Hotel Wi-FI networks are often completely open, requiring only a room number, code, or click-through to access the Internet. This lack of real encryption means your Internet usage is vulnerable to snooping from others sharing the network.
Wi-Fi networks like the ones in use at most hotels aren’t private. The login process just lets the hotel limit access to the Internet. It doesn’t keep your Internet activity private.
Open Wi-Fi Networks Allow Anyone Nearby to Snoop
Open Wi-Fi networks—that is, Wi-Fi networks anyone can connect to without entering a passphrase—are open to snooping. Because these networks aren’t secured with encryption, all data sent over them is sent in “plain text.” Anyone nearby can snoop on the traffic—unless, of course, you’re connected to a secure, HTTPS-encrypted website. All it takes is a tool like Wireshark.
Your neighbors in the hotel could snoop on your web activity. If you’re using an open Wi-Fi network at an airport or in a coffee shop, people nearby can also snoop on you there.
Captive Portals Only Limit Access to the Internet
If you connect to an open Wi-Fi network and then see a page with information about the hotel and have to enter a room number or another password to connect, you may think you’re connected to a secure network.
In a sense, you are—the hotel’s “captive portal” prevents you from accessing the Internet until you authenticate yourself. It also allows the hotel to limit the number of devices that can access the Internet—but you can share that single hotel Wi-Fi connection with multiple devices.
However, after you authenticate, you’re still using an open Wi-Fi network. The router allows you to access the Internet, but it doesn’t actually encrypt the network—it’s still open. This means your traffic can be snooped on.
How to Tell If You’re Vulnerable to Snooping
If you have to enter a password in your operating system, you’re more secure. For example, if you log into the Wi-Fi network by clicking it in Windows and you then have to enter a password before connecting, it’s encrypted. Look at the security information when connecting. If it’s a secure network, you’re more protected—if it’s an open network, you’re open to snooping.
However, despite the common wisdom, you can still have your traffic snooped on by other people connected to that hotel’s Wi-Fi network. We recommend using a VPN while on networks with other people you don’t trust.
If you have to log into a completely open network without a password, and then your web browser pops up with a page that requires you to enter more information to access the Internet, you’re using an insecure, open Wi-Fi network.
For example, Windows 8.1 warns you about such open networks by displaying a caution icon over the Wi-Fi symbol and the statement “Other people might be able to see info you send over this network.”
How to Protect Yourself From Snooping on Hotel Wi-Fi
Snooping is the main danger from open Wi-Fi networks—especially ones in hotels and other public places where quite a few other people will be around. All your Internet traffic, aside from the encrypted traffic, is visible to anyone nearby who’s monitoring the data traveling over the air.
For example, let’s say you’re browsing Wikipedia—people can see which articles you’re browsing. Most of the websites you’ll visit don’t use HTTPS, which means people can monitor which web pages you’re visiting and what you’re typing on them. Thankfully, most important websites with sensitive data should be using HTTPS by now, from Gmail to Facebook to your bank’s website.
To protect yourself from snooping, get a VPN and connect to it when browsing on public Wi-Fi networks. If you need a simple VPN for public Wi-Fi browsing, we recommend ExpressVPN or TunnelBear. Both offer a slick and simple interface–ExpressVPN has better speeds, but TunnelBear has a free option, so it’s great if you’re just getting started with VPNs. If you want more advanced options, StrongVPN is our pick for more savvy users.
VPNs like this function as encrypted tunnels—all your Internet traffic will be pushed through the VPN tunnel while you’re connected. So, if you connect to How-To Geek through a VPN, the remote VPN server connects to How-To Geek for you, and How-To Geek communicates with the VPN server. Your computer and the VPN server communicate via an entirely encrypted tunnel. This means no one in the hotel or anyone nearby can even see you’re accessing How-To Geek’s servers. The hotel’s Internet connection and anyone snooping on its Wi-Fi can only see an encrypted connection between your computer, smartphone, or tablet and a single VPN server.
Connect to a VPN whenever you have to use the Internet from an insecure hotel Wi-Fi network or any other open Wi-Fi network. Obviously, if you’re working from a hotel room and your place of work offers a VPN, you should probably use that VPN.
You could also use your smartphone’s Wi-Fi hotspot feature to tether your laptop to your smartphone, bypassing any open Wi-FI hotspots and creating an encrypted Wi-Fi network. The data will be sent over your smartphone’s mobile data connection, where it’s much less vulnerable to snooping.
This solution works, but it does use up some of your precious mobile data allowances. Depending on your carrier, you may also have to pay extra for tethering.
- › How to Get Rid of Avira’s Notifications, Sounds, and Bundled Software
- › How to Set Up Your Own Home VPN Server
- › What Is WPA3, and When Will I Get It On My Wi-Fi?
- › How to Get Rid of Kaspersky’s Notifications, Sounds, and Bundled Software
- › How DNS Over HTTPS (DoH) Will Boost Privacy Online
- › The Best (Actually Useful) Tech We Saw at CES 2018
- › What Is “Mixed Content,” and Why Is Chrome Blocking It?
- › Victrola Music Edition 2 Review: A Stylish Bluetooth Speaker With a Few Twists