Using a VPN on Public Wi-Fi: Stay Safe in Cafés, Airports & Hotels (2026)

Quick answer: Public Wi-Fi is convenient, but it’s also a playground for snooping and spoofed hotspots. A VPN encrypts your connection from your device to a VPN server, making it much harder for anyone on the same Wi-Fi to read or tamper with your traffic.

If you’ve ever connected at a coffee shop and thought, “This is probably fine,” — same. The problem is you can’t see what’s happening on the network. This guide is a practical checklist: how attacks work, what a VPN really fixes, how to test for leaks, and how to configure safer defaults for daily use.

Denys Shchur – cybersecurity and VPN testing expert
Written by Denys Shchur Updated: 2026-01-07 · 12–18 min read
  • Understand hotspot threats (Evil Twin, DNS manipulation, session hijacking)
  • Run leak tests (DNS/IPv6/WebRTC) and fix what fails
  • Set safer defaults: kill switch, protocols, and “always-on” habits
Illustration: securing a laptop on public Wi-Fi with a VPN tunnel

Why public Wi-Fi is risky (even in 2026)

The biggest myth about public Wi-Fi is that “HTTPS makes it safe.” HTTPS helps a lot — but it doesn’t erase hotspot risks. On an open or poorly secured network, attackers can still try to observe traffic patterns, push you toward fake portals, manipulate DNS, or steal sessions if something is misconfigured.

Think of a hotspot like a crowded room: you can whisper (encryption), but it’s still easy for someone to bump into you, trick you, or watch what you’re doing. A VPN adds a private hallway (an encrypted tunnel) from your device to a VPN server — that’s exactly why it’s a strong default for airports, hotels, cafés, and even some workplaces.

Diagram: Traffic on public Wi-Fi without a VPN
Your device Website / app Public hotspot (café, airport, hotel) Risk: anyone on the hotspot may try to sniff, tamper, or spoof (Evil Twin) Traffic crosses the hotspot Visibility depends on encryption & configuration

The most common hotspot attacks aren’t Hollywood hacks. They’re boring, repeatable, and effective: packet sniffing, session hijacking (stolen cookies), DNS manipulation, and Evil Twin hotspots that look legitimate. If you’ve ever seen two networks named “Hotel_WiFi” and “Hotel_WiFi_FREE” — that’s the vibe.

Threat How it happens What a VPN improves
Packet sniffing Attacker monitors local traffic on the hotspot. Encrypts traffic to the VPN server (less readable to local observers).
Evil Twin (fake hotspot) Hotspot impersonates a real café/airport Wi-Fi name. Encrypts traffic after connection, but you still must avoid joining the wrong network.
DNS manipulation DNS requests get redirected or observed outside the tunnel. VPN DNS protection helps prevent domain leakage and spoofing.
Session hijacking Stolen cookies/sessions on weakly protected sites or captive portals. Reduces local interception; still use MFA and HTTPS-only.
Key takeaway: A VPN is not a magic shield, but it’s a strong default that removes a big chunk of hotspot-level risk — especially snooping and local manipulation.

How a VPN changes the picture

A VPN creates an encrypted tunnel from your device to a VPN server. The hotspot (and anyone on it) can usually see that you’re connected to a VPN, but they can’t easily see what you’re doing inside the tunnel. Websites see the VPN server’s IP, not the hotspot’s or your home ISP’s IP.

Diagram: Traffic on public Wi-Fi with a VPN tunnel
Your device Encrypted VPN tunnel VPN server Public hotspot can mostly see: “VPN connection is active” Hotspot sees less of your browsing (especially if DNS is also inside the tunnel) Remaining risks: joining fake Wi-Fi, captive portals, device sharing, weak passwords Then VPN server connects to websites/apps

The practical goal is simple: separate where you are (hotspot + local network) from what you do (the sites and services you access). If you want a deeper comparison, see Proxy vs VPN — they’re not the same thing.

Key takeaway: On public Wi-Fi, a VPN reduces “local network exposure.” Combine it with a kill switch, leak protection, and basic hotspot hygiene.

Real-life note from testing

Test note (experience): While testing VPN behavior on a crowded hotel Wi-Fi (Windows 11 + iPhone tethering as a control), I saw a “VPN connected” state but DNS requests still resolved via the hotspot DNS until I toggled the app’s Use VPN DNS / DNS protection option. After enabling DNS protection and re-running a DNS leak test, the resolvers matched the VPN network instead of the hotspot. It’s a good reminder: “connected” doesn’t always mean “sealed.”

