Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
C0D4681385yYou can't until after you are connected.
Using a VPn will prevent 3rd parties watching Your traffic but you still have the issue of initial connection.
However if you have personal access details to the hotspot (email/pass) I would use a single use account for that. -
I'm confused. Your pic shows a http packet and your question is about hotspots..
Http -- tls
hotspots - industrial wpa2 [w/ certs]
public hotspots - why bother.. It's a fucking jungle, let them slay each other -
WPA2 Enterprise...
Unfortunately a but 'hard' to setup (client & AP) and many things can still go wrong. -
@R1100 You mean HTTP for that 'please login after connecting' captive portal?
TLS/HTTPS would be better, but attackers could still perform a downgrade attack (as the captive portal is opened as the router redirects an unencrypted page view / connection check). -
endor57515y@dudeking 1.1.1.1 is only a DNS supporting dnssec, it has nothing to do with the data transmitted between you and the server.
Also, a VPN would only encrypt the traffic between you and the VPN server. But if the remote server (of the resource you're connecting to doesn't use https or another secure method of transmission, any data from the VPN to the remote will still be unencrypted and visible to anyone in the middle.
Related Rants
What is this ?
U call this wireless security??
Anyway what is the best way of securing hotspots in the airports , hotels , ... ?
rant
:/
hotspot
insecure