paint-brush
Public WiFi Might Finally Become Secure After Allby@utsavjaiswal
2,021 reads
2,021 reads

Public WiFi Might Finally Become Secure After All

by Utsav JaiswalOctober 9th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Public WiFi has become ubiquitous due to a growing consumer demand for always-on connectivity. While 4G and 5G connections are rising in number, nothing beats the stability and speed of WiFi internet.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Public WiFi Might Finally Become Secure After All
Utsav Jaiswal HackerNoon profile picture

Public WiFi has become ubiquitous due to a growing consumer demand for always-on connectivity. While 4G and 5G connections are rising in number, nothing beats the stability and speed of WiFi internet.

Unfortunately, hackers know this as well, and most public WiFi hotspots are routinely compromised by malicious actors aiming to capture personally identifiable information (PII) for misuse.

This raises the twin concerns of security and privacy when using Public WiFi, which have yet to be answered by security experts. The most common advice given by these experts is to avoid connecting to public WiFi altogether.

While this will, of course, solve the problem, it merely sidesteps the discussion at the cost of convenience.

Turn Off your WiFi — NOW

Even if you’re never connected to a public network but your WiFi chip is turned on, you are still open to getting hacked. This is because WiFi chips intermittently broadcast connection requests to all nearby WiFi routers. A compromised network can allow anybody to sit in between the router and the computer system to read, edit, and relay any information.

(Source: sdtechi)

Thus the best security advice available at the moment is to keep your WiFi completely switched off at all times, just in case a compromised public network comes in the range of your computer system or mobile device.

If that’s not inconvenient then nothing is!

For other services, such as social media, users are willing to forego disadvantages to continue enjoying the convenience.

To demonstrate this, look no further than Facebook and Google.

They mine and process our personal data by the terabytes but most consumers don’t bat an eyelid because:

  1. Most users don’t realize these companies mine our browsing data behind the scenes
  2. Consumers trust these companies because they are large, regulated multinationals
  3. Facebook and Google add a huge degree of convenience to our lives and we accept the disadvantages that go with it

For WiFi, however, the problem is somewhat different, as the disadvantages are much more severe, as breaches of security and privacy by malicious actors can have disastrous consequences such as theft, fraud or reputational damage. Here users value the convenience as well of course, but not at any cost!

I can’t turn off WiFi forever. What should I do?

You should have a look at the following best practices to secure your Internet device:

1. Force HTTPS

The HTTPS protocol is a secure protocol that ensures the security and privacy of all communications within the protocol on the browser. To force automatic HTTPS connections, follow these steps on the chrome browser.

Enable Google Chrome support by typing chrome://net-internals/ into your address bar, then select HSTS from the drop-down menu. HSTS is HTTPS Strict Transport Security, a way for websites to elect to always use HTTPS.

2. Turn off Sharing

Media sharing is enabled by default on most computer systems for faster transfer of data between people connected on the same network. This is helpful for home networks where you might want to quickly share a file with a family member.

Statistically, most of us spend more time outside our house than inside, though, which means that sharing can be turned off safely without much impact on convenience.

3. Invest in a Good VPN

Virtual Private Networks are distant servers that allow you to route your data through various geographies before it reaches its destination. Naturally, low latency is desirable in such cases.

While some VPNs allow free access to throttled down internet speeds, you can pay a small fee to unlock the faster plans.

The only downside to using VPNs is the fact that your data trail will be visible to the VPN controller. This means that unscrupulous VPNs can collect user data without the user’s knowledge. However, despite the technical flaws, people pay their hard earned money to VPNs for data privacy.

Is there no better solution out there?

Actually, there is, if we were to believe Valley-based entrepreneur Suruchi Gupta. Her team is developing Wificoin, a crypto-project aimed to solve this very issue. They plan to:

  1. Incentivize people to share their WiFi and thereby monetize unused bandwidth
  2. Secure public hotspots by creating separate encrypted channels for connections
  3. Create a seamless and automatic surfing experience, without the need for usernames, passwords or agreeing to terms and conditions. The only requirement is to install an app once and for all

Their protocol leverages blockchain and a proprietary technology protocol to enable simple and secure sharing of WiFi. Anybody who adds their WiFi hotspot to the Wificoin network will earn a passive stream of income.

For example, if you share your Internet connection via their protocol, any user can securely and privately connect to the Internet and pay you a small fee for the bandwidth.

While the host is incentivized to share, the consumer gets access to the reliable Internet on the go. Win-win! The premise of the company is based on the sharing economy, the concept pioneered by companies like Airbnb and Uber. In the blockchain space, another project that taps into the idea of the sharing economy is Filecoin, which raised over $250 million for a plan to tokenize our unused storage space.

(Source:Newsclick)

All in all, we are in for exciting days ahead, thanks to the innovations served daily by the rise of decentralized applications of Blockchain.