Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. Question about network security

Question about network security

Scheduled Pinned Locked Moved Privacy
privacy
8 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W This user is from outside of this forum
    W This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

    
    # Network Security
    
    Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
    
    Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
    
    Firewall & Network Segmentation:
    Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
    
    
    Network Traffic Monitoring:
    Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
    
    DNS Security:
    Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
    
    WiFi Security Best Practices:
    For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
    
    For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
    
    Tor for router:
    Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
    
    Check your logs regularly - firewall, system, DNS requests.
    
    IoT Devices:
    Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
    
    L ? F D 6 Replies Last reply
    1
    0
    • System shared this topic on
    • W [email protected]

      Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

      
      # Network Security
      
      Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
      
      Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
      
      Firewall & Network Segmentation:
      Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
      
      
      Network Traffic Monitoring:
      Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
      
      DNS Security:
      Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
      
      WiFi Security Best Practices:
      For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
      
      For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
      
      Tor for router:
      Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
      
      Check your logs regularly - firewall, system, DNS requests.
      
      IoT Devices:
      Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
      
      L This user is from outside of this forum
      L This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      Ommit GL-inet their Qualcomm routers ship with a proprietary firmware qsdk based on openwrt.

      S 1 Reply Last reply
      0
      • W [email protected]

        Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

        
        # Network Security
        
        Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
        
        Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
        
        Firewall & Network Segmentation:
        Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
        
        
        Network Traffic Monitoring:
        Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
        
        DNS Security:
        Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
        
        WiFi Security Best Practices:
        For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
        
        For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
        
        Tor for router:
        Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
        
        Check your logs regularly - firewall, system, DNS requests.
        
        IoT Devices:
        Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
        
        ? Offline
        ? Offline
        Guest
        wrote on last edited by
        #3

        Writing this as code doesn't work very well in my browser, long lines aren't broken.

        1 Reply Last reply
        0
        • W [email protected]

          Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

          
          # Network Security
          
          Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
          
          Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
          
          Firewall & Network Segmentation:
          Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
          
          
          Network Traffic Monitoring:
          Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
          
          DNS Security:
          Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
          
          WiFi Security Best Practices:
          For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
          
          For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
          
          Tor for router:
          Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
          
          Check your logs regularly - firewall, system, DNS requests.
          
          IoT Devices:
          Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
          
          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          It did not see only use routers and other network devices with auto or at least easy regular updates.

          1 Reply Last reply
          0
          • W [email protected]

            Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

            
            # Network Security
            
            Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
            
            Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
            
            Firewall & Network Segmentation:
            Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
            
            
            Network Traffic Monitoring:
            Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
            
            DNS Security:
            Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
            
            WiFi Security Best Practices:
            For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
            
            For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
            
            Tor for router:
            Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
            
            Check your logs regularly - firewall, system, DNS requests.
            
            IoT Devices:
            Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
            
            F This user is from outside of this forum
            F This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Also did not see: Do not present any open ports on the internet side of your boundary router especially no administrative ones.

            1 Reply Last reply
            0
            • W [email protected]

              Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

              
              # Network Security
              
              Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
              
              Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
              
              Firewall & Network Segmentation:
              Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
              
              
              Network Traffic Monitoring:
              Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
              
              DNS Security:
              Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
              
              WiFi Security Best Practices:
              For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
              
              For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
              
              Tor for router:
              Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
              
              Check your logs regularly - firewall, system, DNS requests.
              
              IoT Devices:
              Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
              
              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              I did not see: Do not publish your IP address. Do not run servicies on it. Do not point DNS to it. Prefer dynamic IP that changes overtime. Encourage it to change periodically for example reboot your boundary router periodically.

              1 Reply Last reply
              0
              • W [email protected]

                Hi, I'm expanding my opsec guide and came across a problem, can you verify this information, what should I add/remove? I can't find anything that goes deep into this.

