There are plenty of reasons to set up a home server. You might use it as a media server, a file server, or even a local backup server. Basically, any files of yours that don’t need to be online are good candidates for a home server. Setting up a Linux-powered home server is relatively easy, especially these days. That said, keeping that server secure is another story altogether. Security can be as tricky, as it is important. Only Install What You Absolutely Need One of the easiest ways to keep your home server secure is to keep security in mind from the very beginning. This… Read more
Akita connected home Wi-Fi security watchdog review
REVIEW – The Internet of Things (IoT). That’s the term applied to essentially all connected devices that bring us the ability to control various items via connected apps on our PCs, tablets, and phones. As soon as we do that, we open potential doors into our networks for bad guys to hack in and do nefarious things. What to do, what to do?
HighIot, an Isreali-based security company, developed Akita to help address that issue.
What is it?
Akita is a small, stylish device that you connect to your network. It then discovers your Wi-Fi IoT devices and watches them for unusual traffic. If Akita detects anything odd, it immediately shuts down the affected device and alerts you.
What’s in the box?
- Akita device
- Power cord
- International power cord adapter
- Ethernet cable
- User manual
- Two cardboard coasters
Hardware specs
- Dimensions: 3.6″ L x 3.6″ W x 3.1″ H
- Weight: 9 oz
- Connectivity:
- 1 RJ45 Ethernet WAN port (not used)
- 1 RJ45 Ethernet LAN port
- IEEE 802.11b/g/n dual-antenna Wi-Fi
- Processor: Qualcomm QCA9532 650 MHz
- Memory:
- 64MB DDR
- 16MB flash
Design and features
Akita is a hexagonal unit that comes in a semi-matte white or gray. I received the gray version.
The front vertical edge holds the status LEDs that flash green or blue, depending on the operational mode.
The back of the unit has the LAN and WAN ports, power port and power switch.
On the bottom, we find the product label. That label has the serial number needed for setup, the MAC address and a QR code for the serial number, plus all the usual product info. I masked the MAC address, and inadvertently masked the serial number as well.
Setup
Setup starts out pretty standard and as billed as 60-second simple. Install the app (IOS or Android), plug the Ethernet cable into Akita and your router, plug in the power cord, turn on Akita, scan the QR code on the bottom or manually enter the serial number and *BOOM* you’re online and protected. It was at this point that everything came crashing down for me.
I use an eero mesh router for my home network. It has a main router plus two wireless remote routers that connect to each other to blanket my house in strong Wi-Fi. They broadcast on both 2.4GHz and 5GHz frequencies, and seamlessly hand supported devices between the two bands depending on signal strength. 2.4GHz is stronger and longer-range yet slower than the shorter range 5GHz. They accomplish this with a single service set identifier (SSID), otherwise known as your wireless network name.
I tried everything, but since my phone automatically connects to the faster 5GHz band, and I have no option to force it to 2.4GHz, I was dead in the water.
After contacting Akita support, I waited. I waited for six days. Then, I finally got a reply asking me for my Akita serial number. I replied with that, and within an hour, I got a reply. They were able to remotely activate my Akita and confirmed that it was my eero that was causing the problem. They asked me to go into the app, click on my network and provide the password to allow Akita to start monitoring the Wi-Fi devices. *BAM* – roadblock #2.
After another back and forth with support, all done very quickly, I was told to click anywhere but on the “Oopps” [sic] window. When I did, it went away and I was able to click on my network and add the password. Then…
My network name disappeared. It was there, but the name was gone. Another e-mail exchange with Akita and they were able to restore it. They said it was expected behavior. Odd.
So, I was finally online. The lights started switching from green to blue and back, indicating that Akita was looking for IoT devices on my Wi-Fi network.
Akita quickly found 21 devices connected to my network – again, I have blurred the MAC addresses.
Unfortunately, right after that, my eero received a firmware update and rebooted. Timing is everything.
Tech support did report that Akita hardware is limited to 2.4Ghz and can’t connect to 5Ghz networks, however, Akita uses 2.4GHz to connect to the network and will monitor 5GHz devices as long as both SSIDs are on the same subnet. They further reported that initially Akita was not designed nor advertised to support mesh networks and 5 GHz bands. They just updated Akita software several days ago to support mesh networks and hidden SSIDs. Again, timing is everything.
Performance
Now that I am online and Akita ultimately discovered 36 devices and has reverted into monitoring mode. Opening the app, we see the status screen.
The visual layout of the screen resembles the hexagonal shape of the Akita itself. Each of the six buttons is clickable. Clicking the top support button brings up the support subscription window.
