PrivacyTechPro tip:

Your router likely has proprietary software installed from a large company that has full access to your internet connection and can "call home" at any minute.

Use a hardware firewall and a VPN on your network.

Every IOT (Internet of Things) device you connect to your home network not only announces your IP address, but also expands your network attack surface to hackers.

I recommend #Protectli Vault Pro VP242 4x 2.5G as a hardware firewall for most client's home and small business networks.

#cybersecgirl #privacytechpro #network #security

https://protectli.com/product/vp2420/

Reply to this note

Please Login to reply.

Discussion

*VP2420

coreboot + pfsense

I've started building an OPNsense box to replace my enterprise router on similar hardware. I needed more ethernet ports for more zones, but otherwise very similar.

I have lots of complicated rules in my existing router that need to be ported over and testing is going to take a while, but it'll be worth it in the end.

And as soon as it's set up and working properly, Im going to wipe it and restore from a backup. Because I'm the type of hacker who tests my backups! 🤓

Awesome! And yes 💯 same :)

I have a couple of switches, so I don't really need the extra lan ports on the firewall. I keep two of the firewall lan ports free from always on VPN, because sometimes it's useful.

is it actually good? I was exploring some options on the market. Decided to go with a refurbished SFF PC and a managed switch.

nice. yes, it is. i generally recommend having a separate travel and home router. for firewall though, protectli (no wifi) tpm, coreboot, pfsense + vpn combined with an open source router is good stuff.

cool stuff. Will give it a shot with pfsense at another location. Interesting experiment to run.

if you get it from protectli vs amazon or going with the "whitelabel" yangling on alibaba, there is better customization, better return guarantees. and the fact that protectli can flash it with coreboot is well worth the $50 imo. have fun!

Yes protectli customer service has been excellent.

I have a vault with coreboot + opnsense and it is awesome!

thanks for the advice. I'll see what I can get my hands on here in Europe

What wifi access points would you recommend to go with it?

i don't recommend it for wifi. a dedicated open source router/router+wifi (home and travel) will most always achieve better results.

So what does this thing do then?

it is an open source hardware firewall where you can install an always-on vpn on your network to secure all of your IoT devices etc from the prying eyes of big tech, hackers, and your isp.

I'm trying to understand how this thing is superior to a gl-inet router/firewall/wifi setup.

i just run a wireguard on my VPS and set up clients using a handy script that spits out a QR code i can scan with my phone, or for a pc, just c&p the short little file across to it and voila, instant VPN, and not just a VPN but one that routes traffic between my several clients

this is how i run my relay-in-development and test it with regular nostr clients, using a reverse proxy to connect using WG to my machine, it's super simple, cheap VPS, wireguard, and a domain name, and you can do the same thing

it comes down to performance, control and robustness. running pfsense or opnsense on the firewall + vpn and openwrt on the open source router.

i prefer the ability to control and disable wifi at will, especially if a client's threat model calls for ports activate without vpn for services that don't play nicely with vpn (streaming, gaming, banking etc)

having at least one dedicated open source router (as well as a travel router) often gives much better performance.

also, I highly recommend people consider whether they need wireless access at all, but I understand most prefer or need it for quality of life.

You are such a wealth of knowledge, nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka, I can’t wait to read the articles on your upcoming web site. If you make an RSS feed, I’ll be the first to subscribe!

awesome! thank you for the kudos and encouragement 🫂🚀

What about cheaper alternatives like TP switches with pfsense or opnsense compatibility?

firewall hardware + switch is more robust

Clearly I know nothing about this and plan is to buy a few devices to learn.

Does firewall hardware replace a router? Or does it sit between your devices and the router?

I put any IOT devices on a separate VLAN where possible with firewall rules to prevent them talking back to the VLAN that my PCs etc are on.

Run separate LANs for IoTs and your phone and computers. Also setup a guest WiFi account to give to friends that come over. Don’t let them connect to your home LAN

With openwrt you can achieve that and much more with less money.

What router do you recomend to flash with openwrt? Thanks

Anything that supports the latest version:

https://openwrt.org/toh/start

Its very hard to recommend a specific product, because manufacturers keep coming out with new, low-spec versions of their own flagship devices under the same model number. Can be very frustrating to find you've bought the XXXX YY.ZZ (7) variant that has half the RAM of the (1) through (6) but costs 20% more.

Now I just go with whatever is available second-hand.

Many thanks!

It depends what you want, if only router and speed is not a problem one of those tplink, if you want a 4g/5g modem inside gl.inet. if you want with modem also a Fritz box.

Thank you very much

You're welcome

Thank you

Hope you all realize how expensive this is…

it's the price of an xbox series x. more than worth it imo.