If you want to specifically lock down leaks, bookmark this guide: DNS leak with a VPN: how to detect and fix. Also consider enabling a VPN kill switch if you travel a lot (hotels love dropping connections at the worst moment).

Spotting an Evil Twin hotspot in under 60 seconds

An Evil Twin is a fake hotspot that mimics a real one. The attacker wants you to join their network so they can push a captive portal, harvest credentials, or downgrade security. You don’t need paranoia — you need a routine.

Checklist: Spot an Evil Twin hotspot (fast routine)
1) Verify the network name with staff / signage (avoid look-alikes like “_FREE”) 2) Prefer WPA2/WPA3 when available; avoid open networks for sensitive tasks 3) Watch captive portals: never enter email/password for Wi-Fi access if it feels off 4) Turn on VPN + kill switch before logging in anywhere (banking, email, work tools) Small human rule: if the Wi-Fi looks weird, use your phone hotspot. Your future self will thank you.
Key takeaway: A VPN helps after you connect, but you still have to pick the right network. Verification + “VPN first” is the winning combo.

How to test your VPN on public Wi-Fi (DNS / IPv6 / WebRTC)

Leak tests aren’t just “for nerds.” On public Wi-Fi, they are the fastest way to confirm your setup is actually protecting you. If your VPN tunnels traffic but DNS still goes to the hotspot or your ISP, the hotspot can still see which domains you visit — even when content is encrypted.

Test How you spot a problem Typical fix
IP leak Your real city/ISP shows instead of the VPN location. Reconnect, switch server, enable kill switch.
DNS leak DNS resolvers belong to the hotspot/ISP. Enable VPN DNS / DNS protection; avoid custom DNS unless you know what you’re doing.
IPv6 leak Your ISP IPv6 address appears. Use a VPN that supports IPv6 or block IPv6 at OS/router level.
WebRTC leak Browser exposes local/real IP. Disable WebRTC leaks via browser settings/extensions; use VPN browser protection if available.
Flowchart: Quick leak-test decision path
Start: connect to Wi-Fi Turn on VPN + kill switch Run leak tests If DNS/IPv6/WebRTC leaks: fix settings (VPN DNS, IPv6 block, browser WebRTC) If clean: proceed with sensitive tasks (email, work tools, banking) Tip: if the hotspot feels sketchy, use your phone hotspot.
Key takeaway: Leak tests + a kill switch are the “two-seatbelts” approach. They prevent the most common accidental exposures on unstable Wi-Fi.

Fixes by platform (Windows, macOS, iOS, Android, and routers)

Public Wi-Fi safety improves dramatically when you set strong defaults. The best part: you usually do it once, then your devices behave safely for months.

Windows

  • Enable a kill switch so your traffic won’t “spill” if Wi-Fi drops.
  • Prefer modern protocols like WireGuard (often branded differently) — see VPN protocols.
  • If IPv6 leaks and your VPN doesn’t support it, block IPv6 in the OS or router settings.
  • After major updates, re-run a DNS leak test.

macOS

  • Use the provider’s official app and enable DNS protection / threat protection if available.
  • Keep the OS updated; older network stacks can behave unpredictably on captive portals.
  • If you browse a lot on hotspots, consider a privacy-focused browser profile for travel.

iOS (iPhone/iPad)

  • Use reputable VPN apps and keep them updated; iOS networking is stable but not immune to leaks.
  • If your VPN supports “connect on demand,” enable it for Wi-Fi networks.
  • For step-by-step, see VPN iPhone setup.

Android

  • Enable Always-On VPN and “Block connections without VPN” (Device settings vary by brand).
  • If you need split tunneling, read split tunneling and test it carefully on hotspots.
  • Use MFA for email/work accounts: VPN + 2FA/MFA.

Routers

Key takeaway: The strongest “public Wi-Fi” setup is: VPN + kill switch + DNS protection + periodic leak tests. Everything else is optimization.

Choosing a VPN for public Wi-Fi: what actually matters

For hotspots, you’re not shopping for “features.” You’re shopping for reliability under bad conditions. Public Wi-Fi is often congested, unstable, and full of captive portals. A good VPN should reconnect cleanly, keep DNS inside the tunnel, and support a kill switch.

