but how are you supposed to tell the difference between whats set up for public use and whats just not secured?