isp router design mistakes 30/04

This commit is contained in:
Wouter Groeneveld 2024-04-29 18:50:45 +02:00
parent 3c6a8fb0af
commit fb2580f50b
2 changed files with 3 additions and 2 deletions

View File

@ -19,7 +19,9 @@ That's right, no more logging into the router with `http://192.168.1.1` with use
That also means that if someone hacks your MyProximus customer account, they can happily change your Wi-Fi password, disable it, or mess with the DHCP settings, or even mess with the router IP itself. Or disable the firewall. Or open up port `80` or setup a series of port forwarding rules. Or keep on rebooting the router. From a security point of view, that sounds like a job well done!
Even if there's an option to disable any features and treat it as a pass-through device in order to bring in my own router, I still cannot disable the publicly (if you've got the credentials) accessible part of the configuration, where config can be messed up at will.
Even if there's an option to disable any features and treat it as a pass-through device in order to bring in my own router, I still cannot disable the publicly (if you've got the credentials) accessible part of the configuration, where config can be messed up at will[^mess].
[^mess]: I presume remote reconfigurability was already a part of the B-Box 3 line as a tool for support, but not as an end user endpoint. At least you can enable 2FA, which is my _good-enough_ solution until I replace the stock modem.
None of the Flemish tech-related websites that cover the new Internet Box, like [this Knack DataNews article](https://datanews.knack.be/nieuws/alles-wat-je-moet-weten-over-de-nieuwe-internetbox-van-proximus/), seem to care about this: all they care about is how future-proof the 1GB DDR3 RAM and 512M flash storage is compared to its predecessor that had "only" 256MB RAM and 128MB storage. Hurray for digitization and technological progress.

View File

@ -62,7 +62,6 @@ Here's a list of apps I now rely on:
**Misc**
- Etar Calendar: a FOSS calendar widget alternative.
- NetGuard: currently under evaluation, with this you can block internet access on (system) package level.
- Automate: currently under evaluation, with this you can create widgets that activate a custom workflow (see [Zach Young's notes on this](https://zachyoung.dev/posts/obsidian-quick-capture-for-android)). Used as a quick link to my Obsidian Scratchpad note file.
- [Material Files](https://github.com/zhanghai/MaterialFiles) as a proper FOSS File Explorer.