If you Like HowToVanish on Facebook then we will give you one of the $2-3 30 page Mini-Guides for free. Just send us a message on Facebook and let us know which one you want: (1) Financial, (2) Political or (3) Personal.

Secure Wifi Connections

Secure WiFi Connections

by Bill Rounds Esq. on May 30, 2010

Reading time: 4 – 6 minutes

Everyone does it.  You are traveling somewhere, or you just moved into a new area, or you are waiting at the coffee shop for your car to be fixed and you come across an unencrypted wireless network. Lots of businesses set up hotspots and maintain them for the very purpose of inviting people to use the internet while they are in the area.  Secure WiFi connections are not the biggest concern in their life.  Some people just forget to password protect their wireless router.  You need to satisfy an incredible urge to check to  see if you sold that last textbook so you go ahead and log onto it…just for a minute.

In most cases it may have been a little bit exciting to flirt with an unknown signal, your heart may have pounded just a little bit faster for a moment.  But your unsafe and unsecure wifi connection was otherwise very mundane and you didn’t do anything very adventuresome while furtively exchanging information.  It was quick, satisfying, and this time there were no lasting negative effects.

Risk of Not Using  a Secure Wifi Connection

You may already be aware of the need to safely surf the from a public wireless network.  There are significant risks involved if you don’t. Whoever has access to that network can gain access to your computer and any of the information that you send over the network. Another person with access to that network might be able to route your traffic through their computer and then through the network, called a man in the middle attack.  It is unsophisticated and easy to do, therefore it is very likely to happen.  Things like logging into email, online banking and anything else that might require you to use a password are the most risky things to try on an unencrypted wifi connection. The risk of being snooped at a public WiFi spot is much higher than an average person who would want to use anonymous browsing.  The Google maps vehicles have also been known to gather information about users of wifi hotspots as they pass through them, although I’m sure they already had most of that information anyways.

On some occasions, this kind of network infidelity can lead to a minor irritation of captured personal information which fills the transactional databases of the hotspot host in this surveillance society, and in some cases can lead to a serious loss of data security, virus, or identity theft.

How to Setup A Secure Wireless Connection

So what can you do to protect yourself when casually connecting to inviting wifi hotspots? Set up a secure wifi connection to you own home router or your own secure server through an SSH tunnel. This shield will protect you while using any public wifi connection and keep your surfing safe and secure.

To set up this capability, you might want to have a computer friendly amigo do it for you. You can also look around for a good step by step tutorial or even a book or two on how to do that.

Conclusion

Don’t give up a faithful relationship with your secure internet connection to satisfy a nagging urge while you are not at home. Practice safe surfing habits by using an SSH tunnel to connect to the internet when you are using a wifi hotspot, hotel network or other internet service connection open to the public.  This will help you with protecting your IP address, your anonymous web surfing or to transfer big files securely from public places.  You can create a comprehensive privacy strategy using the book How To Vanish.

No tips yet.
Be the first to tip!

Support How To Vanish - Tip With Bitcoin

1Bszzrf9dB6GrvvmShic5Jw2ffpTpUoxuh

Find this post helpful? Please consider tipping with Bitcoin. Each article gets a unique Bitcoin address so by tipping you help make How To Vanish sustainable and give valuable feedback on which content is most appreciated!

13,811 random numbersEmail Email Print Print

3 comments

ABOUT THE AUTHOR: Bill Rounds, Esq. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from California Western School of Law. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties. This is merely one article of 123 by .
Free HowToVanish Privacy Guide

{ 3 comments… read them below or add one }

1 Joe April 17, 2012 at 11:03 am

The link for step-by-step instructions refer to a website that no longer exists.
Might want to update the link with a new tutorial.

I wish someone would start an open source project to create an application for secure wifi access that would work on phones and computers.

2 Dagan Simka January 11, 2013 at 4:57 pm

Consider using a VPN service (I use Witopia, but there are countless providers; some good, some not so good) as well as, perhaps, the TOR Browser.

Thanks for the article.

3 Trace Mayer, J.D. January 11, 2013 at 11:01 pm

Dagan, yes, a VPN is extremely important. I like Witopia but prefer Private Internet Access because they accept bitcoins. Never trust a VPN unless they accept bitocins.

Leave a Comment

Previous post:

Next post: