~BSOD~ said:
For its protection all i can say without going too deep in this is by using a IDS enabled firewall which can support ARp cache protection. Encryption(which can be done by the server side) and NEVER forget to log-off from any active session after completing it.
Thing with this is it requires the server you communicate with to be able to decrypt your transmission. So if you were working in a VPN environment all your communications to the VPN server would be ok.
The problem is when you are just using the internet without any VPN, a regular browser at home. No server to decrypt on the other end is there. What are your options then ?
You could use an ssh tunnel to a terminal, your comms would be encrypted all the way through but the response would be much slower so it isn't something you could use unless you're on a fast connection 500kbs and upwards. Even then it might stil be laggy.
A wired connection is safer than a wireless ones relatively spekaing. Harder for an intruder to insert themselves into but not impossible. Cable wallahs cables go through the trees but then there are telltale signs of where the tap occurred.
A cellphone connection could also be sniffed if you had a detector but thats harder.
The Wi-Fi would be the easiest one requiring very little to spy on, assuming the operator isn't very clued into securing his network. This is something that needs to be taken seriously as if anyone does anything illegal here the owner bears the brunt and has to face the difficult task of proving it was not them that committed the act. You prolly would get off but not without unnecessary hassles.
Thing that i've wondered about with cookies is what can the websites you vist do with them. Is there anyway they can tell which other sites you have visited or does the site specific cookie limit them to only what you do on their website.