Everything is compromised one way or another
All these networks should be assumed as compromised and as such Bring your own encryption (BYOE) as your own layer on top is what any privacy conscious entity is operating.
All these networks should be assumed as compromised and as such Bring your own encryption (BYOE) as your own layer on top is what any privacy conscious entity is operating.