Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Smart Firewall for Protection of IoT Devices - Are you using any?
Message
<blockquote data-quote="ForgottenSeer 58943" data-source="post: 704494"><p>Some aspects, not all. For example.. Ads, tracking, telemetry is readily blocked. However there are no 'anonymizing' technologies in these types of UTM devices and there probably never will be as their focus is deployment in corporate/enterprise environments and hardening networks from threats.</p><p></p><p>The problem with items like eBlocker is VPN speed. Tor is slow. VPN's are slow. I have a 500Mbps connection right now (used to be 1000Mbps), the fastest VPN I can find is PIA, which can get me close to 150Mbps sustained. I tested 14 VPN's and that was the fastest. Also the throughput of eBlocker can't be impressive due to the limited horsepower of the Pi. It might be good for slow connections or to take traveling. In fact, I have a few Pi3's laying around, I might built an eBlocker just to take to hotels and crap.</p><p></p><p>One of the ways I anonymize traffic coming from my IP is to use something I call PhormFK I had programmed. It runs on the server and sends 1.5 million searches and web clicks and draws the sites from RSS feeds. So anyone sniffing my traffic would have to first filter through 1.5 million piles of trash mixed in with it. This program runs contained in a VM on a DMZ isolated at the physical port level from the other internal subnets. I call it 'chaffing' for privacy. It's a piece of some of the undisclosed technology I run here. <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /> One of the ways I test security products under isolated but high risk conditions is to simulate a 'clicker' environment with these kinds of tools, but when we set the values really high they become tools for chaff of the internet activity.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 58943, post: 704494"] Some aspects, not all. For example.. Ads, tracking, telemetry is readily blocked. However there are no 'anonymizing' technologies in these types of UTM devices and there probably never will be as their focus is deployment in corporate/enterprise environments and hardening networks from threats. The problem with items like eBlocker is VPN speed. Tor is slow. VPN's are slow. I have a 500Mbps connection right now (used to be 1000Mbps), the fastest VPN I can find is PIA, which can get me close to 150Mbps sustained. I tested 14 VPN's and that was the fastest. Also the throughput of eBlocker can't be impressive due to the limited horsepower of the Pi. It might be good for slow connections or to take traveling. In fact, I have a few Pi3's laying around, I might built an eBlocker just to take to hotels and crap. One of the ways I anonymize traffic coming from my IP is to use something I call PhormFK I had programmed. It runs on the server and sends 1.5 million searches and web clicks and draws the sites from RSS feeds. So anyone sniffing my traffic would have to first filter through 1.5 million piles of trash mixed in with it. This program runs contained in a VM on a DMZ isolated at the physical port level from the other internal subnets. I call it 'chaffing' for privacy. It's a piece of some of the undisclosed technology I run here. :) One of the ways I test security products under isolated but high risk conditions is to simulate a 'clicker' environment with these kinds of tools, but when we set the values really high they become tools for chaff of the internet activity. [/QUOTE]
Insert quotes…
Verification
Post reply
Top