Privacy GuideMay 20, 20267 min read

How to Protect Your Privacy When Using Public Computers

SC

By Sarah Chen

Head of Privacy Research

How to Protect Your Privacy When Using Public Computers

Public computers at libraries, hotel business centers, airports, and internet cafes provide convenient access when you need it most. But every session on a shared machine is a privacy gamble. From hidden keyloggers to saved login credentials, public computers can expose your most sensitive information to the next person who sits down. Here is how to protect yourself.

Why Public Computers Are Risky

Unlike your personal device, a public computer is used by dozens or even hundreds of people each day. You have no control over what software is installed, whether the system has been updated, or whether someone has tampered with the hardware. That lack of control creates several serious risks.

Keyloggers

Keyloggers are programs or hardware devices that record every keystroke you type. Software keyloggers can be installed by a previous user in minutes, and hardware keyloggers can be plugged between the keyboard cable and the computer where most people would never notice them. Since keyloggers capture your input before it is encrypted by any website, even banking sites with HTTPS cannot protect you. If a keylogger is present, every username, password, credit card number, and private message you type is recorded and available to the attacker.

Saved Credentials and Browser Data

Modern browsers are designed for convenience. They offer to save your passwords, autofill your personal details, and keep you logged in across sessions. On a public computer, these helpful features become serious vulnerabilities. If you forget to log out or accidentally click "Remember me," the next user can walk straight into your email, social media, or bank account.

Browsing History and Cached Files

Even after you close a browser tab, your activity may leave traces. Downloaded files, cached web pages, cookies, and browsing history can all persist on the machine unless explicitly cleared. Some public computers use software like Deep Freeze to reset between sessions, but many do not.

Shoulder Surfing

Public settings mean other people are nearby. Shoulder surfing, where someone watches your screen or keyboard to capture sensitive information, is a low-tech but effective attack. It is especially common in crowded libraries, airports, and open coworking spaces.

Warning: You Cannot Verify a Public Computer Is Safe

There is no reliable way to confirm that a public computer is free of keyloggers, spyware, or other monitoring software. Antivirus programs may not be up to date, and hardware keyloggers are invisible to software scans entirely. Always assume the machine could be compromised and act accordingly.

Essential Safety Practices

1. Use Private or Incognito Browsing Mode

Before doing anything else, open a private or incognito browser window. This mode prevents the browser from saving your history, cookies, form data, and login credentials after you close the window. In Chrome, press Ctrl+Shift+N. In Firefox, press Ctrl+Shift+P. While this does not protect against keyloggers, it significantly reduces the digital traces you leave behind.

2. Never Save Passwords or Check "Remember Me"

If a website or browser prompts you to save your password, always decline. Uncheck any "Remember me" or "Keep me signed in" boxes on login pages. A single saved credential on a public machine can give a stranger full access to your account.

3. Log Out of Every Account

When you are finished, log out of every service you used. Do not simply close the browser tab, because that often does not end your session. Go to each site's account menu and click the explicit Log Out or Sign Out option. Check for active sessions on critical services like email and banking and revoke anything unfamiliar.

4. Avoid Sensitive Transactions

If at all possible, do not access your bank account, enter credit card information, or log into financial services on a public computer. If a keylogger is present, this information will be captured regardless of how careful you are with browser settings. Save these tasks for your personal device on a trusted network.

5. Use Two-Factor Authentication

Two-factor authentication (2FA) adds a second layer of security beyond your password. Even if someone captures your password via a keylogger or saved credentials, they cannot access your account without the second factor, which is typically a code sent to your phone or generated by an authenticator app. Enable 2FA on every account that supports it, especially email, banking, and social media.

6. Clear Browser Data Before Leaving

Before you walk away, manually clear the browser's history, cookies, cached files, and download history. In most browsers, you can do this through Settings > Privacy > Clear Browsing Data or by pressing Ctrl+Shift+Delete. Select "All time" as the time range and check every box. This is a safety net in case private browsing was not used or did not cover everything.

7. Watch for Physical Tampering

Before you start typing, glance at the keyboard connection. Hardware keyloggers are small devices that sit between the keyboard plug and the computer's USB port. If you see an unfamiliar device attached to the keyboard cable, do not use that machine. Also position yourself so that your screen and keyboard are not easily visible to people behind or beside you.

8. Use a Portable Browser or USB Drive

For frequent public computer users, consider carrying a USB drive with a portable browser like Firefox Portable or Tails. Running a browser from your own drive means your session data stays on the USB, not on the shared machine. Just remember to safely eject the drive when you are done.

Quick Checklist Before You Leave a Public Computer

Before walking away from any public computer, verify these steps: (1) Log out of all accounts. (2) Close all browser windows. (3) Clear browsing data, cookies, and downloads. (4) Check that no files you downloaded remain on the desktop or in the downloads folder. (5) Delete any files you may have saved or printed. Following this routine every time prevents the vast majority of accidental data exposure.

Reduce Your Exposure Before You Ever Sit Down

The best defense against public computer risks starts long before you touch a shared keyboard. If your personal information, including your name, address, phone number, email, and family details, is already available on data broker sites and people search engines, a compromised session on a public computer gives attackers the missing pieces they need to commit identity theft or take over your accounts.

PrivacyOn reduces this risk by removing your personal data from over 100 data broker sites and continuously monitoring for re-exposure. When your information is not publicly available, even a compromised login attempt has far less context for an attacker to exploit. Fewer data points available about you means less opportunity for fraud, phishing, or social engineering attacks that often follow a public computer breach.

Think of it this way: a stolen password is dangerous, but a stolen password combined with your home address, phone number, date of birth, and family member names is catastrophic. PrivacyOn helps ensure that second layer of personal data is not sitting in the open waiting to be combined with whatever a public computer session might leak.

When You Have No Choice But to Use a Public Computer

Sometimes you have no alternative. If you must use a public computer for something sensitive, follow these additional precautions:

  • Change your passwords afterward. As soon as you get to a trusted device, change the passwords for any accounts you logged into on the public machine.
  • Check your account activity. Look for unrecognized logins or suspicious activity on your email and financial accounts.
  • Use one-time passwords when possible. Some services offer temporary or one-time passwords that expire after a single use, which eliminates the risk of a captured password being reused.
  • Consider a VPN. If the public computer allows you to install or run software from a USB drive, use a VPN to encrypt your internet traffic and prevent network-level snooping.

Public computers will always carry inherent risk, but by combining smart habits with proactive data protection through services like PrivacyOn, you can significantly reduce the chance that a shared machine becomes the gateway to your personal information.

SC
Sarah Chen

Head of Privacy Research

CIPP/US CertifiedIAPP MemberB.S. Computer Science

CIPP/US-certified privacy researcher with over a decade of experience helping consumers remove their personal information from data brokers.

Ready to Protect Your Privacy?

Let PrivacyOn automatically remove your personal information from data broker sites and keep it removed.