Every public WiFi network — whether at an MTR station, hotel, or coffee shop — carries real security risks. Understanding these threats is the first step to protecting yourself on Hong Kong's thousands of hotspots.
The most fundamental risk of public WiFi is that any device connected to the same network can potentially see the network traffic of other connected devices. On unencrypted or weakly encrypted networks, a device running freely available tools like Wireshark can capture and read all data packets sent over the network. This is called passive eavesdropping — the attacker simply listens without actively interfering, making it undetectable and completely silent from the victim's perspective.
The scope of what can be captured depends on how the services you use implement encryption. Modern websites using HTTPS encrypt your data end-to-end between your browser and the server, so an eavesdropper sees encrypted data they cannot read. However, DNS queries — the lookups your device makes to convert website names like "bank.com" into IP addresses — have historically been unencrypted and visible to network monitors even when you are visiting HTTPS sites. This means an eavesdropper can see which websites you visit even without reading the content of those visits.
HTTP (non-HTTPS) websites transmit all data in plaintext. While the web has largely moved to HTTPS, some websites, local services, and legacy applications still use HTTP. On a public WiFi network, any HTTP traffic you generate — including form submissions, login credentials, and page content — is entirely readable. HTTP sites also remain vulnerable to SSL stripping attacks, where a man-in-the-middle downgrades your HTTPS connection to HTTP without your awareness. A VPN addresses all these vulnerabilities by encrypting all traffic at the network layer before it ever reaches the public WiFi network.
Active attacks go further than passive eavesdropping — the attacker inserts themselves into the communication between your device and the internet. The most common technique on local networks is ARP (Address Resolution Protocol) spoofing. ARP is a network protocol that maps IP addresses to physical MAC addresses on a local network. An attacker can send fake ARP messages claiming that their device's MAC address corresponds to the gateway's IP address, causing all devices on the network to route their traffic through the attacker's machine before forwarding it to the real gateway. This is called a man-in-the-middle (MITM) attack.
Once positioned as a man-in-the-middle, the attacker can inspect all traffic passing through their device, inject malicious content into web pages, steal session cookies to hijack logged-in sessions, perform SSL stripping to downgrade HTTPS connections, and redirect users to phishing pages. MITM attacks are active and require some technical skill, but the tools to perform them (Ettercap, Bettercap, and similar) are freely available and widely documented. A moderately skilled attacker can set up an ARP spoofing MITM attack in minutes on an unsecured network.
DNS hijacking is another active attack common on rogue or compromised WiFi networks. Instead of forwarding your DNS queries to legitimate DNS servers, the network routes them to a DNS server controlled by the attacker. The attacker's DNS server returns malicious IP addresses for legitimate domain names — so when you type "hsbc.com.hk" in your browser, the network's DNS server returns an attacker-controlled server's IP address instead of HSBC's real server. You are seamlessly redirected to a convincing fake website that steals your credentials. HTTPS certificate warnings are the only browser-level protection against DNS hijacking, which is why you should always check SSL certificates and never proceed past browser security warnings.
An evil twin attack creates a fake WiFi network that mimics a legitimate one. The attacker sets up a wireless access point broadcasting the same SSID (network name) as the legitimate network — for example, "CentralStation_WiFiHK" or "Pacific_Coffee_Free." If the attacker's signal is stronger than the legitimate network, nearby devices may automatically connect to the evil twin instead. If the device has previously connected to the real network, it may auto-reconnect to the evil twin without any user action, because it recognises the familiar network name.
Once you connect to an evil twin, the attacker controls your entire network connection. All your traffic — HTTPS or otherwise — passes through their equipment. While HTTPS protects the content of encrypted communications, the attacker can perform SSL stripping to prevent HTTPS upgrades, present fraudulent SSL certificates that trigger browser warnings (which many users ignore), and capture your DNS queries to see every site you attempt to visit. Evil twin attacks are particularly effective in high-traffic locations where legitimate free WiFi is expected: airports, MTR stations, hotels, and shopping malls in for Business Travellers: Protecting Corporate Data in Hong Kong">Hong Kong.
Rogue access points within corporate networks present a related but different threat. A rogue AP is an unauthorised wireless access point connected to a wired corporate network — potentially installed by a careless employee (a personal router brought to the office) or by a malicious insider. Rogue APs create wireless entry points into otherwise secure wired networks, bypassing all the network perimeter controls the organisation has implemented. For Hong Kong businesses, rogue AP detection (through wireless intrusion detection systems) is an important component of network security, particularly in open-plan office environments.
The single most effective measure against all public WiFi risks is a VPN. By encrypting all traffic end-to-end before it reaches the public network, a VPN makes eavesdropping useless, MITM attacks yield only encrypted data, and evil twin attacks provide the attacker with nothing of value. A quality VPN running on your device effectively reduces even a hostile public WiFi network to a simple internet connection — the network can see that you are connected and how much data you are transferring, but cannot see the content of any of your communications.
Beyond a VPN, several configuration changes reduce your attack surface on public networks. Disable automatic WiFi connection on your phone and laptop — your device should not automatically join networks you have previously used without your explicit consent. On iPhones: Settings → WiFi → turn off "Auto-Join" for public networks. On Android: WiFi settings → turn off "Connect to open networks." On laptops: remove public WiFi networks from your saved networks list after use. Configure your device to use DNS over HTTPS (DoH) to prevent DNS query exposure even when you are not using a VPN.
For sensitive tasks, use your phone's mobile data connection rather than public WiFi entirely. Your 4G/5G connection is end-to-end encrypted at the network level, is not shared with other users, and is not susceptible to the MITM and evil twin attacks that affect shared WiFi networks. Many Hong Kong mobile plans include generous data allowances — using mobile data for sensitive tasks like banking, business email, and accessing sensitive files is not extravagant but is a meaningful security upgrade. Reserve public WiFi for general browsing where a VPN is active and you are not accessing sensitive accounts.