I’ve never completely understood this, but I think the answer would probably be “no,” although I’m not sure. Usually when I leave the house I turn off wifi and just use mobile data (this is a habit from my pre-VPN days), although I guess I should probably just keep it on since using strange Wi-Fi with a VPN is ok (unless someone at Starbucks is using the evil twin router trick . . . ?). I was generally under the impression that mobile data is harder to interfere with than Wi-Fi, but I could well be wrong and my notions out of date. So, if need be, please set me straight. 🙂

13 points
*

Using a VPN for your mobile traffic protects your mobile traffic from Flow analysis from your mobile operator. So that is a strict net benefit.

permalink
report
reply
8 points

Protection from what?

If it’s your phone leaking your location, then yes and also disable location services and Bluetooth as well.

You mention interference. Mobile data can be interfered from miles away at the phone company. Same for your home internet.

permalink
report
reply
6 points

What sort of protection are you after? Your VPN should encrypt your data to make it more difficult to snoop on your activity. I wouldn’t trust any random WiFi hot-spot just because you got a VPN encrypting your traffic though.

permalink
report
reply
2 points

Before answering your first question (I’m actually not sure how to answer! I’ll have to think about it 🤔)–my laptop has wifi, which transmits and receives radio waves to/from my router; my router is connected to a cable (broadband cable? I guess? Not DSL at any rate), which is connected to the internet (and there’s also a MODEM in there somewhere too). My laptop doesn’t have the ability to connect by mobile data which uses, I guess?, cell phone towers, but my smartphone can use both. So they’re two different systems is I guess what I’m getting at, and I was never clear on how or if a VPN provided any sort of basic privacy if it was only using cell towers. This is a potentially really dumb question (the head injury doesn’t help 🤕), but remember, William Gibson used to think that computers were powered by these gleaming magical crystals (or so he claims), before he looked inside one and discovered that it was basically just a floppy plastic record spinning around really fast.

permalink
report
parent
reply
9 points
*

The first step in security is to answer who you’re defending against. Someone stealing your phone? A cop with a STINGRAY device? All the security decisions you make are based on your initial threat model.

Generally, home internet, wifi, and cellular data are considered safe against passers-by (assuming your wifi password is strong). However, they are also assumed to be eavesdropped on by your ISP and government. Details of your internet traffic can then also be revealed by your ISP to other people during legal action, such as if you’re being investigated for piracy.

There are ways to further protect your internet traffic from being snooped on, even from your ISP and government, by using things like HTTPS, DNS over HTTPS, and of course, VPNs.

permalink
report
parent
reply
2 points

✔HTTPS 👍

✔VPNs 👍

I thought DNS over HTTPS (DoH!) was not recommended for some reason . . . My VPN provider claims to be using its own DNS servers.

permalink
report
parent
reply
3 points

Definitely not a stupid question! Networking infrastructure is complex. I’ve been working in IT for years and still find myself scratching my head at times going, “Wait, how does the OSI model work again?”

Connecting to a VPN on your phone while using mobile data basically means the cell phone tower handling your data only sees encrypted data. Whoever your VPN provider is will see your traffic instead of the cell tower.

However, in modern times it’s fair to be wary of backdoors and exploits that can compromise your device and render the VPN encryption moot. There’s not much that regular people can really do to mitigate that possibility other than not use a phone.

If you’re interested in learning more networking fundamentals, I’d recommend starting with the OSI model and its layers.

A handy mnemonic I whipped up with ChatGPT last year for better remembering the order of the layers:

Precise Data Navigation Takes Some Planning Ahead

permalink
report
parent
reply
9 points

Note that VPN is just trusting a different network.

If you trust your VPN provider not to misuse your unencrypted traffic / inject exploits, but not your mobile phone provider (or any other network provider you might roam onto), then a VPN provider could help.

If you trust your VPN provider less than the mobile phone provider, the situation is reversed - you would be better not to use a VPN.

If you trust them equally, there is probably no point using a VPN (except for the roaming situation, which could be forced in certain circumstances).

permalink
report
parent
reply
24 points

Usually when I leave the house I turn off wifi and just use mobile data

I would stronly recommend that you set your wifi to only join trusted networks. That way you can also just leave the wifi on and not have it connect to every random network it encounters.

permalink
report
reply
6 points
*

I would still recommend turning wifi off when leaving home for privacy reasons (which can easily be automated). The process to identify if a network is trusted or not requires a handshake. So leaving wifi on makes you trackable by the wifi network operators and the apps on your phone with access to your wifi, wether you connect a network or not.

permalink
report
parent
reply
7 points
*

Any public data exchange has an element of risk, but the management/priority of that risk relates to your relevant risk matrix/profile.

Any exposed data transverses via a provider, be it mobile or Wi-Fi is pertinent, if you are concerned about provider vulnerabilities and exposure, be it Wi-Fi or mobile, use a VPN and related encryption.

permalink
report
reply
3 points

Or don’t. Unless you know that your provider is working against your best interests, a VPN provider is just as likely to be compromised as your cable or mobile ISP.

permalink
report
parent
reply

Technology

!technology@beehaw.org

Create post

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

Community stats

  • 3K

    Monthly active users

  • 3.3K

    Posts

  • 81K

    Comments