95% of people won’t spend that sort of money on something like this.

95% of people is hyperbole, but i read your point.

most people don't use a vpn or e2ee form of communication either.

i work with people of many threat levels and this is a essential recommendation in most cases.

*an

Using Firewalla Gold. Have read mixed messages whether a VPN helps much. Shields from your ISP.

Asus wifi/routers have a builtin persistent connection to Asus. The Asuswrt-Merlin firmware exposed it and it was listed as a configuration/access support feature.

Set one one of these up with 2x Beryl AX's as access points one for VPN protection and the other for video streaming. Cost about $750 AUD and a few days of research, but it was fun and now know my home network is fairly secure.

How do you feel about Unifi? Trustworthy?

unifi scares me

Why’s that? Genuinely curious to make my setup less captured. Too proprietary?

Don’t they run all the command and control servers? Seems like it completely back doors your network? At least thats what it seemed like when I set it up for a startup I worked for.

It’s for the prosumer, but not a privacy minded one. It’s simplicity & UX is powerful, but the software is totally cucked. Hardware probably is too.

I have it on my network edge for braindeadness, foss software router as my core.

not a fan for many reasons. i do not trust them.

I'm using one of these with pfsense, really easy to use and great experience so far

I bought this model a few months ago. I'm going to install this soon :-)

Like… I know THAT more can be done to secure my network … and this looks super cool and useful … but how tf to set it up to best suit my needs? I’d spend at least week figuring this out. So daunting.

yet so worth it.

i help paying client's who need anonymity with this setup. i'm also completely rebooting my website to include resources for lower threat models as well so i will def have some valuable guides and resources up when the re-launch is complete.

Please let me know the website if ready. Thanks for your valuable insights!

Great little device! Can handle running a hypervisor and a couple of small VMs too if you want to run something alongside your firewall.

nostr:note1q2tqmnwhhm0hlhxlx04zg5km0u0q9d00yxz4ugrp7u909pz89dnsn2qa23

Thanks for this thread Ava 🤙

yw 🤙

where I live the only option is AT&T. And they require you to use their proprietary router.

You can put this setup behind that router 😎

Would it be reasonable to have this downstream of the router provided by (say) Starlink to securely separate local network traffic from IoT stuff? My paranoia here is in the developing stages.

Yes. If you don't need direct network access to your IoT things this is a great option (e.g. if they are all controlled by some server on the internet). Then they can be completely isolated from your local network. That way when they get compromised, the damage is contained.

I do not like that type of IoT device myself. I prefer something where I can be confident it's not going to be connecting to random servers out on the internet. So for the things I run, I want to be able to access them from the local network.

So which network setup is preferable will depend on your situation.

For those who may not be as technically-inclined or that well-versed with networking, would you recommend this set up guide?

https://www.youtube.com/watch?v=h2_cQxTkh3Q

It's a good tutorial. I tried to get through it, but I found his written website to be better for me. Most of my clients need/want WiFi and open ports free of VPN traffic, so I use a different set up. LAN Firewall, to switch, to WiFi is all always-on VPN protected, other ports on the firewall are free from VPN traffic.

I also found Naomi brockwells 'You won't believe how UNSAFE your home router is!' a decent tutorial.

She is great

She is

What if you have one of those stupid all in one provider provided routers? Internet will not work unless you port forward it. With it still in the network do you even gain any privacy advantage?

Make sure you spoof your firewall MAC before plugging it in to your ISP's modem the first time if you don't want them to recognize it every time you move.

How so? Port forwarding is a feat of the router, not the modem, so why not enable bridge-mode on your ISP all-in-one modem and pick up one of these WiFi routers for home and travel, and just plug it into your network switch.

NOTE: I'm not a fan of more powerful WiFi. I run line-in to most devices and would prefer my signal not reach the road since ofc neighborhood network scanning is a thing.

Pre-installed with OPNsense? How badass is that! Thanks

Ikr?! You bet :-)

do you really have to worry about neighborhood network scanning with sufficiently secure passwords?

the opnsense setup with protectli hardware is nice

Hey Ava. What do you recommend for travel?

I recommend two separate devices. The Protectli VP2420 is an awesome hardware firewall for most home networks. The Beryl AX3000 is an awesome travel router and extender, and even home if you don't like your network name being scanned at the road by map cars etc. I recommend it to my clients. It's great to run behind the Protectli firewall with OPNsense and always-on VPN for when WiFi is necessary.

nostr:nevent1qqsq99sdehtmahmlmn0n863y2tdh78szkhhjrp27ypslwzhjs3rjkecpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3qf6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4ksxpqqqqqqzealnts