Softplorer Logo

exposure vs control

VPN for Public Wi-Fi Safety

The threat on public Wi-Fi is real but narrower than most people imagine. A VPN addresses the part that's actually dangerous. Understanding which part that is makes the difference between protection and theatre.

This fits you if

  • You connect to public Wi-Fi regularly — cafés, airports, hotels — and want protection to be automatic
  • You do sensitive work on public networks — email, documents, financial accounts
  • You're connecting to networks you have no reason to trust — conference venues, shared accommodation, transport hubs

What's happening

The coffee shop network threat that gets described in most VPN marketing — someone intercepting your login credentials mid-connection — is largely a pre-2015 concern. Most modern apps and websites use HTTPS, which encrypts traffic end-to-end regardless of whether a VPN is running. An attacker on the same Wi-Fi network can see that you're connecting to a site, but not what you're sending or receiving over an encrypted connection.

What remains real: DNS queries that leak before your browser's HTTPS connection is established, revealing which sites you're visiting. Network-level metadata — which services you connect to, how often, for how long — that your ISP or a monitoring network can observe. Rogue access points that present themselves as legitimate networks and perform man-in-the-middle attacks on traffic that isn't properly pinning certificates. And the window between joining a network and your VPN tunnel being established, during which unprotected traffic flows.

A VPN on public Wi-Fi closes most of these gaps. Your DNS queries go through the tunnel. Your traffic pattern is obscured from the network operator. The rogue access point sees an encrypted tunnel, not readable requests. The remaining gap — the brief exposure window on connection — depends on how the provider handles auto-connect and kill switch behaviour on new networks.

Philosophies

ExpressVPN

Complexity should be invisible

View breakdown

Express auto-connects on untrusted networks without requiring manual activation — which directly addresses the exposure window between joining a public network and having protection running. The Network Lock kill switch blocks all traffic if the tunnel drops, so the connection either works through the VPN or doesn't work at all. For users who want public Wi-Fi protection to be passive rather than something they remember to enable, this design is the point. The Kape Technologies ownership context is part of the picture regardless of the operational behaviour.

ExpressVPNVisit ExpressVPN
NordVPN

Scale done reliably

View breakdown

Nord's Threat Protection adds DNS-level blocking of known malicious domains — which matters specifically on public networks where you can't control what the DNS resolver is doing. Auto-connect on untrusted networks is available and configurable. The kill switch holds traffic during VPN drops. For users who want public Wi-Fi protection as part of a broader set of features they'll use across contexts, Nord covers the public Wi-Fi case without requiring a separate configuration for it.

NordVPNVisit NordVPN
ProtonVPN

Verification over convenience

View breakdown

Proton's kill switch and auto-connect features function reliably on new networks, and the open-source client means the behaviour can be verified rather than trusted. For users whose threat model on public Wi-Fi extends beyond casual privacy — journalists working in the field, lawyers on hotel networks, anyone whose work requires that the protection actually does what it claims — the verifiable architecture matters more than it does for everyday café use. The setup is less automatic than Express; more active management is required.

ProtonVPNVisit ProtonVPN
Mullvad

Identity should not be required

View breakdown

Mullvad's approach to public Wi-Fi protection is structural: WireGuard connects fast enough that the exposure window is minimal, the kill switch blocks non-VPN traffic by default rather than optionally, and there's no account identity that could be connected to the network logs of the public access point you used. For users who want public Wi-Fi protection to leave as small a trace as possible — not just encrypting the traffic but removing the link between the VPN use and an identity — Mullvad's architecture handles that at the account level, not just the protocol level.

MullvadVisit Mullvad

Recognize yourself

You connect to public Wi-Fi regularly — cafés, airports, hotels — and want protection to be automatic

Manual VPN activation means the protection depends on you remembering to enable it every time, on every device, before doing anything sensitive. Providers with auto-connect on untrusted networks remove that dependency. The VPN activates when you join an unknown network, before your apps start making requests. The exposure window that matters most — the first few seconds after connecting — gets closed without requiring any action.

You do sensitive work on public networks — email, documents, financial accounts

The risk profile on public Wi-Fi isn't uniform. Checking social media on a café network carries different exposure than reviewing a contract, accessing a banking app, or logging into a system that holds client data. For the high-exposure cases, the VPN kill switch behaviour matters: a provider whose kill switch reliably blocks traffic during any VPN interruption provides stronger protection than one where the behaviour varies by platform or connection type.

You're connecting to networks you have no reason to trust — conference venues, shared accommodation, transport hubs

The networks most worth protecting against aren't obvious threats — they're legitimate-looking networks operated by organisations whose data practices you've never agreed to and can't inspect. Conference centre networks, hotel Wi-Fi, and co-working space internet may log your traffic, inject ads, or operate under data retention policies you'd object to if you read them. A VPN removes visibility from all of them simultaneously.

You've connected to a network and your VPN didn't activate automatically

The window between joining a network and having the tunnel established is when exposure actually happens. Apps that were waiting for a connection start making requests. Background syncs run. DNS queries go to whatever resolver the network provides. If auto-connect isn't set up, those requests go unprotected. Testing your VPN's auto-connect behaviour on a new network before you're in a situation where it matters is the only way to know whether the protection is actually passive or just assumed to be.

No guarantees

A VPN on public Wi-Fi protects traffic in transit. It doesn't protect against malware delivered through the network, phishing sites that look legitimate, or compromised apps on your device. The threat on most public networks is passive observation and metadata collection, not active attack — and a VPN addresses passive observation effectively. Active attacks require additional defences that no VPN provides.

Auto-connect behaviour varies by platform. On iOS, operating system restrictions limit how VPN apps can monitor network changes and trigger connections automatically. The auto-connect that works reliably on a Mac or Windows machine may behave differently on an iPhone. Testing on each device you actually use in public is the only way to confirm the protection is consistent.

The network operator can still see that a device connected to their network and used a VPN. The VPN hides what you did; it doesn't hide that you were there. For most public Wi-Fi use cases, that's an acceptable residual exposure. For situations where even the fact of using a VPN needs to be obscured, obfuscation is a different and more complex requirement.

Where to go next