A
A
Alejandro Esquire2015-09-13 14:12:23
Computer networks
Alejandro Esquire, 2015-09-13 14:12:23

Implementation of encryption and anonymization at the hardware level, how?

So, many now use all sorts of Tor's (inconvenient), Hola.org (more convenient, but still). Therefore, the question is whether it is possible to depict the same (traffic encryption, anonymization if possible) directly on the hardware. It is clear that perhaps a "piece of iron" will already be required not a simple one, but with a more powerful processor ... In general, such a "Wishlist" appeared, you never know who bothered and dug in this direction. All sorts of "hardware firewalls" from a tsiska seem to me to be too much, both in terms of cost and complexity of configuration. Ideally something more affordable.

Answer the question

In order to leave comments, you need to log in

2 answer(s)
T
ton1, 2015-09-16
@A1ejandro

Anonymization does not happen by itself, in a vacuum. It is considered and created in relation to a specific service and the way it is used. And not all issues here can be solved with a piece of iron.
The basic version is of course possible, in the form of a router on an alternative firmware with a built-in vpn-tor-i2p-cjdns, etc.

A
Alexander Taratin, 2015-09-13
@Taraflex

Tor'y (uncomfortable)

How?
kryptos.club/showthread.php?t=43

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question