Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Is it OK to Use this Random Wireless Network I Just Found?

My internet connection went down on a Friday, and the service rep gave me a service call time for Monday, maybe. My HP notebook has wireless capability so I turned it on and checked what wireless networks were available. There are 3 secured and 1 unsecured wireless networks. I am able to logon to the unsecured wireless network, a NETGEAR network. The signal is low and only about 500K but works. Am I breaking the law by using someone else’s wireless network? Is there a way to find out where this wireless network is and who owns it, hopefully it is a free public wireless network? Am I in any danger from using this wireless network? I am not doing anything that requires a password, and I have Windows Firewall, Norton antivirus, and Windows Defender running on my computer.

What you’re doing is very common. With so many open wireless hotspots around, it’s a temptation that’s frequently too hard to resist, particularly when you’re in need.

Yet resist it you should.

There are a number of problems that arise from connecting to an unknown but open hotspot.

Become a Patron of Ask Leo! and go ad-free!

Who owns it?

I don’t have a good approach to identifying the owner of an open hotspot.

The access point name or SSID that’s displayed is often a clue, I suppose, but clearly the person who set up the open hotspot you’re seeing didn’t bother to change the default name, so that’s no help at all.

There’s no reliable way to know for sure, or track it down, without more information.

So we have to assume it’s a poorly-configured access point in someone’s home or business.

Is connecting to it legal?

Caution: Wi-Fi Ahead I am not a lawyer, and I don’t even play one on TV. This should not be considered legal advice.

My guess is, it’s very likely that what you’re doing is, in fact, illegal in most places. Naturally, laws and law enforcement vary greatly from location to location. I have no idea what the law is in your situation, but it’s safest to assume it’s illegal.

Is connecting to it ethical?

Even if it’s legal, using someone else’s internet connection without their permission is at least ethically questionable.

Even if someone leaves their internet connection horribly unprotected in the form of an open Wi-Fi connection, that doesn’t give you the moral right to connect to and use it. For example, they could be on a metered connection, and your use could cost them additional money. At a minimum, it could certainly slow down whatever they’re doing.

That they didn’t set things up properly themselves is no excuse.

At a practical level, though, legality and morality may not even be your biggest issue.

Is connecting to it safe?

When you connect to the internet, the owner of the connection can see everything you do.

Most of the time, you have no need to be concerned. Your “real” ISP (the one you’re paying money to, and the one who’s apparently coming out on Monday) typically doesn’t care. When you visit a friend, they probably don’t care. When you visit a coffee shop or hotel with free internet, they probably don’t care what you’re doing online.

But they might.

If the person down the street notices that his internet has slowed to a crawl at unexpected times, he will care. If he’s tech savvy at all, he might well be able to peek at what you’re doing. Even with a simple router or access point, it’s not that difficult to set up a PC with some software to monitor traffic. It’ll be complex data, perhaps difficult for a lay person to interpret completely, but it’s easy to watch and easy to capture.

Let’s consider two additional risks: malware and liability.

Malware: his, yours, and theirs

You’re exposing your computer to an unknown network.

Since that network has no wireless password, it’s likely the person operating it is less technically savvy than you are. By connecting to their network, you’re about to trust that they’ve set it up properly and securely. The one data point you have says that’s not very likely.

You’ll be exposing your machine to whatever he has on his network, malware and all. Even with a good firewall or VPN on your part, that’s just not a risk worth taking.

Looking at it from the other direction, what happens if your computer has malware and ends up infecting one of the machines on this unknown network? Once again, I’m no lawyer, but I’d expect it’s possible for liability issues to arise should you be discovered as the source.

There’s another even more troubling scenario. Hackers have been known to set up open Wi-Fi hotspots specifically to lure  unsuspecting victims, monitor their internet traffic, and steal valuable information.

Just say no

As you can probably predict by now, my suggestion is simple: don’t do it. Just don’t. There’s too much risk, both legal and technical, if you head down that path.

If you must — if you just can’t help yourself or if you’ve discovered you’re connecting to a legitimate, legally accessible public Wi-Fi hotspot –then of course you need to treat it as you would any open hotspot: How Do I Use an Open Wi-Fi Hotspot Safely?

In your shoes, I’d wait ’til Monday, or perhaps visit a trusted friend, coffee shop, or library.

Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

Podcast audio


10 comments on “Is it OK to Use this Random Wireless Network I Just Found?”

  1. A tech savvy person wouldn’t leave his internet connection open and unsecured.
    The police would probably tell him go and password protect your internet instead of bothering us.

  2. Call me a fool but my system is open, mainly because my wife can’t handle logging on. However, I don’t mind the occasional user of it. I feel that I am paying back for using other’s. I geocache and search for open systems with my iPod to connect to and during lunch hour. All for purely boaring things like news and Facebook. Which brings up the interesting observation that the great application, WiFi Analyser seems to no longer be available. Any insight about that?

    • Log on to your network for her and have the settings in that device remember the network.
      None of our devices (computers, phones, tablets, printers, TV) forget the network when they are turned back on.
      Our phones and tablets have a number of remembered networks in them and automatically connect when near them.

  3. Exactly how does one passively catch malware from a network?

    Passively can mean many things, but a few that come to mind:

    With a poorly quality or poorly configured firewall malware can invade from the outside.

    A savvy enough hacker can configure the access point to intercept your traffic in such a way that when web pages are delivered malware is also inserted with it

    Along those same lines a hacker could configure the access point to intercept and spoof sites you go to and capture your logins – depending on how vigilant you are it’s not that hard, once spoofed, to capture sensitive information.


  4. I think you should spend more time telling them how to protect their computer rather then DON”T HOOK UP! Google keeps trying to set up wid area hookups i.e. Sebastopol,CA. The nuts in town were worried about the radio waves. They didn’t know that onewould be a lot less than thousands of small sites!!

    “How to protect” is covered in this article already on the site and listed in the related links above: How do I stay safe in an internet cafe?


  5. I connected through my neighbors wireless router for a few months while waiting for service from my ISP. Obviously it didn’t work if they switched it completely off, but once it was left on, I got good signals when they were out, and a weaker signal if they were at home using the internet at the same time I was on. I tested it again recently, but they seem to have become a little more tech savvy now and installed a password.

  6. I live in high-rise accommodation. At any point in time, my partner’s laptop can ‘see’ anything up to 20 different networks. That laptop differentiates between networks with the same name, listing them seperately by signal strength, while my works laptop does not. I assume the difference is down to software loaded on the laptops – is there freeware available that does something similar, or is it purely down to bundled software/drivers on the respective machines?

  7. I have a wireless network set up in our house, it is secured but my son gets on his computer daily. How can I look to see what sites he has been visiting from the router?

  8. I live in Malaysia and I remember that I use to often use this one unsecured NETGEAR network with my father’s laptop, the connection speed was pretty good so I figured it was someone close (they were normal families around us), I don’t recall any security problems and there was an anti-virus and (most probably) a firewall, does this mean users of NETGEAR are usually not tech-savy or NETGEAR is populor among hackers and whatnot?
    P.S. My dad’s laptop always did have problems, but he’s very non tech-savy and he never removes the power-adapter or offs the power, though he doesn’t use the net for entertainment. Is it more likely that that caused the problems or my internet usage?

    All it most likely means is that someone failed to set up security on that router. Nothing more nothing less. Yes, it’s possible that it was intentional, but there’s no way to tell. That it was a NetGear router is immaterial.


Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.