Again, we are not talking about the dozen big player names here. we are talking about hostmonster and hostgator. I just opened an ssh session to my server and did a netstat at the prompt. You may be able to see in-flight connection state, but that's about it and certainly doesn't amount to sniffing traffic.
So far is listing 1000 connections and it's resolving who is connected, they are shared servers not virtual ones.
Dave's server is dedicated. On a shared server, you won't have permissions to sniff traffic without compromising the server, which is out of scope of this discussion.
The difference between < $10 month or over $100 for a virtual server is cheaper infrastructure. I guess I could do a tcpdump or nmap to prove it but I don't want to raise any alarms at my provider
No, you're revealing your ignorance. You clearly have no idea what you're talking about.
Nobody uses hubs any more, at any price point. They are literally extinct and haven't been made for 20 years or more. On a switched LAN passive attacks are not practical. Active attacks are possible, but pretty non-trivial and disruptive and someone will likely notice. That still requires you be on the same layer 2 segment as the attacker, which is fairly unlikely.
but ifconfig returns 65 different servers on my server, so I could intercept anything that is going on at least on those servers, maybe even their full network.
No you can't.
Edit: BTW my server which has no traffic other than once in a blue moon, the ethernet port has transmitted 11.6 TiB (hate that term) so 10.55 TB and received 1.27 TB of data and that is bytes not bits. I don't get that much traffic on my puny server
xiB = base 2. Your unit conversion is wrong.
By a massive margin, the likely attack is on the access side. Open wifi, office networks with unscrupulous IT folks or just asshole bosses. Nobody is going to bother going to the extent required to sniff the traffic between CloudFlare and a small-time operator. Maybe if they make themselves a target like LavaBit or something, but the bar is many, many orders of magnitude higher than running aircap on a laptop at a busy Starbacks and seeing what you get.
Will it protect you against the knowledgable, well-funded attacker making a specific effort to see
your traffic? No. But it certainly doesn't hurt against that attacker, and will protect you completely from the kid in the coffee shop, who for most people is probably the only threat they ever face.
I agree it's probably not a good default configuration for CF, and it would be nice if there were a way to indicate "crypto not used everywhere" in the browser, but it's ridiculous to say that it doesn't do anything for security. It's a massive difference in risk than doing nothing at all.