public_wi-fi
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
public_wi-fi [2019/08/04 16:58] – neil | public_wi-fi [2021/07/06 09:26] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
=====Using public Wi-Fi===== | =====Using public Wi-Fi===== | ||
It can often be convenient to connect to public Wi-Fi. But bear in mind that you are connecting to a fundamentally untrusted third party network. | It can often be convenient to connect to public Wi-Fi. But bear in mind that you are connecting to a fundamentally untrusted third party network. | ||
- | ====Key | + | ====Key |
- | * [[#Provide fake details where you can|provide | + | * [[#Provide fake details where you can|Provide |
- | * [[#If you have to give an email address, using a unique one|if you have to give an email address, give a unique one]]Â | + | * [[#If you have to give an email address, using a unique one|If you have to give an email address, give a unique one]]Â |
- | * [[# | + | * [[# |
- | * [[#Run a VPN over the connection, as soon as you can|run a VPN over the connection, as soon as you can, or use Tor]]Â | + | * [[#Run a VPN over the connection, as soon as you can|Run a VPN over the connection, as soon as you can, or use Tor]]Â |
- | * [[#Tethering|if in doubt, don't connect: tether your phone instead]] | + | * [[#Connect using your phone instead|If in doubt, don't connect: tether your phone instead]] |
====Provide fake details where you can==== | ====Provide fake details where you can==== | ||
You'll often be asked for your title, name, and possibly even your address or other irrelevant information. | You'll often be asked for your title, name, and possibly even your address or other irrelevant information. | ||
- | There' | + | If you can get away with giving fake details (i.e. you can be comfortable that you are not committing an offence, such as fraud), it might be sensible to do so. |
- | Â | + | |
- | If you can get away with giving fake details (i.e. you can be comfortable that you are no committing an offence, such as fraud), it might be sensible to do so. | + | |
(Alternatively, | (Alternatively, | ||
====If you have to give an email address, using a unique one ==== | ====If you have to give an email address, using a unique one ==== | ||
- | If you need to sign up with an email address, use a [[unique_email_addresses|unique email address]] for that service. | + | If you need to sign up with an email address, use a [[passwords# |
Line 27: | Line 25: | ||
So even if you see a network called “Starbucks”, | So even if you see a network called “Starbucks”, | ||
- | If you permit your device to connect automatically to known networks, may connect to a rogue network, and start sending data over to an unknown third party before you even realise it. | + | If you permit your device to connect automatically to known networks, |
When you join a network, your operating system may prompt you to say if you want to " | When you join a network, your operating system may prompt you to say if you want to " | ||
Line 38: | Line 36: | ||
If you do want to use the Wi-Fi, run a [[virtual_private_networks|VPN session]] over it. Or you could use [[tor|Tor]]. | If you do want to use the Wi-Fi, run a [[virtual_private_networks|VPN session]] over it. Or you could use [[tor|Tor]]. | ||
- | Some Wi-Fi networks block VPNs, and some block Tor. In those cases, don't use that Wi-Fi network — why would you want to trust a network which is trying to stop you operating securely? Consider tethering instead. | + | Some Wi-Fi networks block VPNs, and some block Tor. In those cases, don't use that Wi-Fi network — why would you want to trust a network which is trying to stop you operating securely? Consider |
===Wi-Fi which requires a login may not work if you use a VPN=== | ===Wi-Fi which requires a login may not work if you use a VPN=== | ||
Line 47: | Line 45: | ||
The best approach is to avoid these hotspots. | The best approach is to avoid these hotspots. | ||
- | ====Tethering==== | + | ====Connect using your phone instead====Â |
+ | Â | ||
+ | If you do not trust the network less than you trust your mobile network operator, you may be better off connecting your computer to the Internet via your phone' | ||
+ | Â | ||
+ | You might want to run a [[virtual_private_networks|VPN]], | ||
+ | Â | ||
+ | You can normally tether via a USB cable, or else over Wi-Fi or Bluetooth. Using Wi-Fi or Bluetooth has the advantage that you can leave your phone in your pocket, but it comes at the cost of draining your // | ||
+ | Â | ||
+ | ===Tethering on iOS === | ||
- | If you do not trust the network, you may be better off connecting your computer to the Internet via your phone. This is known as " | + | If you use an iPhone or iPad, rather than calling it " |
- | In the EU, this should not cost extra and it should come out of your data bundle (thanks to our net neutrality laws), but you might want to check with your mobile provider. | + | Guidance for setting |
- | This requires you to trust your mobile phone provider more than the (potentially rogue) Wi-Fi hotspot operator. | ||
- | You might want to run a VPN, or use Tor, over the top of your mobile connection anyway. |
public_wi-fi.1564937886.txt.gz · Last modified: 2021/07/06 09:26 (external edit)