Staying Safe and Secure in the Public WiFi Wilderness

With the apparent clamp-down on formerly liberal U.S. data quotas by mobile operators,public WiFi hotspots — like cafes — for daily Web consumption may become an evermore likely Internet environment for many of us.

Europeans have been used to limited mobile data quotas under various euphemismslike “fair use policies” and “data plans” for some time. It’s now time for NorthAmericans to hunker down, and figure alternatives to the mobile network, because we’reseeing the same thing in the U.S. this year.

Having recently used up my entire month’s allocation of mobile data in one eveningwatching television in a hotel — and then, adding insult to injury, being told by my mobile operator,that for “fair-use” reasons I was now restricted to Web browsing for the rest of the monthand couldn’t buy more data, I decided to explore alternatives.

My Options

One approach would be to purchase a broadband SIM card for each day of the month thatI was away from home and wanted to watch television. That could conceivably result inme acquiring and managing 31 SIM cards — ridiculous, even for me, a self-confessedphone nut.

The practical alternative, however, is public WiFi — the kind you find at coffee shops,airports and hotel lobbies.

I’ve written on how to go about finding and using public hotspots before. Here’s howto use them safely.

Look for HTTPS

Verify that sensitive websites that you’re using implement Secure Sockets Layer (SSL).Banking websites invariably use this protocol, called “SSL/TLS.”

You can identify an SSL secured website because the address bar in the browser will usethe “HTTPS” hypertext transfer protocol designation, rather than the “HTTP” protocol.The “S” refers to “Secure.”

HTTPS authenticates the website and encrypts the data. This restricts packet sniffingeavesdropping of the kind you can get in a public WiFi environment. All electronicspies will see is gibberish.

Virtual Private Networks

What if a site you are visiting — a Mom-and-Pop e-commerce site, forexample — doesn’t use SSL and you still want to protect yourself from eavesdroppers?

Use a Virtual Private Network (VPN).

VPNs create a tunnel through the Internet from your location to the destinationlocation, and everything in the tunnel is encrypted.

Step 1

Perform a Web-based search for a VPN. Open Source VPNs use codecalled “OpenVPN.” However, free services can restrict the amount of data that you canuse or bombard you with ads.

I’ve used a paid VPN with dedicated physical server and a shared IP address that costs afew dollars a month. This kind of solution is bandwidth-robust.

Step 2

Sign up for the account, and then follow the instructions to configure the VPN.

On a Windows machine, select “Network and Internet” and then “Network and SharingCenter” from the Control Panel. Choose “Set up a new connection or network” andthen “Connect to a workplace.”

Follow the wizard and enter the VPN account’s supplied IP Address, User ID andPassword. Check the account setup email for any network-specific configurationinstructions.

Step 3

Launch the VPN by selecting it from the network options in the Windows task bar. Thenopen a Web browser. Your traffic will be encrypted.Tips: For further housekeeping security, verify that the computer’s firewall is turned on. InWindows, the firewall control is accessed within the Control Panel under “System and Security.”

Turn off your WiFi radio when you’ve finished using it in a public WiFi environment. Most computers have a hardware switch for this. It’s the same switch you’d use on a plane for Flight Safe Mode.

Want to Ask a Tech Question?

Is there a piece of tech you’d like to know how to operate properly? Is there a gadget that’s got you confounded? Please send your tech questions to me, and I’ll try to answer as many as possible in this column.

And use the Talkback feature below to add your comments!

Patrick Nelson has been a professional writer since 1992. He was editor and publisher of the music industry trade publication Producer Report and has written for a number of technology blogs. Nelson studied design at Hornsey Art School and wrote the cult-classic novel Sprawlism. His introduction to technology was as a nomadic talent scout in the eighties, where regular scrabbling around under hotel room beds was necessary to connect modems with alligator clips to hotel telephone wiring to get a fax out. He tasted down and dirty technology, and never looked back.

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

How often do you update your passwords?
Loading ... Loading ...

E-commerce Times Channels