this post was submitted on 27 Nov 2023
1 points (100.0% liked)

Digital Nomads

14 readers
1 users here now

founded 10 months ago
MODERATORS
 

I’ve been facing this issue for some time because I always have to connect to public WiFi in hotels, Starbucks and airports to open some confidential apps as bank accounts, password manager, etc. and I was wondering here what do other nomads do to protect themselves in this scenario?

you are viewing a single comment's thread
view the rest of the comments
[–] Three-Off-The-Tee@alien.top 1 points 9 months ago (5 children)

Unless you are using WiFi that uses captive portal with a forward proxy( re-minting https certs). This would be doing full packet inspection ( clear text ) of your traffic, probably not happening but just be careful or just use you cell hotspot and avoid public WiFi all together.

[–] duplico@alien.top 1 points 9 months ago (3 children)

Did a YouTube VPN ad write this?

Stop giving people bad advice. SSL/TLS MITM should not be a part of the average person's threat model. It also has nothing at all to do with a captive portal.

[–] Three-Off-The-Tee@alien.top 1 points 9 months ago (2 children)

Describe an average persons “threat model”, in addition what mitigations would you recommend for the “average” person who might bank abroad or login to a corporate intranet?

[–] PlexP4S@alien.top 1 points 9 months ago

There is nothing that needs to be done. No one is getting any information out of you by visiting your bank account on public Wi-Fi assuming your bank uses https, which is does. It’s not possible. You can’t sniff https traffic which is why chrome yells at you and doesn’t even let you visit some unsecured pages (like if there certificate is invalid). Frankly, the NSA could sniff your https traffic and they couldn’t do anything with it. It’s completely laughable.

load more comments (1 replies)
load more comments (1 replies)
load more comments (2 replies)