I use Linux on all my personal computers and privacy respecting ROMs on phones, and Pi-Hole, but a part I haven’t really taken a look at is my network at home.

I currently have my ISP’s smart router in bridge mode connected to a brand name Wi-Fi 6 router with a wireless “mesh” range extender. I really like the range extender because it has an Ethernet port so it’s basically a “free” Ethernet plug for that room connected to a high power Wi-Fi transceiver that’s faster than a lot of on board Wi-Fi antennas.

But I feel like it’s probably not the best thing privacy and security wise? I already don’t use the app and luckily it still has a web interface for management, but I don’t know how secure the firmware is or if it has any corporate “analytics” or not. I’m thinking a PFsense or similar router software on Linux box to connect to the bridge port of my ISP’s router since I was told the “Ethernet” cable connecting from it to the fiber modem won’t work with a store bought router, I assume it has some kind of DRM?

I already have an old PC in mind to convert to a router. I assume I could just use the onboard Ethernet port to talk to the router and add my own USB NIC to connect to the main switch?

I don’t know what to do for Wi-Fi though, could I buy two dedicated access points and put them on different floors, and have them both connected to the wired network? How hard would it be to have those be the same Wi-Fi network and have devices actually switch between them depending on location?

Also, most of my NICs and switches are from the thrift store or eBay for higher end used server parts. Is that bad? As in how worried should I be about the firmware running in those being tampered with by whoever owned it last?

  • truthfultemporarily@feddit.org
    link
    fedilink
    arrow-up
    1
    ·
    14 hours ago

    It depends on your threat model or how I like to call it: the paranoia level. Since all connections go through the ISP router anyway you won’t really gain that much privacy unless you directly put a VPN on your router.

    Here is what you could potentially stop leaking:

    • MAC addresses of your devices
    • DNS queries if you use unencrypted DNS

    Also theoretically, the router could be an entry point to do attacks against your devices.

    People who use pfsense mostly do that because they want more features. For example I have an IoT VLAN that cannot talk to the internet.

    For privacy the simplest thing would be to try and put a custom firmware on your WiFi router, like OpenWRT.

    Everything else is a bit of an overhaul. And in the end, you always have to trust that the WiFi access points manufacturers firmware does not exfiltrate data.

    Also, I would just try plugging in to the modem and see what happens. Most likely you’re just wasting power right now with that ISP router.