How could my privacy be compromized in the time between me connecting to a public/work wifi hotspot and the time my vpn is connected.
Is there any use in 1. turning on my mobile data, 2. Connect to vpn, 3. Switch to wifi? Or it is just unnecessary and convoluted.
You’ll be fine. To be honest most VPN marketing is just fear-mongering. Most things you do are encrypted anyways so public WiFi isn’t that risky.
If you are concerned these things will be much more helpful than worrying about this small race:
- Use some form of encrypted DNS like DoH or DoT.
- Enable the “Always use HTTPS” setting in your browser. This way you won’t make an unencrypted connection without manually approving it first.
Turning the VPN before connecting to WiFi may help but it depends how it is implemented. The VPN connection will need to be re-established on WiFi. So unless your OS blocks network traffic until that happens you may still leak. IDK if any phones have strong settings here.
Yeah,I get it. I askek mistly out of curiosity. I think I do all your recomentation thought for my phone I have to double check.
If you’re using WireGuard, then have a look for an ‘on-demand’ setting where you can define which networks require VPN.
Thanks. But hypothetically even in that scenario if I’m offline and I want to turn VPN on, first I need toconnect to internet and then trought that initial connection communicate with the vpn server to turn VPan on. Right? So I’ll still be volnurable for a moment especially if a lot of app are programmed to sent data onlne the moment they find internet access.
To avoid this leak, you should use a firewall rule to forbid the outbound internet traffic to anything except the VPN IP address.
There is a good post about doing this using UFW on Linux: https://www.linode.com/docs/guides/vpn-firewall-killswitch-for-linux-and-macos-clients/#vpn-firewall-using-ufw