If you keep hitting CAPTCHAs on Wi-Fi, that can be a shared-IP issue. A dedicated IP sometimes reduces friction — but it’s not required for safety. (It’s more of a comfort upgrade.)

  • No-logs posture: See no-logs VPN — it’s not just a slogan.
  • Leak protection: At minimum, DNS leak protection. Ideally, IPv6 handling and WebRTC guidance.
  • Kill switch: Especially important when roaming across hotel Wi-Fi floors.
  • Protocol quality: WireGuard/OpenVPN support, stable reconnect behavior.
  • Server selection: Use the right server (close for speed, specific regions for access).
Key takeaway: For public Wi-Fi, reliability beats hype: DNS protection + kill switch + stable protocols matter more than flashy add-ons.

Troubleshooting checklist (when Wi-Fi + VPN behaves badly)

  1. Captive portal first: Some hotspots require a browser login before VPN works. Open a browser and complete the portal, then enable VPN.
  2. Switch protocol: If WireGuard struggles, try OpenVPN (or vice versa).
  3. Switch servers: Congestion and blacklists happen — try a different server or region.
  4. Re-run leak tests: Confirm DNS/IPv6/WebRTC after toggling settings.
  5. Check kill switch behavior: A strict kill switch can block internet until VPN is fully connected (that’s normal).
  6. Measure speed correctly: Use a consistent test method: VPN speed testing.
  7. When in doubt: Use your phone hotspot. Sometimes the “best fix” is avoiding a sketchy network.
Key takeaway: Most public Wi-Fi VPN issues are captive portal + protocol + server selection. Fix those three and everything gets calmer.

FAQ: using a VPN on public Wi-Fi

Is public Wi-Fi safe without a VPN?
Usually no. Even with HTTPS, hotspots can enable tracking, spoofed networks, DNS manipulation, and session theft. A VPN reduces local network snooping by encrypting traffic to the VPN server.
Does a VPN protect me from an Evil Twin hotspot?
It helps by encrypting traffic after you connect, but it doesn’t stop you from joining the wrong network. Verify the hotspot name and use a personal hotspot for high-stakes tasks.
What leaks should I test on public Wi-Fi?
Test for DNS leaks, IPv6 leaks, and WebRTC leaks. If these leak, your real IP or the domains you visit may be exposed even while the VPN “looks connected.”
Is it safe to do online banking on public Wi-Fi with a VPN?
A VPN reduces local interception, but banking is still high-stakes. Use MFA, verify the URL, and prefer cellular/personal hotspot when you can. See VPN for online banking.
Why do I get CAPTCHAs when using a VPN?
Shared VPN IP addresses can trigger CAPTCHAs. Switching servers or using a dedicated IP may reduce it.
Should I keep my VPN on all the time when traveling?
If you’re regularly on hotels/cafés/airports, leaving it on is a solid default. Pair it with a kill switch so you don’t leak traffic if the connection drops.
Key takeaway: Public Wi-Fi safety is a system: pick the right network, enable VPN + kill switch, test for leaks, and use MFA.

Conclusion: the “VPN-first” habit is worth it

Public Wi-Fi isn’t going away — and neither are the incentives for attackers. The good news is that your defense can be simple: make a VPN your default on hotspots, lock it with a kill switch, and run quick leak tests when you change settings or devices. It’s not glamorous, but it’s the kind of habit that quietly saves you from headaches later.

If you want to go deeper, start with Wi-Fi safety checklist, then tighten your setup with optimal VPN settings. And if your use case includes streaming or work tools, explore VPN for streaming or VPN for business.

Short video: VPN privacy explained in plain English

Key takeaway: A VPN’s main job is to separate who you are (your IP/ISP/hotspot) from what you do (sites and services). On public Wi-Fi, that separation makes snooping and tampering much harder.

If the player doesn’t load, watch on YouTube: https://www.youtube.com/watch?v=rzcAKFaZvhE.

Denys Shchur – author portrait

About the author

Denys Shchur is the creator of VPN World, focused on practical, test-driven VPN guides, online privacy, and real-world cybersecurity. He runs leak tests and “bad Wi-Fi” experiments so you don’t have to learn the hard way.

Recommended VPN

Affiliate links (nofollow/sponsored).

Disclosure: VPN World may earn a commission if you subscribe via these links — without changing your price.