You check in jet-lagged, accept the hotel Wi-Fi terms without reading them, and reach for your phone. Within minutes you're checking email, logging into your bank, opening Netflix. Hotel Wi-Fi feels familiar — but it's not the same thing as the network at home, and the difference is worth understanding before your data goes for a swim.

Why hotel Wi-Fi is a different beast

Hotel networks are designed to be easy to connect to. That's the whole point — rooms full of guests, devices changing nightly, support staff who aren't network engineers. Easy and secure rarely live in the same room.

You're sharing the network with hundreds of other guests. The operator can see a surprising amount about who's connecting to what, and so can a guest who happens to know what they're doing. In many hotels the "Wi-Fi password" is the same for everybody and hasn't changed since the last refurbishment — if it's set at all.

The actual risks (not the scary movie version)

You're not likely to be the personal target of a state-sponsored attacker in a Marriott lobby. The real risks are more mundane and more common:

Captive portals that don't go away. The "accept terms" page that lets you online can intercept and inject content into your connection. Most of the time that's harmless terms-and-conditions stuff — sometimes it isn't.

Evil Twin networks. A laptop in the lobby broadcasting "Hilton-Free-WiFi" can capture credentials from anyone who connects to it instead of the real network. They look identical from the device picker.

Passive sniffing. Other guests on the same network can watch unencrypted traffic. Most modern apps use HTTPS so this is less catastrophic than it used to be, but it's still more visibility than you'd hand to a stranger at home.

What a VPN does on hotel Wi-Fi

A VPN opens an encrypted tunnel from your device to a server you choose. The hotel network, the captive portal, the bloke in the lobby with the suspiciously similar SSID — none of them can see inside that tunnel. They can see that you've connected to a VPN; they can't see what you're doing.

Connect to an Australian server and your apps mostly behave the way they do at home. Connect to a regional server and you get better latency for whatever's nearby. Either way, the hotel network is just dumb pipes from your laptop's perspective.

A practical checklist for your next trip

  • Install the VPN before you leave. Some app stores aren't accessible from every country, and you don't want to be downloading privacy software over a network you don't trust.
  • Turn off auto-connect to open networks on your phone. You don't want your phone silently joining "Free Hotel WiFi" in the lift.
  • Connect to the VPN first, then do anything else. Browsing, email, banking — all of it goes through the tunnel.
  • Skip the captive portal where possible. If your hotel offers ethernet or a personal hotspot via your mobile, those are usually safer than open Wi-Fi.
  • Save the heavy stuff for mobile data. If you're doing something genuinely sensitive — transferring large sums, accessing work systems — tether to your phone over a paid international plan rather than relying on the lobby.
  • Tell your bank you're travelling. Australian banks routinely flag overseas logins. A heads-up before you fly saves a panicked call from the hotel reception.

The point

You don't need to be paranoid about hotel Wi-Fi — you just need to assume the network isn't private. A VPN closes that gap with a single tap. It's one of the cheapest things you can do for your privacy when you're travelling.

Arresti VPN works on iPhone, iPad, Android, macOS, Windows and Linux. One subscription covers up to 5 devices, so the whole travelling household stays protected. Sign up here — AUD $3.99/month, with a 30-day money-back guarantee.