Akita offers three support options:
Free – Active protection for your Smart Home
- $0 / month
- Network status report
- Vulnerabilities list
- Critical alerts
- Monthly network security report
Advanced Protection – Human assistance and enhanced protection
- $7.99 / month
- Now available for only $3.99/month*
*Limited to the first 1,000 subscribers - All Free features plus
- Human assistance to help you solve the security issues discovered by Akita
- Constant monitoring for unusual activity
- Cutting-edge botnet attack protection
- Real-time abnormal behavior alerts
- Router security verification
Full-Service – Fully customized professional support
- 29.99 / month
- All Advanced Protection plan features plus:
- A dedicated network security expert who will solve the security issues discovered by Akita for you
New users get one month of Advanced Protection included. Oddly, the website calls the two paid levels “Advanced Protection” and “Full-Service” but the buttons in the app call them “Standard” and “Pro”. There is no mention of the free level in the app, only the paid levels.
Clicking on the Akita devices button brings up your device.
Here you can add more Akita devices – I think that is more of a business thing than a home user thing. You can also see your Akita and get to the settings screen. The settings screen only shows the network and I showed that screenshot above. The left button is the connected devices button. That brings up the device screen that I also showed above.
Clicking on the Risks button brings up the risks screen.
It’s pretty boring and that’s a good thing! If there were risks to report, for paid customers, it would have alerts like this:
The Account button brings up a screen where you can change your user name, subscription level and enable app notifications.
The Loyalty button brings you to their loyalty screen where you can earn points or use points. Both options take you to Akita’s website with no further information. This looks like a future feature.
The Support button brings up a pop-up window with a link to call support.
Other items of note:
From Akita’s website:
Akita protects WiFi devices only. It does not operate on Zigbee or Z-Wave, but it will protect any WiFi-connected hubs/controllers associated with those systems.
So, if you have any of those devices as I do, those will remain unprotected. Lutron Caseta switches are a great example.
Akita has two types of reporting – a network status report and a monthly network security report.
For paid subscribers, the initial and monthly reports are being delivered via email. In the mobile app, customers receive notifications(alerts) which explain what kind of vulnerabilities were found. Each alert has a “Learn” button which leads to the page with resolving procedures for each of vulnerabilities. Full-Service customers may give Akita experts access to their network, so they could resolve their issues remotely. Advanced Protection subscribers have human assistance via email. Paid subscribers will continue receiving emails from support until the vulnerabilities are solved.
Free subscribers get:
- Network status report – I have a copy of that below
- It shows the number of problems found, however, for free subscribers the report doesn’t point on exact problem and device affected
- Vulnerabilities list – Possible vulnerabilities list and ways to resolve them
- Critical alerts in mobile app
- Monthly network security report – Similar to the initial report, but this report contains information about the number of problems found in last two month with a comparison table, so customers can learn if they resolved the issues on their own correctly
Report
I received my first network status report and have copied below. I replaced the MAC addresses of my three eero routers with a description.
Akita Initial Report |
Dear Garry Kolb This is your initial home network security and vulnerabilities report from Akita. AKITA is protecting your home since 5/7/2019 Please find bellow initial report to provide a record of what work your Akita has done by far and the status of your home network. |
Akita (SN: 2018041822943) workstream:
Routers (<mac addr1>, <MAC addr2>, <MAC addr3>) security verification
* See below problems description Network traffic monitoring
Network performance
|
How to interpret your report
|
As you can see, it reported one issue but gives me no indication of what that issue is. It provides good and bad ranges for a variety of network parameters but provides no indication of what those values are for my network. To me, this report is essentially useless. Given that I was given a paid subscription for my first month, I am pretty disappointed with this report. Based on this report alone, the reporting is essentially useless. I know I have a problem, but don’t know what it is or how to deal with it.
The next day, I received a separate email with the following information:
We want to notify you regarding compromises in your network security. AKITA found several vulnerabilities on your eero router (<mac addr1>, <MAC addr2>, <MAC addr3>):
Enabled UPNP – Some models of routers have bad implementation of UPnP. This makes your router vulnerable. Such vulnerability can help hackers change DNS setting on router. After that all devices on a LAN can be routed to a phishing site, a ransom demanding page or even encrypt your files.
The malware located on any device on the LAN can initiate as many outgoing connections to its server as it wants. If the router has UPnP enabled it means that it would trust any outgoing connections and allow to forward a port. Thus the malware would be able to bypass the router, establish a connection with malicious server and as a result provide a permanent access to your computer.
In eero routers UPNP enabled by default. If you’d like to turn it off, toggle the slider so it’s no longer green.
Based on that email, I did disable UPnP. Since my issue count was “1”, my expectation is that this resolves all identified issues with my network. So, the combination of the report and the email does add value, but they came a day apart.
Akita does state that for paid customers, they will continue to reach out to them on critical issues until they are resolved.
What I like
- Nice visual design
- Easy physical connectivity
- Easy setup process, although it didn’t work for me
- It did identify a potential vulnerability in my network
What needs to be improved
- Inability to connect to 5GHz networks
- Support for more than Wi-Fi devices
- Better support for mesh networks with single SSIDs
- More responsive tech support – waiting six days was pretty bad
- Once they made contact, further contacts did come quickly
- Reporting alone conveys almost no information at all and requires a separate, follow-up email to be useful
Final thoughts
Akita is an interesting device. For users with a more straightforward network than mine, setup should be really simple. Akita does monitor and find vulnerabilities, as it did on my network. The amount of information you receive about those is determined by whether you opt for the free subscription or pay $3.99 (if you’re in the first 1,000 subscribers) or $7.99 per month, or more for the full-service support option.
