

If someone is offering a public wifi, there is a reasonable expectation that other people sitting in the same cafe for example can’t listen in on what you are doing on your device. As older wifi encyption standards are easily compromised, this requires enforcing a semi-recent wifi-standard. You can of course make your own judgement in your own home, but in a public space it is different.
I think WEP is pretty much dead. Even my first Android (2.2) supported WPA. WPA can still be snooped on with some effort when the attacker has the PW. Apart from that, you’re still trusting whoever supplies the uplink. I do not think people have an expectation of privacy on public networks. There are far too many compromises, the most trivial being an imposter AP. I always tunnel in some way over public wifi by using either Tor or a VPN. So even WEP or fully open is still secure enough for my use.
I would not want user nannying to get in the way of someone who knows how to secure themself. I’m also not quick to support the idea of dumbing down the community so people don’t develop self-defense skills and take personal responsibility. If someone cannot be bothered to tunnel, then hopefully they would buy a device that is configured to insist on WPA3. But in the end this is the user’s responsibility one way or another while nannying is a kind of tyranny.
As for SSL certificates… this isn’t only a captive portal issue. If your device has such outdated root certificates that you run into issues already at the captive portal, you will have also issues with each and every website that uses https.
They are completely independent. I can do what I need so long as the captive portal doesn’t fuck with me. Captive portals can be broken in more ways than the web generally is. And when a captive portal is shit, it’s a disaster across the board… It breaks all apps that need the net.
Root certificates are only cycled out of use for good reasons, such as them becoming compromised, so by using an super old root certificate on your device you are wide open to MITM attacks on supposedly secure connections.
I don’t recall if the sparse cert errors I had were due to root certs or normal certs, but I should indeed pay close attention. My only persistent problem was getting OSMand maps, which I solved by side-loading the maps from a PC.






What is he doing in Youtube? No peertube? I actually cannot reach his video due to anti-Invidious enshitification.
IIRC, someone posted a link to his book here recently and there was some enshitification in the way.