{"id":13857,"date":"2018-11-18T10:45:08","date_gmt":"2018-11-18T18:45:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/18\/news-7624\/"},"modified":"2018-11-18T10:45:08","modified_gmt":"2018-11-18T18:45:08","slug":"news-7624","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/18\/news-7624\/","title":{"rendered":"Using Airport and Hotel Wi-Fi Is Much Safer Than It Used to Be"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bef55be6f9680187f54acf6\/master\/pass\/hotel-wifi-543369698.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sun, 18 Nov 2018 12:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">As you travel <\/span>this holiday season, bouncing from airport to airplane to hotel, you\u2019ll likely find yourself facing a familiar quandary: Do I really trust this <a href=\"https:\/\/www.wired.com\/story\/public-wifi-safety-tips\/\">random public Wi-Fi network<\/a>? As recently as a couple of years ago, the answer was almost certainly a resounding no. But in the year of our lord 2018? Friend, go for it.<\/p>\n<p>This advice comes with plenty of qualifiers. If you\u2019re planning to commit crimes online at the Holiday Inn Express, or to visit websites that you\u2019d rather people not know you frequented, you need to take precautionary steps that we\u2019ll get to in a minute. Likewise, if you\u2019re a high-value target of a sophisticated nation state\u2014look at you!\u2014stay off of public Wi-Fi at all costs. (Also, you\u2019ve probably already been <a href=\"https:\/\/www.wired.com\/story\/trump-iphone-security-risk\/\">hacked some other way<\/a>, sorry.)<\/p>\n<p class=\"paywall\">But for the rest of us? You\u2019re probably OK. That\u2019s not because hotel and airport Wi-Fi networks have necessarily gotten that much more secure. The web itself has.<\/p>\n<p class=\"paywall\">\u201cA lot of the former risks, the reasons we used to warn people, those things are gone now,\u201d says Chet Wisniewski, principle researcher at security firm Sophos. \u201cIt used to be because almost nothing on the internet was encrypted. You could sit there and sniff everything. Or someone could set up a rogue access point and pretend to be Hilton, and then you would connect to them instead of the hotel.\u201d<\/p>\n<p class=\"paywall\">In those Wild West days, in other words, signing onto a shared Wi-Fi network exposed you to myriad attacks, from hackers tracking your every move online, to so-called man-in-the-middle efforts that tricked you into entering your passwords, credit card information, or more on phony websites. A cheap, easy to use device called <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/pa39xv\/pineapple-wifi-how-to-mitm-hack\" target=\"_blank\">a Wi-Fi Pineapple<\/a> makes those attacks simple to pull off.<\/p>\n<p class=\"paywall\">All of that&#x27;s still technically possible. But a critical internet evolution has made those efforts much less effective: the advent of HTTPS.<\/p>\n<p class=\"paywall\">Look at the URL bar in your browser. Do you see that little lock symbol on the left? That means that traffic on this site is encrypted in transit from WIRED\u2019s servers to your browser and back. That encryption is enabled by what\u2019s knowns as Hypertext Transfer Protocol, with the \u2018S\u2019 standing for Secure. The most important thing to know about HTTPS, though, is that it obviates most of the attacks that (rightly) scared you off of public Wi-Fi in the first place.<\/p>\n<p class=\"paywall\">\u201cIf you\u2019re in the US, the web is pretty well encrypted. It\u2019s unusual to go to a website that matters and it\u2019s not HTTPS,\u201d says Tod Beardsley, director of research at security firm Rapid7. \u201cBecause of that, the threat, and really the risk, of going on even sketchy local Wi-Fi has dramatically dropped.\u201d<\/p>\n<p>&quot;A lot of the former risks, the reasons we used to warn people, those things are gone now.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Chet Wisniewski, Sophos<\/p>\n<p class=\"paywall\">Just how dramatically? Consider that as recently as March 2016, only <a href=\"https:\/\/www.wired.com\/2016\/03\/https-adoption-google-report\/\">21 of the web\u2019s top 100 sites<\/a> used HTTPS by default. Today, that number has flipped. Seventy of the <a href=\"https:\/\/transparencyreport.google.com\/https\/top-sites\" target=\"_blank\">top 100 sites<\/a> have HTTPS switched on by default, with nine more offering HTTPS compatibility. Many of the holdouts are based in China. As of January 2017, <a href=\"https:\/\/transparencyreport.google.com\/https\/top-sites\" target=\"_blank\">more than half of the web<\/a> was encrypted. Today, about <a href=\"https:\/\/letsencrypt.org\/stats\/\" target=\"_blank\">84 percent of websites<\/a> loaded through Firefox have HTTPS enabled. And yes, <a href=\"https:\/\/www.wired.com\/2017\/03\/pornhub-https-encryption\/\">that includes porn<\/a>.<\/p>\n<p class=\"paywall\">HTTPS has some arguable drawbacks. Mainly, there\u2019s virtually no barrier to getting HTTPS certification, which has <a href=\"https:\/\/www.wired.com\/story\/fortnite-scams-even-worse-than-you-thought\/\">made it attractive for criminal groups<\/a> hoping to add an air of authenticity to bogus sites. That little green padlock guarantees that you\u2019re sending data encrypted, but not that the person on the receiving end has scruples.