T — security type
WPA, WPA2, WPA3, WEP, or nopass (open). WEP is broken — modern phones may refuse to connect. nopass means the network is open with no encryption at the link layer.
Standards · Wi-Fi credential QR
A Wi-Fi QR joins your phone to whatever network name is inside the code — full stop. The danger isn't the QR format (it's standardized and harmless on its own), it's the SSID. A QR with a name like "Starbucks-WiFi-Free" plausibly routes you to a fake hotspot in the parking lot. The defense is reading the network name BEFORE you tap Connect.
The standard is the WIFI: URI scheme, originally introduced by the ZXing project and adopted by the Wi-Fi Alliance. A complete payload looks like:
WIFI:T:WPA2;S:CafeWiFi;P:hunter2;H:false;;
The fields are key-value pairs separated by semicolons. Every modern smartphone camera app recognizes this format and prompts to join the network.
For WPA2-Enterprise (corporate or campus Wi-Fi), the format extends with three more fields — EAP method (PEAP / TLS / TTLS), identity (your username), anonymous identity (the outer EAP identity), and phase-2 authentication method.
WPA, WPA2, WPA3, WEP, or nopass (open). WEP is broken — modern phones may refuse to connect. nopass means the network is open with no encryption at the link layer.
The network name your phone displays after connecting. The most important field to verify. Compare against what the venue advertises in print or on signage.
The pre-shared key for WPA-class networks. Absent for nopass.
true if the network doesn't broadcast its SSID. Hidden networks need to be searched for; not inherently more secure, often less.
For WPA2/3-Enterprise networks: PEAP, TLS, TTLS, PWD. Determines how your phone authenticates to the network's auth server.
Your username on the Enterprise network. Some venues encode a guest identity here; corporate networks expect your real username.
The outer identity visible during the EAP handshake. Used for privacy — the real identity is encrypted inside the tunnel.
For TTLS / PEAP: the inner-tunnel authentication method, usually MSCHAPV2.
The recipe:
Starbucks_WiFi_2, FREE_AIRPORT_WIFI, HotelGuests_5G.Modern apps use HTTPS so credentials and content are encrypted. But:
Our scanner flags SSIDs that look like high-mimicry targets — well-known brand names with confusables decoded — as suspicious so you double-check the network name before joining.
Drop a Wi-Fi QR (image, paste, or camera) into our scanner. The verdict shows:
The scanner runs in your browser; only the decoded text reaches our server for the safety check, not the image.
Drop the QR image, paste the WIFI: string, or use the camera. Verdict shows network name, security type, masked password, and flags lookalikes against high-mimicry brand SSIDs.