, we have demanded that our information be more protected, and the internet has responded. So if you’re traveling or just out and about, it’s probably OK to grab a coffee and take in some Netflix.

Adam Doud
Former Digital Trends Contributor
Adam had been writing in the tech space for nearly a decade. When not hosting the Benefit of the Doud podcast, he can be…
One UI 7 adds a bevy of camera tricks to your old Samsung phone
The Samsung Galaxy S25 Ultra with the Galaxy AI screen.

Samsung has officially begun rolling out the Android 15-based One UI 7 update for its older smartphones via the stable channel, starting with Galaxy S24, while also showering similar love on the Galaxy Z Flip 6 and Z Fold 6.

While at it, the company has finally shared an extended roadmap for devices that are in line to receive the software upgrade, and also put a spotlight on the new camera tools coming alongside. 

Read more
The Galaxy S26 Ultra may get a brand new camera upgrade
The Samsung Galaxy S25 Ultra's camera.

Samsung may be working on upgrading the Galaxy S25 Ultra's already complex, high performance camera system for the Galaxy S26 Ultra, by replacing one of its multiple cameras with a brand new sensor. Before we get into it, you should know the details come from information apparently taken from a prototype of the future Galaxy phone, and is therefore not only a little unclear, but also subject to change. That said, here’s what we know. 

For reference, the Galaxy S25 Ultra has four cameras on the back — a 200-megapixel main camera, a 50MP wide-angle camera, a 50MP 5x optical telephoto, and a 10MP 3x optical telephoto. Samsung is expected to continue using the 200MP main, 50MP wide-angle, and 50MP 5x telephoto, but is potentially doing something different with the 10MP 3x zoom according to the PandaFlashPro X account, a known source of mobile industry information.

Read more
Official OnePlus 13T teaser reveals iPhone 16 Pro similarities
OnePlus 13T vs iPhone 16 Pro bezels

Rumors surrounding upcoming phones appear daily, from the iPhone 17 Slim to Samsung's next Galaxy Z Fold 7 and Z Flip 7 devices. There's one phone in particular that has seen an increase in teasers recently however, and that's the next phone to launch from OnePlus. 

The Chinese company already confirmed the OnePlus 13T was coming - on April Fools no less - and the device has appeared on AnTuTu with some impressive benchmarking scores. OnePlus has also previously shared a teaser image showing off an action button in place of the signature action slider, and now another official teaser image has appeared.

Read more