Apple and Android Mark Wi-Fi Territory

Apple and Android Mark Wi-Fi Territory
Sep 28 2016
https://medium.com/@Devicescape/apple-and-android-mark-wi-fi-territory-1f6c5a56041

There may be nothing bigger than an ‘ant’ between Apple’s Wi-Fi Assist feature and Android’s Wi-Fi Assistant, but the two platforms now demonstrate fundamentally opposing attitudes to freely shared Wi-Fi.

Google recently announced it will be enabling Wi-Fi Assistant (previously exclusive to its Project Fi MVNO customers) on all Nexus devices. Wi-Fi Assistant looks to usher relevant Android devices onto shared public Wi-Fi networks where certain thresholds are met, so the net result will be more Wi-Fi connectivity, in particular over shared, open Wi-Fi in public places.

Apple’s Wi-FI Assist, meanwhile, exists to pull devices away from Wi-Fi networks which drop below a certain performance threshold. And with iOS 10 came a new feature which reacts to any open Wi-Fi networks to which the device connects with an ominous “Security Recommendation” flag.

This would appear likely to drive usage of Wi-Fi down — especially public Wi-Fi because, more often than not, home Wi-Fi is now secure by default.

This is nice, clear differentiation.

In addition to connecting to open networks automatically, the Android solution fires up a VPN to secure the traffic, at least within the open network. While there may be some objections around privacy — the VPN termination is at Google — this is a robust way to provide relatively secure access.

But is it really necessary? Certainly as long as the VPN is configured to reject traffic to and from the local network, it protects against local attacks on the device originating from the network. But shared public Wi-Fi networks configured with client isolation (with which devices on the network are permitted to communicate freely with the Internet, but not with one another directly) provide similar protection.

Moreover, for most users of open Wi-Fi, traffic is typically encrypted end-to-end using SSL connections, so the VPN doesn’t offer a significant improvement in defences. Even searches from mobile devices are usually encrypted now.

There are also downsides. Using a VPN can degrade performance, so some applications might suffer. Others, especially video players which see VPNs as invisibility cloaks allowing users to sneak past geographic licensing restrictions, may not work at all.

With iOS 10, meanwhile, Apple has opted for deterrent rather than protection.

When you tap the info icon alongside the network in your device’s scan list, iOS pops up an information panel which, for me at least, is a little confusing (see screenshot).

An open Wi-Fi network does not really expose all network traffic; any traffic encrypted end-to-end will be protected even over an open Wi-Fi connection. And, while the advice to use WPA2 Personal on a home network is good, there’s not much a customer can do about it in Starbucks.

What these contrasting approaches to Wi-Fi have in common is a desire to be seen acting responsibly in light of any security concerns consumers may have. You can’t throw a stick on the internet today without hitting a scare story about unwittingly surrendering your identity over coffee shop Wi-Fi — thanks largely to the click appeal of any kind of fear-mongering, and much diligent feeding of the press by organizations with security products to sell.

In reality the threat posed by open public Wi-Fi usage is far smaller than some would have us believe.

[snip]

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s