SecurityApril 11, 20269 min read

How to Safely Use Public Wi-Fi

SC

By Sarah Chen

Head of Privacy Research

How to Safely Use Public Wi-Fi

Public Wi-Fi is everywhere — coffee shops, airports, hotels, libraries, co-working spaces. It's also one of the most common places people accidentally expose their personal data. The good news is that protecting yourself on public Wi-Fi in 2026 is easier than it used to be, if you follow a few simple rules. Here's everything you need to know.

Is Public Wi-Fi Actually Dangerous in 2026?

The risks of public Wi-Fi have changed over the last decade. Most websites now use HTTPS by default, which encrypts the content of your traffic even on insecure networks. That eliminates the classic coffee-shop snooping attack where someone with basic tools could see everything you typed into a login form.

But public Wi-Fi still has real risks:

  • Evil twin networks — fake access points that mimic the name of the legitimate one
  • Man-in-the-middle attacks — an attacker on the same network intercepts your traffic
  • Malicious captive portals — the sign-in page prompts you to install certificates or software that give the attacker access to your device
  • Network snooping — even with HTTPS, observers can still see which sites you visit (via DNS and SNI leaks)
  • Unpatched devices — an attacker on the same network can exploit vulnerabilities in your phone or laptop
  • Shoulder surfing — the old-fashioned risk of someone watching your screen

Rules for Safer Public Wi-Fi

1. Verify the Network Name

Before connecting, ask a staff member what the official Wi-Fi network is called. Don't connect to networks that look legitimate but might not be — "Free_Starbucks_WiFi" is probably not run by Starbucks. Attackers commonly set up fake networks with names designed to fool tired travelers and coffee drinkers.

2. Use a VPN

A VPN creates an encrypted tunnel from your device to a trusted server, hiding your traffic from everyone else on the local network. Even on an evil-twin network, a good VPN protects your data. Install your VPN before you need it — many public networks will let you connect only to the VPN server, preventing you from downloading software on the spot.

Look for VPNs with:

  • A no-logs policy audited by an independent third party
  • Strong encryption (WireGuard or OpenVPN protocols)
  • A kill switch that blocks traffic if the VPN drops
  • Reliable performance in the countries you use most

3. Prefer Cellular or Tethering When Possible

Your phone's cellular data is almost always safer than public Wi-Fi because it's encrypted between your phone and the carrier and because cellular networks are much harder to impersonate than Wi-Fi. If you have enough data, tether your laptop to your phone instead of joining a public network at all.

4. Turn Off Sharing and AirDrop

On macOS, go to System Settings → General → Sharing and disable file sharing, screen sharing, and printer sharing before joining a public network. On Windows, set the network to "Public" when prompted so that Windows automatically disables sharing. On iPhone, set AirDrop to "Contacts Only" or "Receiving Off" in public places.

5. Forget the Network When You're Done

Phones remember Wi-Fi networks and will auto-join them again in the future. That's convenient, but it also means a malicious network with the same name elsewhere can trap your device. Forget public networks after you use them.

6. Update Your Device Before You Travel

Many network attacks exploit known vulnerabilities in operating systems or browsers. Keeping everything updated dramatically reduces your attack surface. Run updates on every device before a trip.

HTTPS Is Not a VPN Substitute

HTTPS encrypts the content of your traffic, but it doesn't hide which websites you're visiting. An observer on the same network can still see that you connected to yourbank.com even if they can't see your login credentials. A VPN hides both the content and the destination from the local network.

What Not to Do on Public Wi-Fi

  • Don't install certificates prompted by captive portals. A legitimate coffee-shop network will never ask you to install a root certificate. If you see that prompt, disconnect.
  • Don't accept security warnings. If your browser warns about an invalid certificate on a public network, close the tab. Don't click through the warning.
  • Don't log into sensitive accounts without a VPN. Banking, tax software, and health portals can wait until you're on a trusted network or your VPN is active.
  • Don't leave your laptop unattended. The most effective network attack is simply walking away from your device while logged in.

Watch Out for Fake Captive Portals

Some attackers set up fake sign-in pages that look like the real hotel or airport portal but actually harvest credit card numbers or credentials. If a public network asks for personal information beyond what a captive portal reasonably needs, treat it as a scam.

Hotel Wi-Fi Deserves Extra Caution

Hotel networks have a particularly bad track record for security. They're often poorly maintained, shared with hundreds of guests, and a repeated target of attackers who know business travelers and executives routinely use them. Treat hotel Wi-Fi like the least trustworthy network you use all year. Always use a VPN. Never rely solely on HTTPS.

What About Coffee Shop Wi-Fi for Everyday Use?

For regular work on familiar coffee shop Wi-Fi, the risks are relatively low — most of your traffic is encrypted, the network operator is reputable, and attackers are uncommon. Still, use a VPN when you can, be cautious about logging into sensitive accounts, and follow basic network hygiene. The minor inconvenience is worth the peace of mind.

Protect Your Broader Privacy Footprint Too

Network safety is only one layer of privacy. Even if you never touch public Wi-Fi again, data brokers still publish your home address, phone number, and relatives for anyone to look up. That's often what attackers use to target you in the first place — they know who you are before they ever get on your network. PrivacyOn automates opt-outs across more than 100 data brokers and monitors them continuously, reducing the information a remote attacker has to work with. Combined with good Wi-Fi habits, it's a comprehensive approach to modern privacy.

Quick Public Wi-Fi Checklist

  1. Verify the network name before connecting
  2. Turn on your VPN
  3. Disable file sharing and AirDrop
  4. Keep your device updated
  5. Don't install certificates or click through security warnings
  6. Prefer cellular or tethering for sensitive tasks
  7. Forget the network when you leave

The Bottom Line

Public Wi-Fi isn't the nightmare it was a decade ago, but it still deserves caution. With a VPN, good habits, and an updated device, you can safely work from almost any coffee shop or airport. Take privacy seriously at the network level and at the broader data level, and you'll stay ahead of the threats that actually matter in 2026.

SC
Sarah Chen

Head of Privacy Research

CIPP/US CertifiedIAPP MemberB.S. Computer Science

CIPP/US-certified privacy researcher with over a decade of experience helping consumers remove their personal information from data brokers.

Ready to Protect Your Privacy?

Let PrivacyOn automatically remove your personal information from data broker sites and keep it removed.