Answer the question
In order to leave comments, you need to log in
Implementation of encryption and anonymization at the hardware level, how?
So, many now use all sorts of Tor's (inconvenient), Hola.org (more convenient, but still). Therefore, the question is whether it is possible to depict the same (traffic encryption, anonymization if possible) directly on the hardware. It is clear that perhaps a "piece of iron" will already be required not a simple one, but with a more powerful processor ... In general, such a "Wishlist" appeared, you never know who bothered and dug in this direction. All sorts of "hardware firewalls" from a tsiska seem to me to be too much, both in terms of cost and complexity of configuration. Ideally something more affordable.
Answer the question
In order to leave comments, you need to log in
Anonymization does not happen by itself, in a vacuum. It is considered and created in relation to a specific service and the way it is used. And not all issues here can be solved with a piece of iron.
The basic version is of course possible, in the form of a router on an alternative firmware with a built-in vpn-tor-i2p-cjdns, etc.
Tor'y (uncomfortable)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question