Leo says whenever he's on communal Wi-Fi, as he will be on the cruise, a hotel, or a coffee shop, everyone's on the same network. Nowadays, places like these are getting better about making it more secure, and it isn't as risky as it used to be. But there is a potential risk that someone else on that network could snoop on him. Whenever he's using email, shopping on Amazon, or banking, all of that traffic is already encrypted. Leo thinks using a VPN on cruise ship Wi-Fi would probably slow his connection down to a point where he wouldn't be able to stream content online.
James has a router that supports VPNs. What's the benefit of running his own VPN vs. subscribing to a VPN service? Leo says it's largely the peace of mind that he is controlling the security. With a third party VPN service, he won't know what kind of access they have to his traffic.
You may have heard about the latest Wi-Fi vulnerability in the news called “KRACK” or “Key Reinstallation Attack.” This is a security flaw in the WPA2 protocol that could allow a third party to intercept network activity between a router and a device. It does this by taking advantage of a problem with the way the client (your mobile device or computer) authenticates with the access point (the router).
Connor wants to know about virtual private networks (VPN). Leo says that VPNs are kind of like a tunnel on the internet that keeps your connection secure and encrypted from the rest of the internet. Connor would like to have the freedom to go wherever he wants and watch whatever he wants without his ISP (charter) interfering. Leo says that it could be that websites that provide content may require cable membership in order to watch their content. So it may not be his ISP's fault.
David wants to know if he can use a VPN on his tablet. Leo says that TunnelBear is a good one to look at. Leo uses Hotspot VPN with a hardware dongle called the Tiny Hardware Firewall that he can plug into the tablet and it creates a Wi-Fi access point that he surfs through. It's secure and easy to use.
Oak is concerned about congress repealing ISP privacy protections. Is there a way he can hide his activity from his ISP so they can't have access to his data? Leo says he could use a VPN to scramble his traffic, but he'll only be giving that data out in the open to his VPN. Leo uses Hotspot VPN. Tunnel Bear is very well known as well. Oak should remember that it will slow him down a lot, and may prevent him from streaming.
Mark finally got a Google Pixel XL, which was on back order. Leo says it's been widely known that they're only available in limited quantities right now. It's likely that the demand exceeded Google's expectation. Mark says he likes the Wi-Fi assistant because it'll automatically connect via VPN. Does it really work? Leo says yes. Phones can be a bit promiscuous with random hotspots. So Google adds an encrypted connection via VPN to protect users. Leo says he doesn't really like joining Wi-Fi access points automatically, so he's turned it off.
Patrick heard Leo talking about Tiny Hardware Firewall in the past, and he also uses it. The idea of this is not unique to this company. It's actually created by HotSpotVPN. They buy inexpensive boxes and then put firmware in them that routes everything through their VPN. As part of a subscription to their VPN, or as part of the hardware purchase, you'll get this automatically. The downside is that the Tiny Hardware Firewall must use HotSpotVPN, and can't use a different service.
Jim is about to go on a river cruise and he's concerned with security when using Wi-Fi on the ship. Leo advises using the Tiny Hardware Firewall. It's a hardware firewall that can protect up to five devices because it uses a built in VPN that protects him. It will slow it down a bit, and the internet is slow on those cruise Wi-Fi hotspots, but it will keep him clean from the last mile.
Tom is wondering if it's necessary for him to have a VPN (Virtual Private Network). Leo says if he uses Wi-Fi in public, or he uses networks while traveling, he's somewhat vulnerable because he's on a public network that bad guys can get into. They can't necessarily spy on him, but they could trick him by putting up fake access points. A VPN sets up a connection between his computer on a public access network and a computer somewhere else run by a trusted party. All the data transferred over a VPN is encrypted so it isn't visible by anyone else on that network.