Probably need a better title for this post.
Current advice starts with; Being hacked can involve the home router (or so I read) The recommendation being to keep your personal home modem/Router an up to date and a model that does not have an easy way to hack. To keep the firmware/software in the Modem/Router up to data. Encrypt the devices with a decent password. Be Aware of who might be using your home connection, and none of you go to- sketchy websites. Such as I know person from Asia who likes downloading Asian movies (Phim), from free sites in Asia. I can think of other examples of places one should be careful of going.
I notice NitroKey has a hardware FireWall.
As a hunch of what to do to detect a hack. Feed my computer connection through a home Server, which looks at all, watches all, where connections are going to and coming from. Such as the US Air Force having computers, especially built for them, sending information to Mainland China was discovered by someone seeing a lot of activity going to an internet address in mainland China.
While using a FireWall, and watching connections from an especially designed Qube is interesting. If the firmware of my Computer had been -modified to sent information elsewhere. I can hope that the second computer, acting as a server, would see internet connections that the Qube was not in a position to see.
Down sides. I would need a trustworthy computer to use for this. As I would say, a sterile computer to start. Then I know nothing about the software which needs to be on it. So I could easily contaminate the sterile environment. This is not very portable. It does not catch all the possible problems. I might have to purchase some software and services. Using this home Server might reveal information I do not want revealed.
I suspect ISP’s, particularly public WiFi, have moved ahead in surveillance technology and can, at will, add identifiers to packets of information from a connection, and watch where it goes.
Or like, thinking of a Tor relay as a black box, the ISP surrounding the Tor relay can see packets when they come in and leave, formulate an analysis pattern locating first entry to Tor, to where it finally goes. Would need a lot of resources.
Not knowing that is happening. ISP’s are likely developing means built into their servers which may end some of our best efforts to be anonymous.
My question is: Has anyone out there accomplished using a single computer to be a home server, watcher? Might call it a Firewall. A less expensive abbreviation of this?
Any of those more tech experienced, tech knowledgeable out there want to make comments? Give a bit of information on the how this is not going to work? How to make it work?