Phone charger and hack question

Well, in perfect fairness, every Wi-Fi-enabled computing device behaves the same way by default. My Android, my wife’s Windows laptop, even my Linux laptop. All of them.

That’s the reason why the phrase “rogue access point” scares the spit out of security professionals, and why for any application that matters you’re supposed to run an encrypted VPN though the AP.