Airports, train stations, hotels, coffee shops, restaurants, shopping malls, co-working spaces — free WiFi has become as expected as running water in public places. We connect without a second thought. We check our email while waiting for a flight, review bank statements over hotel WiFi, and browse social media at the corner cafe. It feels harmless. After all, millions of people do it every day.
But free WiFi is one of the easiest attack vectors cybercriminals exploit. A 2024 study by the WiFi security firm Coronet found that nearly 40% of public WiFi hotspots use no encryption whatsoever. Another survey by NordVPN revealed that 1 in 4 travelers have been hacked while using public WiFi abroad. The numbers are uncomfortable, but the reality is worse: most victims never even realize it happened.
The person sitting three seats away from you at the airport departure gate, casually working on their laptop, could be silently intercepting every unprotected request leaving your device. The equipment required costs under $100. The skills required can be learned from a YouTube tutorial in an afternoon.
This is arguably the most dangerous and least understood attack on public WiFi. On your home or office network, your DNS requests — the lookups that translate domain names like mybank.com into IP addresses — go to your ISP's servers or a trusted provider like Cloudflare or Google. On a malicious WiFi network, the router controls the DNS. And whoever controls the DNS controls where your browser actually goes.
mybank.com in your browser. Normally, DNS resolves this to your bank's real server at 203.0.113.50. But the malicious router's DNS returns 192.168.1.99 — the attacker's laptop. You see a pixel-perfect clone of your bank's login page. You enter your username and password. The attacker now has your banking credentials. The fake site then redirects you to the real bank so you never suspect a thing.This is not a theoretical attack. It is trivially easy to execute. Any laptop with freely available tools can act as a rogue WiFi hotspot with a custom DNS server. The attacker does not need to break any encryption — they simply answer your DNS questions with lies.
In a MITM attack, the attacker positions themselves between your device and the internet. Every packet you send passes through them first. They can read it, log it, modify it, or inject entirely new content into the pages you see. On an unencrypted WiFi network, this requires nothing more than enabling packet capture.
Even HTTPS does not make you fully immune. Sophisticated attackers use SSL stripping techniques to downgrade your connection, or present forged certificates. If a user clicks "proceed anyway" on a browser certificate warning — and studies show that a surprisingly high percentage do — the attacker gains full visibility into encrypted traffic. Hardware tools like the WiFi Pineapple have turned MITM attacks into a push-button operation, literally designed for penetration testers but freely available to anyone.
You are at a hotel. You open your WiFi settings and see two networks: Hilton_Guest_WiFi and Hilton_Guest_WiFi. They look identical. One is the hotel's legitimate network. The other is a laptop in room 412 broadcasting the same network name with a stronger signal. Your phone auto-connects to the strongest signal — which is the attacker's.
Once connected to the evil twin, all your traffic flows through the attacker's machine. They now have the same capabilities as a MITM attacker — with the added advantage that you voluntarily connected to them.
Even if a website uses HTTPS for the login page, session management can be flawed. After you log in, many websites issue a session cookie — a small token that proves you are authenticated. If that cookie is transmitted over an unencrypted connection at any point, or if the site has mixed-content issues, an attacker on the same WiFi can capture it.
With your session cookie, the attacker does not need your password. They paste the cookie into their own browser, and they are you — with full access to your email, social media, cloud storage, or shopping accounts. The session remains valid until you explicitly log out or the cookie expires, which could be days or even weeks.
The captive portal — that "agree to our terms" page that appears when you first connect to a hotel or airport WiFi — is itself a potential attack vector. A compromised or malicious captive portal can serve drive-by downloads, display fake "your browser is outdated — click here to update" pop-ups, or exploit browser vulnerabilities to install malware silently.
Some compromised WiFi networks go further: they intercept legitimate software download requests and replace the file with a trojanized version. You think you are downloading a PDF reader update; you are actually installing a keylogger. This technique, called a watering hole attack, is particularly effective because the user initiates the download themselves.
"Use a VPN" is the standard security advice for public WiFi, and it is not wrong — a good VPN encrypts all traffic between your device and the VPN server. But in practice, VPNs come with real-world friction that limits their effectiveness:
Perhaps most importantly: a VPN does not protect you from malicious domains. If you click a phishing link while connected to a VPN, the VPN dutifully encrypts your connection to the phishing server. It delivers your credentials securely — to the attacker.
DNS-over-HTTPS (DoH), DNS-over-TLS (DoT), and DNS-over-QUIC (DoQ) encrypt your DNS queries between your device and a trusted DNS resolver. This single change neutralizes several of the attacks described above:
Encrypted DNS is also lighter than a VPN. Only the DNS lookup is encrypted through the secure tunnel. The actual web traffic uses standard HTTPS — which is already encrypted for over 95% of websites. You get protection where it matters most without the overhead of tunneling everything.
Encrypted DNS alone prevents DNS hijacking and snooping. But when combined with DNS filtering, you get a second layer of defense that actively blocks threats:
Think of it as a personal firewall that travels with your device. It does not matter which network you connect to — the protection is always active, always up-to-date, and requires zero interaction from you.
The setup is a one-time configuration. Once done, every WiFi network you join is automatically protected:
yourconfig.saas.unveildns.com). Done. Every app, every browser, every network.Encrypted DNS filtering that works everywhere — automatically. DoH, DoT, and DoQ supported. Set it up once, stay protected on every network. Free plan available.
Get Started Free