Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

NIX buys ORACLE Foundation, Makes CaryPact Core Standard For Global Decentralized Computing

2026-01-30

Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel

2026-01-30

Monerohub.io Launches as the Essential Central Gateway to the Monero Ecosystem

2026-01-29
Facebook X (Twitter) Instagram
Trending
  • NIX buys ORACLE Foundation, Makes CaryPact Core Standard For Global Decentralized Computing
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»How to Protect your Data Against ISP Snooping
Opinion

How to Protect your Data Against ISP Snooping

ContributorBy Contributor2017-05-02No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

by Ben Dickson

As internet privacy continues to unravel, it is becoming more and more evident that you’re on your own to protect your data against the many parties that are looking to hoard it.

Perhaps one of the most pervasive collectors of data are Internet Service Providers (ISPs), the same companies that connect you to the internet.

ISPs have a huge stake in collecting data, mostly in selling it to advertisers to serve more targeted ads. And they’re in the best position to do so with wild abandon, without fear of retribution.

But a lot more than your preferences can be inferred from your internet traffic, including your health conditions and political orientation among others.

That’s why spy agencies, nation states and other hackers are also looking to lay their hands on your internet traffic data to fulfill their own respective purposes. This makes ISPs an attractive target of cyberattacks.

And as we all know, data breaches happen at a very frequent rate.

As we’ve covered on TechTalks before, encryption is your best defense against intrusions on your data. But in this specific case, if you’re of a mind to prevent your ISP from having its way with your data, here are three things you can do to improve your privacy while surfing the web.

Only browse to HTTPS websites

From a security perspective, there are two kinds of websites: encrypted and unencrypted. URLs that begin with HTTP are not encrypted (browsers like Chrome don’t display the protocol when you browse to an HTTP website). Websites that begin with HTTPS (like the one you’re on right now) encrypt their traffic.

ISPs have full view of HTTP traffic, including the full URL of the page you visit and the data you send back and forth, including names, addresses and passwords.

On the other hand, HTTPS websites provide far better protection against eavesdropping. Sticking to browsing HTTPS websites will make sure your ISP won’t be able to look into the address and content of the pages you visit.

But be careful that HTTPS is not panacea. Your ISP will still know which websites you’re browsing to, if not the specific page within those websites. And that is still enough to find out much about you. For instance, based on the news websites you visit, your political tendencies can be profiled.

Moreover, there are still many popular websites (e.g. CNN) that have not switched to HTTPS, which means you’ll either have to forgo visiting those websites or accept the fact that you’re being watched when you do so.

HTTPS only accounts for websites and web applications. Other services such as FTP and SMTP have their own encryption and privacy problems and solutions.

Use a Virtual Private Network (VPN)

Virtual Private Networks are services that provide you with a secure, encrypted tunnel for your entire internet traffic. When using a VPN, instead of directly connecting to services, you encrypt and channel your traffic to the VPN’s encrypted gateway, which in turn communicates with your destination on your behalf and sends you back the response.

The greatest advantage of using VPNs is that they hide all of your data and metadata. Your ISP will have absolutely no idea what you’re doing or where you’re connecting to. Though it will know that you’re using a VPN.

However, do take care that VPN providers are companies too, which means they have reason to make commercial use of your data. This means your information is as secure as the VPN service you’re entrusting it with is reliable.

And not all VPNs can be trusted, especially those that provide their services for free. In general, it’s better to spare a few bucks per month for your VPN service. Non-free services have less incentive to sell your data. Nonetheless, make sure you review the T&Cs of a VPN and read a couple of reviews about it before signing up.

Moreover, expect some websites and services to act weirdly or block you when connecting through a VPN.It is also natural to experience a little slowdown of your internet connection when using a VPN.

Use the Tor browser

The Onion Router (Tor) is a free, open-source, encrypted browser and a favorite among privacy advocates. Tor encrypts all of its traffic and bounces it off several nodes before sending it to the destination.

The Tor network is run by thousands of volunteers who lend their computers and connection to the service. This makes it much more reliable in terms of trust. There’s no single node that has full knowledge of the inner workings of the service and there’s no commercial motives involved.

However, Tor isn’t without flaws either. It’s been hacked several times, including by the FBI. There are also malicious Tor servers to watch out for.

Also, Tor tends to become very slow, and access restrictions to websites through Tor exit nodes are even more severe than VPNs.

Which option is better?

Well, it really depends on what you intend to do. These three options each have their own strengths and flaws and are suitable in different scenarios. Depending on the hostility of your environment and the criticality of the task you wish to accomplish, you can choose HTTPS, VPN or Tor.

But in any case, you’ll also need to follow these general cybersecurity guidelines, or no amount of secrecy and encryption will protect you.

This article was originally published on Tech Talks. Read the original article here.

 

cyberattacks Internet ISP Privacy security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Contributor

Related Posts

South Africa Could Unlock SME Growth By Exploiting AI’s Potential Through Corporate ESD Funds

2026-01-28

How Local Leaders Can Shift Their Trajectory In 2026

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

The Productivity Myth That’s Costing South Africa Talent

2026-01-21

The Boardroom Challenge: Governing AI, Data And Digital

2026-01-20

Ransomware: What It Is And Why It’s Your Problem

2026-01-19

AI Can Make The Dead Talk – Why This Doesn’t Comfort Us

2026-01-19

Can Taxpayers Lose By Challenging SARS?

2026-01-16
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel

capricorn GROUP (capricorn), the German-based industry leader in automotive and motorsport lightweight technology, presented two…

SARB Holds Repo Rate Steady in Cautious Monetary Policy Decision

2026-01-29

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

How a Major Hotel Group Is Electrifying South Africa’s Travel

2026-01-29

Volvo C70: 30 Years Of The Car That Changed The Way Volvo Looked

2026-01-29

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

NIX buys ORACLE Foundation, Makes CaryPact Core Standard For Global Decentralized Computing

2026-01-30

Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel

2026-01-30

Monerohub.io Launches as the Essential Central Gateway to the Monero Ecosystem

2026-01-29
Recent Posts
  • NIX buys ORACLE Foundation, Makes CaryPact Core Standard For Global Decentralized Computing
  • Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel
  • Monerohub.io Launches as the Essential Central Gateway to the Monero Ecosystem
  • Luxbit.AI Introduces Streamlined Withdrawal Framework to Enhance User Trust and Accessibility
  • SARB Holds Repo Rate Steady in Cautious Monetary Policy Decision
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.