Posted on Leave a comment

Why Use GLiNet

0:01 In this video today, I am going to talk about the GOI net. 0:06 And how I am using my life and how I think it's important for, if you travel, if you access the internet, mainly your your laptop and, and maybe your iPad type of things where you don't have data on those particular devices. I k...

0:01
In this video today, I am going to talk about the GOI net.
0:06
And how I am using my life and how I think it's important for, if you travel, if you access the internet, mainly your your laptop and, and maybe your iPad type of things where you don't have data on those particular devices. I know everybody that has a smartphone basically, has a data plan, but, we don't necessarily have data plans on our computers, and, iPads, and those other type of devices.
0:38
Well, I'm going to go through why I think it's important for you to add something like this in your life. If you travel, and you access wireless networks, other than what is, under your control, which basically means, at home.
0:52
If you go to a hotel, if you, Starbucks, if you go to just a generalized wireless network, you could be in trouble. So, what I'm gonna do is, I suggested a video a while ago, and I've suggested a couple of times, and it's 15 minutes, and it's technical, and I know, probably after five minutes, people are like, yeah, I'm not going to watch this.
1:14
But what I am going to suggest is that you watch this minute and NaN because what? This, traynor, what this white hat, what this ethical hacker has to say, is really important for you to know.
1:30
Um, and if you are unaware, well, now I'm, I'm kinda making you aware of the vulnerabilities that are out there.
1:39
I was not aware how vulnerable.
1:43
We all are on public WI fi.
1:46
And when I say public Wi-Fi, I mean, any Wi-Fi, we have not set up.
1:52
We do not know what is what's behind it, you know, if you're at a friend's house, if you trust your friend.
2:02
You think that they have a good networking. You know, you just don't know for sure.
2:05
So, go ahead and watch this video, and then we'll pickup after the.
2:11
No.
2:12
Did we drive dive into the, know, the technology, and why it works, and that type of thing?
2:20
So that's why you don't ever use public Wi-Fi. You always use Wi-Fi or use Internet that you control. If you don't.
2:28
If you go to us, if you're traveling or something like that, you want to just use your phone tether your phone, to your laptop or something of that nature, because using public WI Fi, this could very easily happen to you.
2:40
And again, VPNs, don't help you VPNs, Only give you confidentiality.
2:44
VPNs don't stop you from getting exploited. If you hit a malicious site, it's got like browsers zero days in it.
2:51
So the solution here is simple. Don't use Public WI Fi if you have an option.
2:58
And if you if you're an important enough employee to be using VPNs that frequently, you should be able to get approval for them to pay for broadband. Or something for you on your mobile device.
3:09
You can even get it inside your mobile device as well.
3:12
That's kinda how you would mitigate that. There's other things that will keep this from happening on your corporate network. But remember, attackers of stop attacking you. When you go to get off your corporate network, you go to these public places where you move on.
3:29
OK, I'm going to talk about two different GOI net devices. And these devices are used to broadcast to create a network in your environment.
3:41
Whether you're in a car, you're in a train, you're in a hotel.
3:46
You're at a friend's house.
3:49
No, not for the day, but, you know, staying over and having an extended period of time where you aren't going to break out your laptop or your, your iPad.
3:59
You know, these are the two devices.
4:01
And the 1500 is an older model, works just as well. It's a little bit smaller, as you can see, than the larger gray one. And it comes, well, it does not come, but you can build this. Each of these you had to purchase separately so that ... the case.
4:20
And we'll talk about power supplies in just a little bit.
4:23
So this is the larger Slate, 1500.
4:27
You have to buy the case. You have to buy.
4:29
In my case, I bought a power supply and cable for that.
4:35
I got rid of the older.
4:40
Whoops. Let's see.
4:41
The older, original power supply with it, because it was big and bulky, um, it wasn't sleek.
4:49
I can only really use it for the GOI Net, and I replaced it with, I'll have links down below, if you're interested.
4:58
But a power supply, where it's USB C, you can have a power supply that USB C, and USB AAB, so that you can plug different things in, but I can plug my G ally net, I can plugin, my i-phone. I can plug in other things using this particular power supply as compared to, I can just plug this into my, GL Lynette.
5:22
And so, you know, why carry something that I can only handle one thing? I like to carry one thing that can handle many things.
5:30
So we're gonna go back to This is the Slate, 1500 ....
5:36
The, the two of them really kind of do the same thing.
5:40
The gray one is is WI fi six.
5:44
