What Hackers Can Actually See on Public Wi-Fi — And the Free Hack That Takes 2 Minutes
The "Evil Twin" attack — creating a fake "Starbucks WiFi" network — takes a hacker 2 minutes and $30 in equipment. Anyone who connects has all unencrypted traffic intercepted. Modern HTTPS reduces this risk significantly — but 14% of web traffic is still unencrypted in 2026. Bank apps using certificate pinning are generally safe. Random apps and older websites are not.
The Evil Twin Attack — What Actually Happens in Cafes
A hacker sits at Starbucks with a laptop and a $30 Wi-Fi adapter. They create a hotspot named "Starbucks WiFi" with stronger signal than the real network. Your phone automatically connects. Every website you visit, every app that makes unencrypted requests, every HTTP image load — all passes through the hacker's laptop first. They capture it all with freely available tools like Wireshark.
This attack was demonstrated live on BBC News in 2015 and works identically today — with minor adaptations for modern traffic. The only difference: more traffic is now HTTPS-encrypted, reducing what attackers intercept. But plenty remains unencrypted.
What a Hacker CAN See on Public Wi-Fi in 2026
- ✅ All HTTP traffic — websites that have not migrated to HTTPS (about 14% of sites)
- ✅ DNS queries — which sites you are visiting, even over HTTPS
- ✅ Unencrypted app traffic — many mobile apps use APIs that are not fully encrypted
- ✅ Login credentials on HTTP sites (especially dangerous)
- ✅ Session cookies on unencrypted connections that enable session hijacking
- ✅ The fact that you are using specific apps — traffic metadata reveals apps even when encrypted
What a Hacker CANNOT See (With Proper HTTPS)
- ✅ Specific content of HTTPS websites (your banking transaction details)
- ✅ WhatsApp, iMessage, Signal messages (end-to-end encrypted)
- ✅ Your actual passwords on HTTPS login pages
- ✅ HTTPS email content (Gmail, Outlook with HTTPS)
The Attacks That Still Work in 2026 Despite HTTPS
SSL stripping: On networks you connect to for the first time, attackers can intercept the initial connection before HTTPS is established on sites without HSTS. Certificate spoofing: On corporate or cafe networks that install root certificates, they can perform SSL interception. App API attacks: Many mobile apps communicate with servers via APIs that are not as carefully secured as main websites. Security researchers regularly find that popular apps send sensitive data in formats interceptable by network attackers.
The 2-Minute VPN Setup That Protects Everything
Enable a VPN on your phone — it takes under 3 minutes to set up NordVPN or ProtonVPN Free. Enable auto-connect on untrusted networks. Every time you connect to coffee shop, hotel, or airport Wi-Fi: VPN activates automatically. Attackers on the same network see only encrypted traffic going to a VPN server — nothing about your actual activity.
Public WiFi — FAQ
Public network security questions