InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

Your Internet Service Provider is Watching — Here’s How to Disappear

Ahmad Javed
InfoSec Write-ups
Published in
4 min read3 days ago

--

Photo by Leon Seibert on Unsplash

You’re scrolling through vacation photos on a café’s free Wi-Fi. A stranger two tables over smirks at their laptop. Coincidence? Maybe. But what if they’re harvesting your login cookies, tracking your bank app, or selling your location history? This isn’t paranoia — it’s Tuesday in 2024.

Last month, my aunt’s credit card details were stolen while she booked flights at an airport lounge. The culprit? Unencrypted Wi-Fi. A 5/monthVPNcould’vesavedher5/monthVPNcouldvesavedher3,000. Let’s break down why everyone — not just hackers and journalists — needs a VPN, and how to choose one without drowning in tech jargon.

Why Your Online Life is an Open Book (And How a VPN Rewrites It)

Your ISP knows every site you visit. Advertisers track your clicks. Public Wi-Fi? It’s a free-for-all for data thieves. A VPN (Virtual Private Network) encrypts your traffic, masks your IP address, and turns you into a digital ghost.

Real-world risks a VPN solves:

  • ISP snooping: Comcast, AT&T, and others legally sell anonymized browsing data.
  • Public Wi-Fi hijacking: Hackers can intercept unencrypted logins in seconds.
  • Price discrimination: Airlines/hotels jack up prices based on your location.

Try this now:
Visit DNSLeakTest.com. If it shows your ISP’s name, you’re exposed.

How to Pick a VPN That Won’t Betray You

Not all VPNs are equal. Some leak data, log your activity, or are secretly owned by ad companies. Here’s your no-BS checklist:

1. The “No-Logs” Litmus Test

A VPN that logs your data is like a lifeguard who sells your swimsuit photos.

What to demand:

  • Independent audits: Look for providers like ExpressVPN or NordVPN audited by firms like Cure53.
  • Jurisdiction: Avoid VPNs based in “Five Eyes” countries (US, UK, Canada…

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ahmad Javed

Certified Ethical Hacker | Google Certified Cybersecurity Analyst | Bug Hunter | Penetration Tester|