Benefits/drawbacks of a travel router alongside QubesOS for those on the move

Bit fuzzy, but i think i get our point.

After a quick search i found that those travel routers are hardware tings one can buy.

By using them i see some problems:

  • Your trust the vendor to not cooperate with your adversary
  • You trust the vendor to not fuck shit up.

As i already pretty much have to trust at least one OS, i really would try to minimize the things i have to trust, especially closed source stuff.

But say i trust that the vendor will not cooperate with my adversary. Maybe the vendor fucked up and stuff is identifiable.

From my point of view, your sys-net is your travel router, that handles your devices (Qubes).

Every function such a travel router could offer your Qubes system, can be done there. If you have more devices: Create an AP if you want, or connect them to your ethernet port. Everything is possible.

Don’t use Tor with a VPN unless you know what you are doing and have a very valid reason to do so.

Yes.

If your router does NAT and obfuscates the devices behind him, the outer network only knows that there is your router in the network. This obfuscates a bit how many devices you operate, but they are not invisible.

Yes. Your hardware is inperfect. It can be fingerprinted by a skilled adversary with 20 dollar equipment. Here is a paper.

Usually MAC and hostname randomization is well enough for the utmost reasonable threat models.

Please note, that most ppl overestimate their adversary in threat modelling. This can be a fun thing to think and talk about, but is of only scientific interest.

Oh btw i created a post thing about wifi stuffs, maybe you are interested:

5 Likes