In addition to fake cell phone towers, your adversary may have also set up WiFi networks intended on tracking you or eavesdropping on your connection when you use them. To avoid this, only connect to secured WiFi networks run by an operator that you can trust.
When you connect to a WiFi network without password, you should assume that none of your traffic is private. These unsecured networks are commonly offered at Starbucks and other coffee shops. It is best to avoid them unless you are also using a Virtual Private Network (VPN).
WEP and WPA are the names of two WiFi security standards that are considered weak in modern times. WPA2 Personal and WPA2 Enterprise are currently the standards of choice.
Major WiFi networks run by corporations, universities, and governments are typically secured with a certificate. The first time you connect with these networks, you should check the certificate to see if it is legitimate. The IT department that runs WiFi network can provide you with instructions on how to do this.
Many computer programs periodically make connections to remote servers. These connections may de-anonymize you and reveal your locations. Some programs that do this include:
Mail clients that periodically check for new mail.
Proprietary programs that check a central server to make sure that you paid for the program.
Software that sends a bug report to the developer whenever it crashes.
Malware that connects to a command-and- control server to receive new instructions and to send your personal information.