✅ A VPN does: - Encrypts your connection between your device and the VPN server - Hides your browsing activity and DNS requests from local network snoops - Protects your login credentials from packet sniffing - Masks your real IP address from the websites you visit
❌ A VPN doesn't: - Protect your device from malware or viruses - Stop you from falling for phishing scams - Fix poor password hygiene or secure compromised accounts - Encrypt data end-to-end across the entire internet
Connecting to public Wi-Fi at a coffee shop, airport, or hotel is convenient. It is also inherently risky. When you join an open network, you are sharing a connection with strangers, and without the right protection, your data is exposed.
You might assume that because a website uses HTTPS, you are safe. While HTTPS encrypts the content of your communication, it does not hide the metadata—meaning anyone on the network can still see which websites you are visiting. To truly protect your connection on public Wi-Fi, you need to understand the threats and how to mitigate them.
The primary danger of public Wi-Fi is the lack of network-level encryption. When you connect to your home Wi-Fi, the connection is typically secured with WPA2 or WPA3 encryption, meaning a password is required to join and traffic is encrypted over the air.
Public networks, especially open ones that do not require a password, lack this protection. Your data is transmitted in the clear. Anyone with basic software and a wireless network adapter can intercept the traffic flowing through the airwaves.
Even if a public network requires a password (like a café where the password is on the receipt), the risk remains. Because everyone on the network shares the same password, the encryption keys can be derived by anyone else on the network, allowing them to decrypt and view your traffic.
Furthermore, while HTTPS is standard across most of the web today, it is not a complete solution. HTTPS encrypts the payload—the actual data you send and receive—but it leaves the Server Name Indication (SNI) and DNS requests unencrypted. This means an attacker cannot see your password, but they can see exactly which bank or email provider you are connecting to.
What it is: The interception of data packets as they travel across a network. How it works: Attackers use software tools (packet sniffers) to capture unencrypted data transmitted over the air. If you are not using a VPN, any unencrypted traffic—including HTTP websites, plain-text emails, and unencrypted app data—can be read in real-time. Real-world impact: Attackers can harvest login credentials, personal messages, and browsing history simply by sitting in the same room as you.
What it is: An attacker secretly intercepts and relays communications between two parties who believe they are directly communicating with each other. How it works: The attacker positions themselves between your device and the network router. When you try to connect to a website, the attacker intercepts the request, connects to the site on your behalf, and relays the information back to you. Real-world impact: The attacker can view, alter, or inject malicious content into your web traffic. They can downgrade HTTPS connections to HTTP, exposing your sensitive data.
What it is: A malicious Wi-Fi network set up to mimic a legitimate one. How it works: An attacker creates a hotspot with a name (SSID) identical or similar to a trusted network—for example, "Starbucks_Guest_Free" instead of "Starbucks_WiFi". When you connect to the fake network, all your traffic routes through the attacker's device. Real-world impact: The attacker has complete visibility into your network activity and can easily execute MITM attacks or serve you phishing pages designed to steal credentials.
What it is: The theft of a valid session token to gain unauthorized access to an account. How it works: When you log into a website, the server assigns you a session cookie so you do not have to re-enter your password on every page. If this cookie is transmitted over an unencrypted connection, an attacker on the same public Wi-Fi can intercept it. Real-world impact: The attacker can use the stolen cookie to impersonate you, gaining full access to your account without needing your username or password.
What it is: The injection of malicious software into your device via the network. How it works: Attackers can exploit vulnerabilities in the network or use MITM techniques to inject malware into the websites you visit. They might prompt you to install a "required update" to access the internet. Real-world impact: Your device becomes infected with ransomware, spyware, or keyloggers, compromising your entire system.
A VPN is the most effective tool for securing your connection on untrusted networks. It addresses the fundamental flaw of public Wi-Fi—the lack of encryption—by creating a secure tunnel for your data.
It is crucial to understand the limitations of a VPN. A VPN secures your connection, but it does not secure your device or your behavior.
Learn more: VPN leaks explained: DNS, IPv6, and WebRTC — and how to check yours
To stay safe on public networks, follow this checklist before, during, and after you connect.
Learn more: How to check if your VPN is working: IP & DNS leaks (a quick guide)
Learn more: VPN for travel: safer airports, hotels, and geo-changes without surprises

We build our systems to provide robust protection on untrusted networks, focusing on strong encryption and fail-safes.
We use modern, secure protocols like WireGuard and OpenVPN to create an encrypted tunnel between your device and our servers. This ensures your data is unreadable to anyone sniffing traffic on a public Wi-Fi network.
Our system-level kill switch blocks all internet traffic if your VPN connection drops unexpectedly. This prevents your device from reverting to the unencrypted public Wi-Fi connection and exposing your data.
Learn more: Kill switch: what it is, why it matters, and how to test it
All DNS requests are routed through our encrypted tunnel and resolved by our own DNS servers. This prevents the local network administrator or attackers from seeing which websites you are trying to visit.
Learn more: Private DNS: why DNS leaks happen and how Private DNS helps
We do not log your browsing history, connection timestamps, or IP addresses. Our no-logs policy is designed to be audited by independent third parties, ensuring that even if we are asked for data, we have nothing to hand over.
Learn more: No-logs explained: what it means, what to look for, and how we design for it
Yes, using a VPN significantly reduces the risks of public Wi-Fi. It encrypts your traffic, protecting your data from packet sniffing and man-in-the-middle attacks. However, it does not protect against malware or phishing, so you still need to practice good security hygiene.
No. When you use a VPN, the Wi-Fi owner (and anyone else on the network) can only see that you are connected to a VPN server and the amount of data you are transferring. They cannot see the websites you visit, the files you download, or the messages you send.
Yes. HTTPS encrypts the content of your communication, but it does not encrypt the metadata. Without a VPN, attackers on the network can still see the domains you are visiting (e.g., they know you are on your bank's website, even if they can't see your password). A VPN encrypts this metadata as well.
For maximum security, especially on mobile devices that frequently connect to different networks, leaving your VPN on is a good practice. It ensures you are protected even if your device auto-connects to an open network in the background.
Learn more: VPN for remote work: protecting logins, Slack, and client systems
If your VPN disconnects and you do not have a kill switch enabled, your device will automatically route traffic through the unencrypted public Wi-Fi connection, exposing your data. Always ensure your VPN's kill switch is turned on.