{"video_id":"4YbXXW3DLQM","title":"Public Wi-Fi Security Risks As Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2016-05-06T14:58:16Z","duration_s":335,"segments":[{"start_s":0.32,"end_s":7.24,"text":"ah what could be better than sitting in your favorite coffee shop sipping an","speaker":null,"is_sponsor":0},{"start_s":4.08,"end_s":9.2,"text":"overpriced latte Chino thing and","speaker":null,"is_sponsor":0},{"start_s":7.24,"end_s":16.039,"text":"browsing whatever the drama of the day is on Reddit I'll tell you doing it","speaker":null,"is_sponsor":0},{"start_s":12.92,"end_s":18.439,"text":"securely although public Wi-Fi networks","speaker":null,"is_sponsor":0},{"start_s":16.039,"end_s":25.48,"text":"are useful for staying connected on the go they're also notorious for being easy","speaker":null,"is_sponsor":0},{"start_s":22.199,"end_s":27.88,"text":"for attackers to spy on and see a heck","speaker":null,"is_sponsor":0},{"start_s":25.48,"end_s":32.599,"text":"of a lot more than just the Dank memes that you send to your friends so why are","speaker":null,"is_sponsor":0},{"start_s":30.439,"end_s":37.2,"text":"these networks so insecure what are some of the common ways they get attacked and","speaker":null,"is_sponsor":0},{"start_s":34.76,"end_s":43.2,"text":"what can you do to keep prying eyes away from your browsing habits even though","speaker":null,"is_sponsor":0},{"start_s":41.12,"end_s":48.719,"text":"public Wi-Fi hotspots have been around since the early 2000s and people have","speaker":null,"is_sponsor":0},{"start_s":45.96,"end_s":53.16,"text":"generally become more aware of online security risks since then there are","speaker":null,"is_sponsor":0},{"start_s":50.879,"end_s":58.519,"text":"still a number of common vulnerabilities that attackers can exploit for instance","speaker":null,"is_sponsor":0},{"start_s":56.12,"end_s":63.96,"text":"many public Wi-Fi networks use no password or encryption of any sort in","speaker":null,"is_sponsor":0},{"start_s":61.719,"end_s":67.56,"text":"which case attackers can see all the traffic on the network and you actually","speaker":null,"is_sponsor":0},{"start_s":65.799,"end_s":71.759,"text":"don't even need any special hacking skills to do it there are plenty of","speaker":null,"is_sponsor":0},{"start_s":70.0,"end_s":76.6,"text":"programs floating around that enable spying on unsecured networks with just a","speaker":null,"is_sponsor":0},{"start_s":74.24,"end_s":82.52,"text":"few Mouse clicks now you might assume that public Wi-Fi that uses WPA2 psk the","speaker":null,"is_sponsor":0},{"start_s":80.479,"end_s":88.759,"text":"standard data flow encryption in most modern routers is safe and that would be","speaker":null,"is_sponsor":0},{"start_s":86.84,"end_s":94.399,"text":"true in a home setting as you're only sharing a password with people you trust","speaker":null,"is_sponsor":0},{"start_s":91.079,"end_s":96.479,"text":"but in a public place like a cafe anyone","speaker":null,"is_sponsor":0},{"start_s":94.399,"end_s":101.92,"text":"with the password who connects before you do can spy on your handshake the","speaker":null,"is_sponsor":0},{"start_s":99.88,"end_s":106.6,"text":"communication that occurs between your device and the access point when you","speaker":null,"is_sponsor":0},{"start_s":103.84,"end_s":111.799,"text":"first connect to the hotspot in this way an attacker can steal your encryption","speaker":null,"is_sponsor":0},{"start_s":108.96,"end_s":116.96,"text":"key and see all of your traffic even though your connection is encrypted","speaker":null,"is_sponsor":0},{"start_s":114.68,"end_s":121.68,"text":"public Wi-Fi is also susceptible to something called a man-in-the-middle","speaker":null,"is_sponsor":0},{"start_s":118.479,"end_s":123.759,"text":"attack which is just what it sounds like","speaker":null,"is_sponsor":0},{"start_s":121.68,"end_s":130.52,"text":"a bad person sitting in between your device and the internet looking at all","speaker":null,"is_sponsor":0},{"start_s":126.719,"end_s":133.12,"text":"of your stuff as it flies by many times","speaker":null,"is_sponsor":0},{"start_s":130.52,"end_s":138.319,"text":"this kind of attacker will set up a fake Wi-Fi hotspot that looks like a legit","speaker":null,"is_sponsor":0},{"start_s":136.16,"end_s":141.68,"text":"one if you connect to it your internet traffic will go right through the","speaker":null,"is_sponsor":0},{"start_s":139.68,"end_s":147.0,"text":"attacker's computer possibly allowing them to see whatever you're doing okay","speaker":null,"is_sponsor":0},{"start_s":144.36,"end_s":152.84,"text":"lonus I get it public Wi-Fi is about as secure as a screen door made of cheap","speaker":null,"is_sponsor":0},{"start_s":150.68,"end_s":157.92,"text":"but is there any way that I can use it without broadcasting everything I'm","speaker":null,"is_sponsor":0},{"start_s":155.0,"end_s":161.68,"text":"doing fortunately yes there are a number of things you can do to protect yourself","speaker":null,"is_sponsor":0},{"start_s":159.92,"end_s":166.56,"text":"number one use https you know that thing that encrypts","speaker":null,"is_sponsor":0},{"start_s":164.64,"end_s":171.2,"text":"your connection and puts a little lock icon in the corner of your browser