Lesson 17 of 25 intermediate

Is Your ISP Spying on You? DNS & SSL Checks

What your internet provider can see and how to protect yourself

Open interactive version (quiz + challenge)

Real-world analogy

Your ISP is like the postal service — they deliver all your mail, but what if they were opening every envelope and reading the contents? DNS is like the address book your phone uses to find websites. Normally your ISP controls this address book, meaning they see EVERY website you visit. SSL encryption is like putting your letters in a locked box — but some ISPs try to pick that lock too.

What is it?

ISP privacy monitoring is the practice of checking whether your Internet Service Provider is tracking, hijacking, or inspecting your internet traffic beyond what is necessary. Through DNS monitoring, SSL inspection, and deep packet inspection, ISPs can see an alarming amount of your online activity. Understanding these techniques helps you make informed choices about protecting your privacy — from simple DNS changes to using a VPN.

Real-world relevance

David noticed that every time he mistyped a website URL, instead of seeing a normal error page he was redirected to a search page full of ads from his ISP. He also noticed his Netflix quality would randomly drop to blurry during prime time even though his speed test showed 100 Mbps. Using DeviceGPT, he checked his DNS settings and found his ISP was hijacking his DNS and likely throttling streaming traffic. He switched to Cloudflare DNS (1.1.1.1) and started using a VPN. The random redirects stopped completely, and his Netflix quality improved because his ISP could no longer identify and throttle his streaming traffic.

Key points

Code example

╔══════════════════════════════════════╗
║   🕵 ISP PRIVACY CHECK GUIDE 🕵     ║
╠══════════════════════════════════════╣
║                                      ║
║  STEP 1: CHECK YOUR DNS              ║
║  □ Go to Settings → Network          ║
║  □ Check current DNS server           ║
║  □ Is it your ISP's? → Change it     ║
║  □ Switch to Private DNS:             ║
║    • dns.google (Google DNS)          ║
║    • one.one.one.one (Cloudflare)     ║
║                                      ║
║  STEP 2: CHECK CERTIFICATES          ║
║  □ Settings → Security → Trusted     ║
║    Credentials                        ║
║  □ Check USER tab for unknowns       ║
║  □ Remove any you didn't install     ║
║                                      ║
║  STEP 3: CHECK FOR HIJACKING         ║
║  □ Type a fake URL in browser        ║
║  □ Normal = error page               ║
║  □ Hijacked = ISP search/ad page     ║
║                                      ║
║  STEP 4: CHECK FOR THROTTLING        ║
║  □ Run speed test normally            ║
║  □ Run speed test through VPN         ║
║  □ VPN speed much higher? =           ║
║    ISP is throttling you              ║
║                                      ║
║  STEP 5: CONSIDER A VPN              ║
║  □ Research trusted VPN providers     ║
║  □ Avoid free VPNs (they sell data)  ║
║  □ Paid VPNs: $3-8/month typically   ║
╚══════════════════════════════════════╝

Line-by-line walkthrough

  1. 1. The guide starts with DNS checking because it is the most common and easiest-to-fix privacy issue. Most people never change their default DNS and do not realize their ISP logs every website lookup.
  2. 2. Certificate checking catches a more serious threat — if unknown user certificates are installed, someone could be decrypting your HTTPS traffic. The USER tab should ideally be empty unless your employer installed work certificates.
  3. 3. The DNS hijacking test is brilliantly simple: visit a fake URL. A normal browser shows an error. If your ISP hijacks DNS, you will see their branded search page instead — instant proof of interference.
  4. 4. The throttling test compares normal speed to VPN speed. If your VPN speed test for streaming is significantly higher than without VPN, your ISP is actively detecting and slowing down your streaming traffic.
  5. 5. The VPN recommendation wisely warns against free VPNs. Free VPN services often make money by collecting and selling the very data you are trying to protect — replacing one privacy problem with another.

Spot the bug

I installed a free VPN app from the
Play Store to protect my privacy.
It asked me to install a security
certificate, which I did.

Now I feel totally safe and private
online. I use it for banking and
enter all my passwords freely.

What could be wrong?
Need a hint?
Think about what that certificate the free VPN asked you to install actually does.
Show answer
A free VPN that installs a certificate on your device can actually decrypt and read ALL your traffic — including passwords and banking data. This is SSL interception. Free VPNs need to make money somehow, and many do it by collecting your data. You should remove the user certificate immediately (Settings → Security → Trusted Credentials → USER tab), uninstall that VPN, and change your passwords. Use a reputable paid VPN instead.

Explain like I'm 5

Imagine the internet is a giant city and every time you want to go somewhere, you have to ask a guide for directions. That guide is your ISP's DNS. The problem? The guide writes down everywhere you go and tells the ISP. Some guides even take you to the wrong place on purpose — to a shop that pays them (ads!). Switching your DNS is like getting a new guide who actually respects your privacy. And using a VPN is like wearing an invisibility cloak — the old guide can see you exist but has no idea where you are going.

Fun fact

In 2017, the US Congress voted to allow ISPs to sell their customers' browsing data without consent. After the vote, one activist raised over $200,000 trying to buy the browsing histories of the Congress members who voted for it. While that specific purchase was not possible due to how the data is aggregated, it highlighted the irony perfectly. Today, ISPs in many countries legally collect and monetize your browsing data as part of their business model.

Hands-on challenge

Do a 3-step ISP privacy check right now. First, go to Settings → Network and find out what DNS server your phone uses — write down the name. Second, go to Settings → Security → Trusted Credentials and check the USER tab for any certificates you did not install. Third, type a completely fake URL in your browser (like 'thiswebsitedefinitelydoesnotexist123.com') and see if you get a normal error or get redirected to an ISP page. Share what you found!

More resources

Open interactive version (quiz + challenge) ← Back to course: Android Phone Health