This is one of the most amazing things I have read in a while.https://www.reddit.com/r/whatisthisthing/comments/9ixdh9/found_hooked_up_to_my_router/e6nh61r/ …
-
-
My guess is that having the device installed gives the attacker a permanent foothold on each network, where it can perform *further* attacks at the discretion of the attacker. e.g. directly attack a system inside of the hard candy shell of a network-level firewall or NAT.
-
Yes, but you'd think they would target people more afluent than roommates if they were planning manual attacks. Wouldn't surprise me if it was just an arp poisoning to inject ads.
- 1 more reply
New conversation -
-
-
It appears to me to be inline between modem & router, not behind NAT. Could be wrong. HTTPS assumes the network can't be trusted. I find it highly unlikely it records keystrokes UNLESS Goog/Bing or other search providers send keystrokes as you type over HTTP
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It could be a peoxy that decrypt and encrypt traffic with his own certificate. That could work.
-
That would only work if you actually install a matching root cert on any end devices it's wanting to circumvent SSL on. This is required for any "SSL inspection"/decryption method. Otherwise your ISP would do it to you, negating the whole point of SSL/TLS.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.