<\/p>\n<p class=\"paywall\">But that has nothing to do with hotel or airport Wi-Fi. You can fall for those scams no matter how you\u2019ve connected to the internet. And using that approach to target those specific locations hardly seems worth it in practice.<\/p>\n<p class=\"paywall\">\u201cYou\u2019d have to get a soundalike domain name, register that, then get an encryption certificate, then get someone to go to your site,\u201d says Beardsley. \u201cI don\u2019t know how successful an attack would be to set up my rogue Wi-Fi, wait for people to mistype a URL, and come to my fake bank site. I\u2019m not super sure that\u2019s a very valuable attack. You\u2019re going to be waiting a long time for that typo.\u201d Especially given another, slightly less recent change in how we use the web: So few people actively type URLS that <a href=\"https:\/\/www.wired.com\/story\/google-wants-to-kill-the-url\/\">Google has considered doing away with them<\/a> altogether.<\/p>\n<p class=\"paywall\">It helps to think through how other attacks might play out in practice as well, especially as caveats come into play. In addition to phony sites, there\u2019s the concern that someone else on your network might be \u201csniffing\u201d your browsing activity, the internet version of eavesdropping. They can still try, but HTTPS means that they can\u2019t see what individual pages you\u2019re visiting, just the domains. Someone could figure out you\u2019re on Netflix, in other words, but not which movie you\u2019re watching. Or they might know you\u2019re on Bank of America\u2019s site, but wouldn\u2019t be able to see any of your identifying details. It\u2019s the difference between observing a conversation from far across the street, and having it bugged.<\/p>\n<p class=\"paywall\">You can easily imagine cases where that\u2019s not still ideal. You may not want anyone to know that you\u2019re visiting sites of a sensitive nature, regardless of what specifically you\u2019re looking at while you\u2019re there. And if you visit a site that has no HTTPS, all of those protections go out the window. But criminals have much more lucrative methods of attack these days\u2014you don\u2019t need hotel or airport Wi-Fi for searphishing or cryptomining\u2014making hotels and airports that much less appealing of a target.<\/p>\n<p class=\"paywall\">\u201cI\u2019m telling people to enjoy public Wi-Fi, whether they\u2019re at Macy\u2019s for Christmas shopping or at the Hilton,\u201d says Wisniewski. \u201cWhat\u2019s in it for the adversary? Why would you choose monkeying with the Wi-Fi at the airport or the hotel over some other attack method? When you look at the profitability and the risk, it just doesn\u2019t make sense other than an amateur to be doing it for giggles.\u201d<\/p>\n<p class=\"paywall\">It\u2019s totally understandable if you still have concerns. Maybe you visit a lot of unencrypted sites, or don\u2019t want a hotel chain to have even domain-level insight into your browsing. Or maybe you\u2019re a journalist, or an aerospace executive, or a politician, or someone else <a href=\"https:\/\/www.wired.com\/story\/russian-spies-indictment-hotel-wi-fi-hacking\/\">the GRU or Chinese intelligence agencies might put in their crosshairs<\/a>. Or maybe you\u2019ve just got a vestigial mistrust that you can\u2019t shake.<\/p>\n<p>&quot;The threat, and really the risk, of going on even sketchy local Wi-Fi has dramatically dropped.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Tod Beardsley, Rapid7<\/p>\n<p class=\"paywall\">That\u2019s fine! Whatever the case, there are plenty of <a href=\"https:\/\/www.wired.com\/story\/public-wifi-safety-tips\/\">things you can do to protect yourself<\/a>, starting with using a virtual private network. A <a href=\"https:\/\/www.wired.com\/2017\/03\/want-use-vpn-protect-privacy-start\/\">VPN sends all of your traffic through an encrypted connection<\/a>, meaning that the hotel or anyone else can\u2019t see where you\u2019ve been or what you\u2019re doing. Well, almost anyone else; the VPN provider potentially could, so use one you trust.<\/p>\n<p class=\"paywall\">Even better than a VPN, especially if you have an unlimited data plan: Use your smartphone as a hotspot. \u201cThere aren\u2019t any published exploits that are useful over LTE. If you\u2019re really worried about it, tether up your phone,\u201d says Beardsley. \u201cThat\u2019ll get you a long way.\u201d<\/p>\n<p class=\"paywall\">But if those don\u2019t apply to you; if you\u2019re just hopping on Facebook and Amazon, or looking up good nearby restaurants on Yelp? Use the Wi-Fi at the hotel. It might not have your security interests at heart, but more than ever, the web itself does.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hotel-airport-wifi-safe\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bef55be6f9680187f54acf6\/master\/pass\/hotel-wifi-543369698.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sun, 18 Nov 2018 12:00:00 +0000<\/strong><\/p>\n<p>You were right not to trust hotel and airport Wi-Fi a few years ago. But these days, it&#8217;s (probably) fine. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13857","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13857"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13857\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13857"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}