SSL should do a pretty good job for it already?
The problem isn’t if the encryption works (it does), but if it is available in the first place. I unfortunately still regularly visit websites that don’t support encryption, and there are also a lot of programs that use unencrypted connections which aren’t HTTP(S).
Examples of usually unencrypted connections:
Fixed by using an NTP client and server(s) with NTS support* - Currently no support in Windows.
- DNS (Domain Name System).
Fixed by using DoH, DoT, etc. - Limited support in Windows 11** via “modern” Settings app, full support possible via local DNS server using dnscrypt-proxy
program.
- A bunch of programs like Origin, and God knows what else.
Programs should cryptographically verify unencrypted traffic (as Linux package managers do) but you unfortunately can’t rely on that, regardless it also always exposes your activities and may be used as the entry point for an exploit chain.
*Pro Tip: The German “Physikalisch-Technische Bundesanstalt”, which disseminates the legal time in Germany, has NTP servers with NTS support.
**Only supports a few preconfigured providers, option to use encryption becomes available when, for example, entering 1.1.1.1
as an IP. Adding other providers is possible using netsh dns add encryption ...
, check online for more and up-to-date info on this.
I usually don’t use a VPN on my home network, but when on public or untrusted networks (hotel, airport, etc.) I’d always use a VPN, there are just too many applications that still use unencrypted connections, or may be prone to downgrade attacks.