Is WiFi confidentiality provided by public hotspot gateways same or worse than WPA2?

As I understand how most WiFi hotspots work, they require the user to authenticate on a Web page that is served by a proxy on the WiFi default gateway. After whatever authentication process (if any) the user went through on the Web page, he is then allowed to connect to the Internet through MAC address filtering. But the WiFi connection is still in the clear and subject to casual eavesdropping isn’t it?

Or are there some WiFi protocols I am not aware of that would allow the user terminal to establish a new encrypted channel (à la WPA2) with the AP based on the interaction that the user had with the Web authentication process?

Edit: To clarify the reason for my inquiry is that I noticed that most WiFi clients nowadays notify the user joining such network that “An authentication is required”. On a mobile phone by selecting this notification the browser will directly open the authentication Web page. So I am supposing that there’s some WiFi protocol level exchange going on between the WiFi client and the AP related to this authentication step, so why not also getting a randomly generated PSK through a public key from the AP?

Continue reading Is WiFi confidentiality provided by public hotspot gateways same or worse than WPA2?

Should I wait for Apple to fix the recent WPA2 KRACK exploit before downloading new apps over Wi-Fi?

Monday of this week: researchers announced the WPA2 KRACK exploit that effectively voids the protection of WPA2. Supposedly Microsoft already fixed it, Apple’s working on patching it for Mac OS and iOS. Android and Linux get … Continue reading Should I wait for Apple to fix the recent WPA2 KRACK exploit before downloading new apps over Wi-Fi?