If you’re like most people, you use public Wi-Fi networks at airports, coffee shops, and other public places. But what if you want to keep your hotel Wi-Fi and other public networks private? Here are a few tips:
- Use a VPN. A VPN encrypts all of your traffic and makes it difficult for anyone else to track what you’re doing online. You can get a VPN for free from some of the major providers, such as NordVPN or ExpressVPN.
- Use a proxy server. A proxy server is like a virtual private network, but it’s used just for browsing the internet. You can find proxy servers at many libraries and coffee shops. Just be sure to use one that’s not blocked by your hotel or company firewall.
- Use Tor Browser. Tor is an anonymity network that helps protect your privacy online by routing your traffic through several nodes before it reaches its destination. Tor is not free, but there are ways to get it for free or at a reduced cost if you have an internet connection that’s not always reliable or fast enough for regular browsing sessions. ..
Wi-Fi networks like the ones in use at most hotels aren’t private. The login process just lets the hotel limit access to the Internet. It doesn’t keep your Internet activity private.
Open Wi-Fi Networks Allow Anyone Nearby to Snoop
Open Wi-Fi networks—that is, Wi-Fi networks anyone can connect to without entering a passphrase—are open to snooping. Because these networks aren’t secured with encryption, all data sent over them is sent in “plain text.” Anyone nearby can snoop on the traffic—unless, of course, you’re connected to a secure, HTTPS-encrypted website. All it takes is a tool like Wireshark.
Your neighbors in the hotel could snoop on your web activity. If you’re using an open Wi-Fi network at an airport or in a coffee shop, people nearby can also snoop on you there.
Captive Portals Only Limit Access to the Internet
If you connect to an open Wi-Fi network and then see a page with information about the hotel and have to enter a room number or another password to connect, you may think you’re connected to a secure network.
In a sense, you are—the hotel’s “captive portal” prevents you from accessing the Internet until you authenticate yourself. It also allows the hotel to limit the number of devices that can access the Internet—but you can share that single hotel Wi-Fi connection with multiple devices.
RELATED: How to Share a Hotel’s Single Wi-Fi Connection With All Your Devices
However, after you authenticate, you’re still using an open Wi-Fi network. The router allows you to access the Internet, but it doesn’t actually encrypt the network—it’s still open. This means your traffic can be snooped on.
How to Tell If You’re Vulnerable to Snooping
If you have to enter a password in your operating system, you’re more secure. For example, if you log into the Wi-Fi network by clicking it in Windows and you then have to enter a password before connecting, it’s encrypted. Look at the security information when connecting. If it’s a secure network, you’re more protected—if it’s an open network, you’re open to snooping.
However, despite the common wisdom, you can still have your traffic snooped on by other people connected to that hotel’s Wi-Fi network. We recommend using a VPN while on networks with other people you don’t trust.
RELATED: How to Connect to McDonald’s Free Wi-Fi
If you have to log into a completely open network without a password, and then your web browser pops up with a page that requires you to enter more information to access the Internet, you’re using an insecure, open Wi-Fi network.
For example, Windows 8.1 warns you about such open networks by displaying a caution icon over the Wi-Fi symbol and the statement “Other people might be able to see info you send over this network.”
How to Protect Yourself From Snooping on Hotel Wi-Fi
Snooping is the main danger from open Wi-Fi networks—especially ones in hotels and other public places where quite a few other people will be around. All your Internet traffic, aside from the encrypted traffic, is visible to anyone nearby who’s monitoring the data traveling over the air.
RELATED: Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites
For example, let’s say you’re browsing Wikipedia—people can see which articles you’re browsing. Most of the websites you’ll visit don’t use HTTPS, which means people can monitor which web pages you’re visiting and what you’re typing on them. Thankfully, most important websites with sensitive data should be using HTTPS by now, from Gmail to Facebook to your bank’s website.
To protect yourself from snooping, get a VPN and connect to it when browsing on public Wi-Fi networks. If you need a simple VPN for public Wi-Fi browsing, we recommend ExpressVPN or TunnelBear. Both offer a slick and simple interface–ExpressVPN has better speeds, but TunnelBear has a free option, so it’s great if you’re just getting started with VPNs. If you want more advanced options, StrongVPN is our pick for more savvy users.
RELATED: What Is a VPN, and Why Would I Need One?
VPNs like this function as encrypted tunnels—all your Internet traffic will be pushed through the VPN tunnel while you’re connected. So, if you connect to How-To Geek through a VPN, the remote VPN server connects to How-To Geek for you, and How-To Geek communicates with the VPN server. Your computer and the VPN server communicate via an entirely encrypted tunnel. This means no one in the hotel or anyone nearby can even see you’re accessing How-To Geek’s servers. The hotel’s Internet connection and anyone snooping on its Wi-Fi can only see an encrypted connection between your computer, smartphone, or tablet and a single VPN server.
Connect to a VPN whenever you have to use the Internet from an insecure hotel Wi-Fi network or any other open Wi-Fi network. Obviously, if you’re working from a hotel room and your place of work offers a VPN, you should probably use that VPN.
You could also use your smartphone’s Wi-Fi hotspot feature to tether your laptop to your smartphone, bypassing any open Wi-FI hotspots and creating an encrypted Wi-Fi network. The data will be sent over your smartphone’s mobile data connection, where it’s much less vulnerable to snooping.
This solution works, but it does use up some of your precious mobile data allowances. Depending on your carrier, you may also have to pay extra for tethering.
RELATED: How to Choose the Best VPN Service for Your Needs