As I was thinking about network security, what came to mind was the threat posed by someone impersonating a public WiFi hotspot with his own hardware and running a man-in-the-middle attack on my system. The way this would work is that my laptop would connect to the impostor hotspot, because it has the same SSID, the impostor simply forwards all traffic to the valid hotspot, but allows the person running the impostor to monitor traffic. If passwords are sent in the clear, he can see them.
Is there an accepted and relatively easy way to guard against these kinds of scenarios?
Is there an accepted and relatively easy way to guard against these kinds of scenarios?