The light gray is just the older model. There is a little bit of a price difference but you know for me, I'm going with the newer one.
5:53
Just because So, there's the case. This is what it looks like out of the case.
5:58
These are two antennas on the side, I don't have a picture. But that's where you can stick in a 16.
6:06
Wow, I have a bunch of 16 gig micro SD cards, because I use them for pi holes, but you can put in just about any size and that extra memory. You can store little apps that you can experiment with. I don't have any other apps running on it, but there are some fun things that you can you can do. So this is the back of the line that we have land one and land too.
6:34
Lan's stands for Local Area Network. So if you wanted to, you could stick a printer or you could plug a laptop in, if you want.
6:44
In my case, when I do travel, depending on how long, I will stick a pie hole into one of these ports so that I take back the control of my DNS so that I don't experience.
7:00
If you watch the video, the full video, DNS poisoning, I'm not X giving my DNS entries, my DNS requests away to Verizon, if I use my my phi, I'm not giving my DNS requests to anybody, I'm taking those DNS requests and I'm putting them on my DNS server. And the pie hole will then go out and find, or if it's already found, those requests, it will just retrieve them locally. So that's one way to keep yourself a lot more private.
7:40
The pi whole, we'll go into a deeper dive on other videos but it is a recursive DNS server, which means it goes to the core DNS servers. So it's not going and asking Google or Cloudflare or, you know, any other DNS provider like Spectrum or *** or Comcast or x-finity or AT&T, all of this.
8:06
It goes to the core routers.
8:08
So I do, and what I will show you in the videos after this is that I take my GL line at, and I have paired it up with my my phi.
8:23
This is a Verizon, my phi, that it creates a wireless network, like he was talking about in the video.
8:31
He says, You know, This is the best to use, which I agree, but I'm adding on to that. I don't want to just connect to this, my phi, because Verizon is getting my DNS requests and seeing where I'm going. This also puts me in a more public space.
8:52
Like there's not that much I like that firewall that that separates me from the internet.
9:02
But when you Mary, a mie phy device like this and A Get this one, the GOI Net, then you're connecting to the GOI Net Which is kind of like your little firewall.
9:22
Let's just put it that way.
9:23
It's, you can use it for a firewall, but it's, it gives you a a private IP address that people would be hard to attack you behind this device and this device then connects to the My Phi, which then goes directly to, in my case, Verizon.
9:43
So, I'm not using Starbuck's, I'm not using, um, Hilton Honors or marryat or no any other wireless network that we don't know.
9:56
I am for sure. 99% percent Sure.
10:01
There's the 1% and we're not going to go down that road that I am connecting to a Verizon data, um, tower.
10:11
Because I'm getting approved, I have an account with them, and I am pretty certain that I am connecting to Eva, Risin data plan that I pay for. And so, I don't have to necessarily worry that I'm going to experience a man in the middle attack.
10:34
Because as, you know, well, as this article, and many articles say, you know, it's really easy, too to do a man in the middle attack. This video, if you go through all of it, shows you how easy it is.
10:52
And, you know, I, I really want you to be informed on your potential for experience, a man and mental tech. It's not hard, like it was back in the day. There are tools that are now out now out there that just about anybody can use.
11:12
So no, there will, I will have links down below. But here is a set of videos that you can go through And this is from GL Lynette.
11:23
And they kind of go through the different things that you may want to do. Some of this may be way over board on what you're looking for.
11:34
But, this is a resource where you can learn about, know, how private you want to be. How do you want to set up your network.
11:42
You can also book some time with me if you want, but I just wanted to bring this to your attention that you really need to be careful when you are out on public Wi-Fi, and how vulnerable you are. So that's it.
11:58
You can listen to the next set of videos if you'd like.
12:01
Thanks a lot, doctor Singh.

The video above introduces you to the concept of creating your own private network where ever you go. This initial (4) video series will be available to the entire group until January 31st, 2023. After that date, these and any additional videos will only be available to members who purchased the Crypto Cyber Security class. 

GLiNet Shopping List

Below is a list of suggested items to help set up your GLiNet Amazon – GL.iNet GL-AXT1800 (Slate AX) Amazon – Aenllosi Hard Case Replacement

Read More »

Here are some informational videos you can learn from.

GLiNet YouTube Channel

How to set up a man in the middle attack | Free Cyber Work Applied series

Man-in-the-Middle Public Wi-Fi Hacking Demo

 

Leave a Reply