What your network is whispering.
Wisp Logo Wisp Logo

You can't read their source code. But you can read every byte they send.

100% LOCAL  ยท  NO ACCOUNTS  ยท  NO SERVERS  ยท  OPEN AUDIT LOG  ยท  macOS NATIVE
Exhibit A โ€” Capabilities
๐Ÿ•ถ๏ธ
Privacy Mode
See which apps phone home when they think you're not watching. Real-time classification with AI narratives.
๐ŸŒ
Globe View
3D globe fed by 212 data sources shows where your data flows in real-time. Arcs colored by threat level. Click any arc for the full story.
๐Ÿ’€
Hacker Mode
Full packet inspection. Monaco editor, hex dumps, TLS certs, timing waterfall. The raw bytes on the wire.
๐Ÿ›ก๏ธ
Browser Guard
Detect when apps inject tracking scripts into web views. BrowserGate-style attacks caught before they report.
Exhibit B โ€” The Evidence

INTERCEPTED TRANSMISSIONS

These aren't hypothetical. These happened.

LITIGATION PENDING
POST /li/track
Host: analytics.linkedin.com
X-LI-Track: extensions=probe
Body: {"browser":"chrome",
"extensions_found":6247,
"fingerprint":"ext_enum_v3"}
Extension Fingerprinting
LinkedIn ยท 2024
LinkedIn probed for 6,247 browser extensions to build a unique fingerprint of each visitor โ€” identifying users across sessions even without cookies.
NO ACCOUNTABILITY
POST /api/telemetry
Host: analytics.trae.ai
X-BD-Trace: workspace_scan
Body: {"files":[".env","secrets.yml"],
"contents":"API_KEY=sk-......",
"dest":"cn-north-1.bytedance"}
ByteDance Phone-Home
Trae IDE ยท 2025
ByteDance's code editor transmitted workspace file trees, open tab contents, and keystrokes to servers in mainland China โ€” silently, even when telemetry was toggled off.
$725M SETTLED
GET /tr?id=PIXEL_ID
Host: connect.facebook.net
Referer: hospital-portal.com
ev=PageView&cd={"diagnosis":
"depression","page":"/rx/fill",
"uid":"patient_38291"}
Meta Pixel Exfiltration
Meta / Facebook ยท 2022
Meta's tracking pixel was embedded on hospital websites, transmitting health conditions, prescriptions, and patient data directly to Facebook's ad infrastructure.
$85M SETTLED
CONNECT zoom.us:443
Routed: cn-bj-1.zoom.com.cn
Encryption: AES-128-ECB
Claimed: "End-to-End AES-256"
Key-escrow: zoom-infra/cn-keys
Meeting: DECRYPTABLE
Zoom Encryption Deception
Zoom ยท 2020
Zoom claimed end-to-end encryption while routing traffic through Chinese servers. Meeting content and encryption keys were accessible despite E2E promises.
Exhibit C โ€” The Threat Landscape

WHY THIS EXISTS

The last decade of attacks. The reason you need to see every byte leaving your machine.

๐Ÿ”’ RANSOMWARE
$30B+ total damage ยท trend: accelerating
2017 โ€” NotPetya โ€” Maersk lost 45K PCs, 4K servers. $10B global damage from a single Ukrainian tax update.
2017 โ€” WannaCry โ€” NHS crippled. hospitals diverted patients, cancelled surgeries. 200K machines in 150 countries.
2021 โ€” Colonial Pipeline โ€” US East Coast fuel supply halted. Root cause: no MFA on a legacy VPN.
2024 โ€” Change Healthcare โ€” 100M patient records. Paid $22M ransom. Then extorted again by a second group.
๐Ÿ”— SUPPLY CHAIN
$60B+ annually by 2025 ยท doubling year-over-year
2020 โ€” SolarWinds โ€” Backdoored update reached Pentagon, DHS, Treasury, DOE, Microsoft, Intel. 18,000 orgs compromised.
2021 โ€” Log4Shell โ€” A zero-day in a logging library triggered by a Minecraft chat message. CVSS 10.0.
2024 โ€” XZ Utils โ€” Two-year social engineering attack on a volunteer maintainer. Caught because of 500ms SSH latency.
2025 โ€” React2Shell โ€” Prototype pollution โ†’ RCE. CVSS 10.0. 571,249 public servers vulnerable at disclosure.
๐ŸŽฏ NATION-STATE
cyber as a tool of conflict ยท damage: incalculable
2010 โ€” Stuxnet โ€” US/Israel malware crossed air-gapped networks to destroy 1,000 Iranian centrifuges. First cyber weapon.
2015 โ€” OPM Breach โ€” China exfiltrated 22.1M federal employee records + 5.6M fingerprints. Every US security clearance holder exposed.
2024 โ€” Salt Typhoon โ€” Chinese hackers inside US wiretap systems. AT&T, Verizon, T-Mobile compromised. Ongoing.
โšก ZERO-DAYS
black market: $2M+ per exploit ยท 97 exploited in 2023
2016+ โ€” Pegasus/NSO โ€” Zero-click iPhone exploits. Victims compromised from a message they never opened.
2017 โ€” EternalBlue โ€” Stolen NSA exploit. Powered two most destructive cyberattacks in history (WannaCry + NotPetya).
2024 โ€” Ivanti VPN โ€” CISA ordered all federal agencies to fully disconnect Ivanti appliances. Active exploitation in the wild.
๐Ÿญ CRITICAL INFRASTRUCTURE
where cyber meets physical ยท consequences measured in lives
2015 โ€” Ukraine Power Grid โ€” Russian hackers remotely opened breakers. 230,000 people lost power in December.
2021 โ€” Oldsmar Water โ€” Attacker increased sodium hydroxide to 100x lethal levels in Florida water supply. Caught by operator watching screen.
2025 โ€” UK Retail Siege โ€” DragonForce hit M&S, Co-op, and Harrods in weeks. Supply chains halted, online orders frozen.
[ CURRENT THREAT FEED ]

Bybit โ€” $1.5B stolen (largest crypto heist ever)
Jaguar Land Rover โ€” ยฃ1.9B data breach via Hellcat ransomware
Red Hat GitLab โ€” 570GB source code leaked
React2Shell โ€” CVSS 10.0 โ€” 571K servers vulnerable
AI Phishing โ€” 1,265% increase since ChatGPT launch
The Current Wave
2025โ€“2026
Identity abuse, not zero-days, drives most breaches now. Stolen credentials. Session tokens. Social engineering. The attack surface isn't technical โ€” it's human.
๐Ÿ”“ EARLY ACCESS
Everything free. No paywalls. No tiers. Just raw network intelligence for those who want to see.
Get Early Access
still hacking on this thing โ€” stay close.