DarkHotel APT campaigns target C-suite executives at premium hotel chains in 30+ countries. Captive-portal MITM, evil-twin SSIDs, BLE proximity exploits — routine on business-class hotel networks. Your principal's MacBook is the target far more often than the principal themselves. The seven-step protocol corporate-security teams actually use.
Hotel WiFi is structurally hostile by default. DarkHotel APT, evil-twin SSIDs, captive-portal MITM, BLE proximity exploits — routine, not edge cases. The defense is removing devices from the attack surface entirely when not in active use. Faraday-isolation when stowed plus VPN-encrypted traffic when active is the working protocol used by corporate-security teams at finance firms, M&A counsel desks, and journalism organizations. Equipment investment: one Faraday briefcase plus a paid VPN. Total under $200/year.
The same seven-step protocol used by professional corporate-security teams to harden traveling principals against the routine threats on hotel networks. Faraday-stored when stowed, VPN-encrypted when active, devices off (not Sleep) overnight. Made in the United States.
The single highest-leverage step. Drop laptop, tablet, phone, and key fob into the Faraday bag before leaving the room or going to sleep. Hotel network cannot reach; AirDrop discovery cannot leak; BLE proximity attacks cannot complete.
Reputable VPN (1.1.1.1, Mullvad, Proton, NordVPN) configured to auto-connect on ANY new WiFi. Defeats local-network MITM. Set kill-switch to block traffic if the VPN drops.
"Marriott_Guest", "Hilton_Guest", conference WiFi — Forget them all in System Settings → WiFi → Known Networks after each trip. Defeats the evil-twin auto-connect.
System Settings → AirDrop → Receiving Off (or Contacts Only). System Settings → AirPlay & Handoff → AirPlay Receiver Off. Both leak Apple ID hash by default. Re-enable only when actively using.
Carry your own USB-C cable and wall adapter. The "left behind" implant attack class is more sophisticated and harder to detect than juice-jacking.
Sleep keeps wireless radios partially active for wake-on-LAN. Powered-off disables them. Combined with Faraday storage, the gold standard for overnight on hostile networks.
For sensitive calls, leave the room. Take the call from a quiet corner of the lobby or a meeting room — both are usually less surveilled than guest rooms.
REVIS-1 Executive Guard. Three independent Faraday-shielded chambers — laptop, tablet+phone, wallet+keys+RFID. Handles steps 1, 2, and 3 of the protocol in one bag. 76–85 dB across 30 MHz – 10 GHz. Boardroom-appropriate optics for the conference floor and the lobby. The bag the principal already wishes they were carrying.
The bag the principal carries through the lobby. Hand-assembled in the United States. Reaches your door in 3–5 business days.
Acquire — $129General information about hotel-WiFi threat surface as of May 2026. For high-risk operational contexts (state-actor targeting, sensitive M&A travel, journalism on national-security topics), consult dedicated digital-security trainers for full operational planning.