Winston Privacy Device - Which Technology?
-
@WinstonPrivacy said in Winston Privacy Device - Which Technology?:
few field units out there since September
There is a huge difference between a few in the field and 1,000 if not 10's of Ks of them on a ISP network that figures it out and gets freaking pissed ;)
You want to hawk your "security" box to the masses that don't understand it that is fine - route their traffic to your network..
But meshing these things and routing billy's traffic over karen's connection is BAD JUJU just waiting to hit the fan if you ask me.. Especially first time kevin moves any sort of kiddy you know what about thinking he is "safe" behind your security device..
given that it's impossible to discern the source of specific traffic.
Any ISP can for sure tell that billy is going to alot of crazy places for a home of 2 people ;) And can for sure tell something is up and take a closer look when lets say 1000 of their users usage just went up by 30% and is just all over the place vs just karen's typical streaming netflix usage..
So how is you state
As an example, let's say your iSP wants to record your internet activity (most do)
But then you say you have ISP that are saying it going to be ok to put these boxes on their network - which will prevent them from tracking their own users..
-
Any chance we can get instructions how to load PfSense onto the HW we purchased?
-
Um..... that seems very unlikely? Especially since reading back they are using ARM (MIPS?).
Just a spam comment 2 years later?
-
-
@stephenw10 Woot
-
-
@jwt It was more the non standard ARM hardware
-
@stephenw10 man you need to update your support contract ;) its expiring soon..
-
@nogbadthebad itβs not that different from the 1100β¦
-
@kom Check out iot inspector to see what lurks in your home https://inspector.engineering.nyu.edu/
-
@parry said in Winston Privacy Device - Which Technology?:
https://inspector.engineering.nyu.edu/
Not a fan of doing arp spoofing.. The tool might be the greatest thing since sliced bread for collecting info.. But arp spoofing to get devices to send traffic to some device on your network other than where it should go could be seen as "bad" as well.
Why can not not just take a sniff of their traffic and load it into the tool? Is that an option? I don't see it anywhere. I also see that the linux version was suppose to be ready back in may of 2020, covid kill work on this project?
Or better yet ability to do a span port and let the tool see all the traffic, without having to spoof any macs..
-
@johnpoz
Hey John, you ever worked at a University ;) Er nothing is quite as fast as you want it to be. I agree some of that stuff needs to be updated, but if you like shoot him a note about your ideas. These folks actually listen to others. Ironically there is a company in Germany called IoT Inspector https://www.iot-inspector.com/ that has absolutely nothing to do with the academic work.