πŸ±β€πŸ’»The Skinny on Hotspots & VPNs as explained by Marcus Hutchins

Ronald BartelsRonald Bartels
6 min read

The above video provides grounds on why VPNs are often unnecessary for secure browsing on public Wi-Fi networks due to advancements in modern internet security protocols like HTTPS and HSTS. Marcus details common misconceptions about man-in-the-middle attacks, explains how security protocols mitigate these threats, and emphasizes the importance of good security hygiene (OS updates, browser updates, avoiding security warnings) as the primary defense. While acknowledging that VPNs add an extra layer of encryption, Marcus argues the risk of using a potentially untrustworthy VPN service may outweigh the benefits for typical users.

Key Themes & Ideas

  1. Man-in-the-Middle (MITM) Attacks and Rogue Access Points

  • Marcus explains the concept of a MITM attack where an attacker intercepts communication between the user and the destination server.

  • Rogue access points are described as a common implementation, where an attacker creates a fake Wi-Fi network with a similar name to a legitimate one (e.g., "Starbucks WiFi").

  • "The most common implementation of this attack is something known as a rogue Wi-Fi access point and the way this works is let's say you're at Starbucks and the Starbucks Wi-Fi is simply named Starbucks WiFi now if I come into Starbuck and I set up my own Wi-Fi network and I name it Starbucks Wi-Fi and the signal of my network is stronger than the signal of the real Network your phone or laptop or whatever it is you're bringing is most like going to connect to my network rather than the real one simply because the signal is stronger."

  1. The Shift from HTTP to HTTPS

  • Marcus highlights the critical difference between HTTP (unencrypted) and HTTPS (encrypted).

  • HTTPS provides end-to-end encryption, making it significantly harder for attackers to intercept sensitive data.

  • "VPN stop people from spying on your data by using endtoend encryption well https is end to- end encryption by default."

  • HTTPS is superior to VPNs with unencrypted traffic because VPNs only encrypt traffic between the user and the VPN server, whereas HTTPS encrypts the entire path.

  • "with https the traffic is encrypted on my system and and it's decrypted on the server that I'm communicating with whereas if we use a VPN with un encrypted traffic it gets encrypted on my PC and then it gets decrypted on the VPN server but then the communication between the VPN server and the website that I'm talking to is still unencrypted whereas https actually encrypts it the entire way there."

  1. HTTP Strict Transport Security (HSTS)

  • HSTS forces browsers to only connect to a website using HTTPS, preventing SSL stripping attacks.

  • HSTS preload lists are hardcoded or automatically downloaded by browsers to ensure HTTPS-only connections for critical websites (e.g., Google, banks) even on the first visit.

  • "the website will also tell my browser hey never connect to the unsecured version of the website any time you see an HTTP URL just replace it with https... my browser just automatically replaces HTTP with https and as such there is never that first unsecured connection."

  • "websites can submit their hsts configs to a big list that is downloaded automatically by your browser and in some cases it's actually hardcoded directly into your browser which means for certain websites it doesn't matter if you've never been to that site before it is only going to let you connect to the secured version of that website."

  1. TLS Downgrade Attacks & Mitigation

  • Explains TLS downgrade attacks where attackers attempt to force a connection to use older, less secure versions of TLS/SSL.

  • Modern browsers and servers disable vulnerable SSL/TLS versions.

  • TLS_FALLBACK_SCSV extension prevents downgrade attacks by detecting if the client hello request has been altered.

  1. Certificate Pinning

  • Certificate pinning, used by banking apps, hardcodes the expected SSL certificate into the application itself, preventing attackers from spoofing the certificate.

  • "...banking apps those are even more secure because they usually do something known as certificate pinning which is the certificate is actually hardcoded into the application which means the application traffic is again endtoend encrypted but in a way that even if hsts went away today nobody would be able to downgrade that connection from https to http"

  1. The Importance of Good Security Hygiene

  • Marcus emphasizes the importance of keeping your operating system and browser up to date, and not ignoring security warnings.

  • "if you have good security hygiene you don't install random people's certificates on your laptop you don't click past browser warnings you keep your operating system and your web browser up to date all of those things will prevent man-in-the-middle attacks from getting your credentials and as such it is entirely safe to just go onto a public Wi-Fi without a VPN."

  1. Firewall Settings

  • Set your computer's firewall profile to "public network" when using public Wi-Fi to prevent unauthorized access from other devices on the same network.

  • "you also need to make sure your firewall profile is set to public network because when you're on the same network as someone they can connect to your computer and they could say exploit Services if you have a remote desktop open with an unsecure password they could try and brute force it whereas when you set your computer's firewall profile to public network it doesn't let any other computers on the same network talk to you..."

  1. VPNs as a Risk Trade-off

  • VPNs add encryption, but using an untrustworthy VPN provider could introduce new risks. Marcus suggests it's a question of who you trust more - the public Wi-Fi network or the VPN provider.

  • "at the end of the day vpns do add more encryption so if you feel the need to have a VPN or public Wi-Fi it's not necessarily going to hurt it could hurt if you don't trust your VPN company because the VPN company can also man in the middle of your traffic so you're really just shifting risks..."

  1. Ethical Stance on VPN Advertising

  • Marcus expresses concerns about VPN companies using fear-mongering tactics to promote their products and states a commitment to providing honest information.

  • "VPN companies do reach out to YouTubers like me and they offer to pay us huge sums of money to say hey if you go on public Wi-Fi your credit card details and your bank details and all of that is going to be stolen... you will never see me taking money to lie to you in order to sell a product"

Wrap

Marcus wraps up that while VPNs offer an extra layer of security, they are often unnecessary for typical users browsing on public Wi-Fi networks. Modern security protocols like HTTPS, HSTS, and TLS, combined with good security hygiene, provide adequate protection against common attacks. The decision to use a VPN ultimately depends on individual risk tolerance and trust in the VPN provider.

Read more about Marcus πŸ‘‰

1
Subscribe to my newsletter

Read articles from Ronald Bartels directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ronald Bartels
Ronald Bartels

Driving SD-WAN Adoption in South Africa