many","speaker":null,"is_sponsor":0},{"start_s":168.959,"end_s":176.2,"text":"websites that require login such as Gmail and Facebook use https by default","speaker":null,"is_sponsor":0},{"start_s":174.68,"end_s":181.2,"text":"but for sites that don't you can actually download browser extensions","speaker":null,"is_sponsor":0},{"start_s":178.239,"end_s":185.48,"text":"that Force sites to use an https connection as long as the site supports","speaker":null,"is_sponsor":0},{"start_s":183.44,"end_s":189.44,"text":"it some of these will also enable sending your cookies over a secure","speaker":null,"is_sponsor":0},{"start_s":187.36,"end_s":193.48,"text":"connection to prevent cookie theft which you can learn more about here this","speaker":null,"is_sponsor":0},{"start_s":191.48,"end_s":199.76,"text":"allows your traffic to be unintelligible to attackers even over an unsecured","speaker":null,"is_sponsor":0},{"start_s":196.08,"end_s":202.68,"text":"Wi-Fi connection or number two use a","speaker":null,"is_sponsor":0},{"start_s":199.76,"end_s":207.56,"text":"virtual private Network or VPN for more serious security this will create a","speaker":null,"is_sponsor":0},{"start_s":204.879,"end_s":211.84,"text":"secure tunnel between your device and a proxy server that encrypts all traffic","speaker":null,"is_sponsor":0},{"start_s":210.239,"end_s":218.28,"text":"even if the site you're visiting doesn't support https vpns are available as both","speaker":null,"is_sponsor":0},{"start_s":215.239,"end_s":220.28,"text":"free and paid services and often let you","speaker":null,"is_sponsor":0},{"start_s":218.28,"end_s":224.72,"text":"choose between various tiers of service depending on your needs and finally","speaker":null,"is_sponsor":0},{"start_s":222.599,"end_s":229.2,"text":"number three make sure to ask the management at whatever establishment","speaker":null,"is_sponsor":0},{"start_s":226.92,"end_s":234.159,"text":"you're visiting what the name of their actual Wi-Fi network is to avoid","speaker":null,"is_sponsor":0},{"start_s":231.4,"end_s":239.04,"text":"connecting to a fake access point remember identifying fakes won't always","speaker":null,"is_sponsor":0},{"start_s":236.519,"end_s":245.159,"text":"be as easy as not connecting to the Shady White van parked outside Wi-Fi","speaker":null,"is_sponsor":0},{"start_s":241.599,"end_s":248.879,"text":"network and this is related to our topic","speaker":null,"is_sponsor":0},{"start_s":245.159,"end_s":249.959,"text":"today sort of I mean apps are online and","speaker":null,"is_sponsor":0},{"start_s":248.879,"end_s":254.319,"text":"we're talking about on anyway don't worry about it too much brain tree yes","speaker":null,"is_sponsor":0},{"start_s":252.56,"end_s":259.519,"text":"my friends if you're building a mobile app and looking for a simple payment","speaker":null,"is_sponsor":0},{"start_s":256.16,"end_s":261.759,"text":"solution brain tree could be the way to","speaker":null,"is_sponsor":0},{"start_s":259.519,"end_s":267.8,"text":"go probably is the way to go check out their v.0 SDK which is an easy way to","speaker":null,"is_sponsor":0},{"start_s":265.68,"end_s":273.52,"text":"add every like pretty much everything Apple pay Android pay PayPal venmo","speaker":null,"is_sponsor":0},{"start_s":270.639,"end_s":278.56,"text":"credit cards and even Bitcoin support with just a few lines of code and if","speaker":null,"is_sponsor":0},{"start_s":276.56,"end_s":282.28,"text":"you're having any trouble it's as simple as getting in touch with their friendly","speaker":null,"is_sponsor":0},{"start_s":280.08,"end_s":289.16,"text":"support people to walk you through it brain tree is used by Uber Airbnb and","speaker":null,"is_sponsor":0},{"start_s":285.6,"end_s":291.68,"text":"GitHub so it is scalable and the coolest","speaker":null,"is_sponsor":0},{"start_s":289.16,"end_s":295.8,"text":"thing today is that if you head over to braintree.com tequ you can get your","speaker":null,"is_sponsor":0},{"start_s":294.72,"end_s":302.0,"text":"first $50,000 in transactions fee free as as","speaker":null,"is_sponsor":0},{"start_s":299.72,"end_s":306.32,"text":"our way of saying try out brain free today and see how it works for you so","speaker":null,"is_sponsor":0},{"start_s":304.72,"end_s":311.44,"text":"thanks for watching guys if you enjoyed this video wait this one and if you didn't","speaker":null,"is_sponsor":0},{"start_s":309.36,"end_s":315.24,"text":"enjoy it then the other one also check out our other channels lineus Tech tips","speaker":null,"is_sponsor":0},{"start_s":313.12,"end_s":318.8,"text":"and Channel Super Fun we are going to have a pretty amazing video over on","speaker":null,"is_sponsor":0},{"start_s":317.52,"end_s":322.84,"text":"Channel Super Fun we're going to be playing rocket league in real life so","speaker":null,"is_sponsor":0},{"start_s":320.919,"end_s":326.12,"text":"check that out up there get subscribed and all that good stuff also leave a","speaker":null,"is_sponsor":0},{"start_s":324.68,"end_s":329.88,"text":"comment with video suggestions for future episodes if you have any and get","speaker":null,"is_sponsor":0},{"start_s":328.199,"end_s":333.16,"text":"subscribed here on Techquickie so you don't miss any more of these