Windows 8 and 8.1 Forums


Using unsecured Wi-Fi for long-term use?

  1. #1


    Posts : 4
    Windows 8.1

    Using unsecured Wi-Fi for long-term use?


    I just moved into a new apartment and someone in the building has an unsecured connection which I’ve been using with no issues (except slower speed) since I moved in a couple days ago. I’m wondering what risks I would be taking if I was to use this connection instead of just setting up my own connection. The thought of saving $60+/mo is appealing but I’m concerned about security issues in regard to paying bills, bank transfers, stock trades, etc. I do have a secure connection elsewhere which I could use for that sort of thing if it would be a risk using it at home. Should I just bite the bullet and get my own service set up?

      My System SpecsSystem Spec

  2. #2


    Central IL
    Posts : 3,468
    Linux Mint 17.2


    The first thing you should not be doing on an unsecured Public wifi. Is doing banking type transactions. You need to use either a VPN connection through the Public hotspot. Or just pay for your own secured personal Internet connection.

    Too easy for someone to put a packet sniffer on the public hotspot and grab traffic as it goes through it.
      My System SpecsSystem Spec

  3. #3


    I think the OP nailed it (unsecured connection)
      My System SpecsSystem Spec

  4. #4


    United States
    Posts : 3,093
    Windows 8.1 Pro 64-bit


    There are grade-school hackers who would have no problem capturing your every key stroke. Up to you.
      My System SpecsSystem Spec

  5. #5


    Covington, La
    Posts : 1,184
    Windows 7 HP 64bit, Windows 8.1 Pro w/Media Center 64BIT


    The person that owns that Wi-Fi may be trying to sucker people into using it to steal their information. Everyone assumes its an idiot that didn't secure their Wi-Fi, so do you feel lucky.

    Jim
      My System SpecsSystem Spec

  6. #6


    127.0.0.1
    Posts : 144
    Windows 8.1 Pro x64


    One word: Tor.
      My System SpecsSystem Spec

  7. #7


    Quote Originally Posted by Windows 8 View Post
    One word: Tor.
    One word for TOR = CIA or NSA. Tor or any browser can't do anything about WiFi security.
      My System SpecsSystem Spec

  8. #8


    Hafnarfjörður IS
    Posts : 4,376
    Linux Centos 7, W8.1, W7, W2K3 Server W10


    Hi there

    "The Count" has nailed it precisely -- it doesn't matter what the complexity of passwords etc is if every key stroke can be captured -- even a secure VPN isn't safe if it's being accessed from an UNSECURED or OPEN Wi-Fi access point since any hacker could replicate your key strokes to get in.

    For Banking transactions etc set up a temporary Internet access point with your MOBILE PHONE. While not 100% secure most decent mobile phone providers on 3 / 4G networks have a reasonable level of security built in and data is decently encrypted at most points in the process.

    What amazes me that usually just with a simple PIN number you can access a lot of Banking type stuff. A more secure way would be for a random type of question to be put to you before the final login. Any Hacker therefore wouldn't know the question being posed so even if he / she had the plain text of your session they wouldn't know what the random question would be and therefore unlikely to be able to logon. This type of approach though would be very difficult to implement as each user would have to perhaps set up 30 or 40 "random questions" when creating the account in the first place -- and this data also is not 100% safe from "miscreants" either.

    Cheers
    jimbo
      My System SpecsSystem Spec

  9. #9


    Long, long , time ago (here I go again), almost "Once upon a time", I had a Timex-Sinclair ZX81 computer with a program for running production in our company. That program required a password but not an ordinary one. This one took into account how fast and with which time interval letters or numbers are punched in. Someone could hack password but there was no easy way to find and replicate timing. Surprised nobody is using that gimmick any more.
      My System SpecsSystem Spec

  10. #10


    Hafnarfjörður IS
    Posts : 4,376
    Linux Centos 7, W8.1, W7, W2K3 Server W10


    Hi there.

    I've seen the same thing on some VPN's -- you get a key "randomizer" and when you login you simply type the value displayed on the randomizer -- this connects you to the normal login screen of the VPN.

    Now apart from some stuff it doesn't really matter if a hacker gets your keystroke since they won't be able to login to the VPN in the first place. Of course don't give away passwords or other stuff that the hacker could access by logging in to a different application though !!!.

    perhaps this type of technology could be built into routers and ISP's so you wouldn't need to have large numbers of these key fobs.

    Cheers
    jimbo
      My System SpecsSystem Spec

Page 1 of 2 12 LastLast
Using unsecured Wi-Fi for long-term use?
Related Threads
So recently I had this problem with my computer Take for example firefox, sometimes when I click another tab, the visuals of the original tab stays on screen and only updates a part of the buttons/pictures when I mouse over them. It becomes fine when I click another tab and then click back...
Long Script in General Support
I'm on W8.1 and just started to have some scripting issues.. It just freezes the screen and I have to start over This just started this week, any ideas Thanks
Hi, We have internet provided through the place we live for free. It is broadcasted as an unsecured wifi network. I can connect to the internet with no problems with my windows 7 computer. I recently got a windows 8 computer. I this computer has trouble staying connected to the unsecured...
How Long Does it Take? in General Support
I shut my computer down at the end of the day. I switched to Windows 8 exactly 2 months ago. Still every night I go to the bottom left corner with my mouse to shut the thing down, only to find nothing there to do it. So, when you switched to Windows 8 how long did it take before you could...
Take pictures. Watch videos. Stream media. Create an ad-hoc network. Connect to external displays. Video conference. Share internet pages. Edit photos. Say voice commands. Print wirelessly. Monitor engine performance. Instantly message someone. Expand internal storage. Think I'm talking about a...
Final straw... Tried to d/l the release preview, and copped a faulty iso. Another member of this forum took pity on my poxy 8GB/month connection, and mailed me a copy. Just installed it....nah, f#ck that! Set up OK, then logged onto here to PM the bloke who sent me the
Solved How Long? in Installation & Setup
Hey guys, I searched and couldn't find so I'll make a new thread. How long does the W8RP take to install? I have the ISO file ready. Is it faster to make USB or DVD or mount and run? When I upgraded to 7 on one of my laptops, I mounted my ISO with Virtual Clone Drive, and on another with USB, and...
Eight Forums Android App Eight Forums IOS App Follow us on Facebook