                
                # Network Security
                
                Your home network is the backbone of your digital life. If it's compromised, you're done. First off, ditch those ISP provided routers. They come with backdoors, shitty firmware, and vulnerabilities you don't want anywhere near your network. Instead, grab a GL.iNet router, a pfSense box, or any device that supports OpenWRT.
                
                Next, consider using OpenWRT or OPNsense. Open source firmware gives you more control and better security. Change those default credentials as soon as you can. Also, disable remote management (WAN access to the router admin panel). Set up a guest network for all that IoT junk (smart TVs, Alexa, whatever if you use them but you shouldn't.)  to keep them away from your main network.
                
                Firewall & Network Segmentation:
                Use VLANs to separate your trusted devices from the untrusted ones. Block outbound connections from devices that don't need internet access, and restrict LAN-to-WAN access wherever possible. Think about it as building walls in your house - keep the sketchy shit away from your private stuff.
                
                
                Network Traffic Monitoring:
                Set up your traffic monitoring tools like Wireshark or Zeek to watch what's going on. Get familiar with monitoring your inbound and outbound packets, because if you're not looking, someone else is. These tools will help you notice anomalies, like strange connections or devices that shouldn't be on your network.
                
                DNS Security:
                Forget about Google DNS (8.8.8.8) and Cloudflare (1.1.1.1). They might seem secure, but they're not. Use Quad9 (9.9.9.9) for better privacy, or even better, self-host unbound. Encrypt DNS traffic with DoH (DNS-over-HTTPS) or DoT (DNS-over-TLS). This is critical if you want to stop your ISP or a third party from snooping on what websites you're visiting.
                
                WiFi Security Best Practices:
                For basic WiFi security, ditch outdated tech like WEP, and don't settle for WPA2 if you can get WPA3. WPA3 is the way to go it's more secure. If you're still stuck on WPA2, make sure you're using WPA2-AES. No TKIP. Ever. Hiding your SSID? It's a placebo effect, doesn't really do jack for security, but it'll keep the basic scanners out. Name your SSID something unique - don't be that guy using "Comcast_xxxx" or your street address. Change the default SSID to something random. Disable WPS. It's a weak-ass vulnerability waiting to be exploited.
                
                For extra measures, MAC address filtering isn't foolproof but adds a bit of extra resistance. Rotate your WiFi passwords regularly, and make them long. If you're feeling paranoid enough to go next level, implement EAP-TLS for enterprise-grade encryption (this is serious business). Use tools like arpwatch or Kismet to monitor connected devices. You don't want anything unexpected showing up on your network.
                
                Tor for router:
                Routing all your WiFi traffic through tor is a terrible idea if you want speed. It'll slow you down to a crawl and make you suspicious. Also, data leaks are inevitable if you're not careful. Instead, set up selective routing - route only specific traffic through tor, like your most sensitive stuff. Want to be a ghost? Set up a dual router system: one router for your standard traffic, and another dedicated to tor traffic. This messes with your traffic patterns and makes you harder to track.
                
                Check your logs regularly - firewall, system, DNS requests.
                
                IoT Devices:
                Don't even think about putting your personal devices on the same network as your IoT trash. IoT devices are like the dumb, vulnerable kids you'd leave in the parking lot - easy targets for attackers. Also, change all your default router settings. Disable any unused services. Physically secure your router too - lock that shit up. Don't let anyone get physical access to your router - they can reset and bypass everything you just set up. Always assume your ISP is logging your traffic. If they're not, you're probably in the wrong dimension.
                
                D This user is from outside of this forum
                D This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                Use Quad9 (9.9.9.9)

                Where is Mullvad DNS?

                1 Reply Last reply
                0
                • L [email protected]

                  Ommit GL-inet their Qualcomm routers ship with a proprietary firmware qsdk based on openwrt.

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  I have one of their travel routers. Is there an alternative that ships with vanilla openwrt out-of-the-box?

                  1 Reply Last reply
                  0
                  • System shared this topic on
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups