What Leaks Before Connecting to a VPN on Public WiFi Hotspots?
When you sign up for a VPN account, you also download the service’s client, specifically for Android or portable devices connecting through public hotspots. But what happens during the moment between connecting to the hotspot and connecting to the VPN? What kind of leaks can occur, and what information can the hotspot collect? Let’s explore.
Understanding the Security Gap
Between connecting to the hotspot and establishing the VPN, nothing is protected or encrypted by the VPN. Anything already encrypted, such as HTTPS or SSL connections, cannot be read by the hotspot owner without installing a certificate on your device, which requires your active permission. For example, the Gmail app uses encryption to ensure secure connections.
The Risk of Unencrypted Data
On the other hand, anything not encrypted can be read as plain text by the hotspot owner. This means that any unencrypted data, such as websites visited, messages sent, or files accessed, can potentially be intercepted and viewed by someone on the same network.
Controlling Leaks with VPN Apps
Some VPN apps, like FREEDOME from F-Secure, offer additional security measures to mitigate these risks. They have an automatic killswitch feature that blocks all incoming and outgoing connections until the VPN is established. This ensures that no data is leaked before the secure VPN connection is established.