videos","speaker":null,"is_sponsor":0},{"start_s":331.96,"end_s":336.44,"text":"especially if we make one that you suggest right","speaker":null,"is_sponsor":0}],"full_text":"ah what could be better than sitting in your favorite coffee shop sipping an overpriced latte Chino thing and browsing whatever the drama of the day is on Reddit I'll tell you doing it securely although public Wi-Fi networks are useful for staying connected on the go they're also notorious for being easy for attackers to spy on and see a heck of a lot more than just the Dank memes that you send to your friends so why are these networks so insecure what are some of the common ways they get attacked and what can you do to keep prying eyes away from your browsing habits even though public Wi-Fi hotspots have been around since the early 2000s and people have generally become more aware of online security risks since then there are still a number of common vulnerabilities that attackers can exploit for instance many public Wi-Fi networks use no password or encryption of any sort in which case attackers can see all the traffic on the network and you actually don't even need any special hacking skills to do it there are plenty of programs floating around that enable spying on unsecured networks with just a few Mouse clicks now you might assume that public Wi-Fi that uses WPA2 psk the standard data flow encryption in most modern routers is safe and that would be true in a home setting as you're only sharing a password with people you trust but in a public place like a cafe anyone with the password who connects before you do can spy on your handshake the communication that occurs between your device and the access point when you first connect to the hotspot in this way an attacker can steal your encryption key and see all of your traffic even though your connection is encrypted public Wi-Fi is also susceptible to something called a man-in-the-middle attack which is just what it sounds like a bad person sitting in between your device and the internet looking at all of your stuff as it flies by many times this kind of attacker will set up a fake Wi-Fi hotspot that looks like a legit one if you connect to it your internet traffic will go right through the attacker's computer possibly allowing them to see whatever you're doing okay lonus I get it public Wi-Fi is about as secure as a screen door made of cheap but is there any way that I can use it without broadcasting everything I'm doing fortunately yes there are a number of things you can do to protect yourself number one use https you know that thing that encrypts your connection and puts a little lock icon in the corner of your browser many websites that require login such as Gmail and Facebook use https by default but for sites that don't you can actually download browser extensions that Force sites to use an https connection as long as the site supports it some of these will also enable sending your cookies over a secure connection to prevent cookie theft which you can learn more about here this allows your traffic to be unintelligible to attackers even over an unsecured Wi-Fi connection or number two use a virtual private Network or VPN for more serious security this will create a secure tunnel between your device and a proxy server that encrypts all traffic even if the site you're visiting doesn't support https vpns are available as both free and paid services and often let you choose between various tiers of service depending on your needs and finally number three make sure to ask the management at whatever establishment you're visiting what the name of their actual Wi-Fi network is to avoid connecting to a fake access point remember identifying fakes won't always be as easy as not connecting to the Shady White van parked outside Wi-Fi network and this is related to our topic today sort of I mean apps are online and we're talking about on anyway don't worry about it too much brain tree yes my friends if you're building a mobile app and looking for a simple payment solution brain tree could be the way to go probably is the way to go check out their v.0 SDK which is an easy way to add every like pretty much everything Apple pay Android pay PayPal venmo credit cards and even Bitcoin support with just a few lines of code and if you're having any trouble it's as simple as getting in touch with their friendly support people to walk you through it brain tree is used by Uber Airbnb and GitHub so it is scalable and the coolest thing today is that if you head over to braintree.com tequ you can get your first $50,000 in transactions fee free as as our way of saying try out brain free today and see how it works for you so thanks for watching guys if you enjoyed this video wait this one and if you didn't enjoy it then the other one also check out our other channels lineus Tech tips and Channel Super Fun we are going to have a pretty amazing video over on Channel Super Fun we're going to be playing rocket league in real life so check that out up there get subscribed and all that good stuff also leave a comment with video suggestions for future episodes if you have any and get subscribed here on Techquickie so you don't miss any more of these videos especially if we make one that you suggest right"}