Is it worth it? That’s up to you. Is insurance worth it? That all depends on how much risk you want to take on yourself. And that’s what Akita essentially is – insurance. If nothing ever happens to your network, then Akita is a total waste of money. Kind of like fire insurance is a waste of money if your house never burns down. But, we carry insurance to ease the pain of a catastrophic loss. Akita goes one step further by working to prevent that kind of loss on your network by proactively identifying vulnerabilities and also by turning off access to compromised devices.
Price: $99
Where to buy: Ingiegogo
Source: The sample of this product was provided by HighIoT.
Filed in categories: Reviews
Akita connected home Wi-Fi security watchdog review originally appeared on The Gadgeteer on May 15, 2019 at 11:00 am.
Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.
WhatsApp Security Precautions You Should Be Using
It’s better to be safe than sorry, and that saying can also apply to your apps. One app that should be protected is WhatsApp. It is the most popular messaging app; therefore, you may have used it to share information you wouldn’t want others to see. WhatsApp has various options that will help keep your information safe, without having to install another app. Manage Who Can See Your Profile Picture, About, and Status Content When you first set up your WhatsApp account, you probably set it up in a way that reflects who you are. The problem with that is that strangers may see the… Read more
Arcanus 55 Private Wealth Safe review
REVIEW – The Arcanus 55 Personal Wealth Safe (a.k.a. Privacy Paranoid Vault) is a combination of a sophisticated, encrypted 16 GB USB drive and a rugged, waterproof, electronically isolated vault designed to protect the USB drive and other small items.
What is it?
The Arcanus 55 Personal Wealth Safe (a.k.a. Privacy Paranoid Vault) is a combination of a sophisticated, encrypted 16 GB USB drive and a rugged, waterproof, electronically isolated vault designed to protect the USB drive and other small items. The isolation vault provides protection from crushing, water infiltration, and acts as a Faraday cage protecting the contents from damage or snooping from to electromagnetic fields.
What’s in the box?
The Arcanus 55 system comes packed in a foam sleeve inside a sturdy cardboard box. The box contains the following
- 16 GB encrypted USB drive with a metal case and external keypad
- A metal vault with screw caps at each end
- Multiple holographic seals
- Small s-style carabiner
- A USB-A extension cable
- Decorative key
- Quick-start instructions
Hardware specs
The Arcanus 55 vault is 15 cm long (including the loop) and 3.7 cm in diameter. It weight 129 grams.
The encrypted USB drive has a metal case and is 9.15 cm long, 2.4 cm wide, and 1 cm thick. It weights 36 grams. The cap at the top is removable to expose a USB-A connector.
Design and features
The Arcanus 55 system is designed to be the ultimate portable protection for your data by providing encryption for your data, physical protection through the use of a metal body of the USB drive, protection from environmental threats (water, dust, electromagnetic fields), and tamper-evident seals. This combination should be sufficient for the needs of most people’s data. It isn’t going to protect national secrets, but then national secrets shouldn’t be on a thumb drive.
Setup
When I opened the package, I was confused to find no obvious USB drive. When I read through the quick-start sheet, I found that the drive was inside the vault which had tamper-resistant seals already in place. Breaking one of the seals, allowed me to extract the drive.
Before using the drive the default security code must be reset according to the instructions on the guide.
Once the security code has been reset, I removed the cap, entered the security code, and inserted the drive into a free USB port.
I had some problems completing the reset of the security code and getting the drive to unlock. A quick email to Arcanus 55’s technical support address and an arranged phone call later, I was able to get the drive set up. The instructions were a bit unclear on the key sequences needed to unlock the drive. This has been updated in a new quick-start guide which will ship with new units and is available online.
Performance
In addition to my initial difficulties getting the drive to accept a new security code, I also had trouble getting the drive to unlock. Both of these problems could be traced back to user error, rather than hardware or software failures. The first problem had to do with the speed at which I was entering the numbers on the keypad. I was informed that the presses have to be discrete with a brief pause between presses and not the rapid fire keying that I am used to with phones, keyboards, and ATMs. The second problem was incomplete instructions for the operation of the drive. Before the USB drive will recognize a security code, the key button must be pressed and only then will the code be accepted. A press of the key button submits the entered security code to unlock (if the code is correct) the drive.
Data is stored in encrypted form and is encrypted / decrypted on the fly for added security. I was concerned that this would negatively impact the drive’s performance, but this ended up not being an issue. The Arcanus 55 USB key works at least as quickly as any of the other encrypted USB drives that I own (including drives from most of the major players). I did not perform rigorous read/write speed tests, but merely timed transfer operations to and from the Arcanus 55 drive and compared these to the same operations on other drives. I was also able to playback 1080p video from files on the encrypted drive using VLC media player.
As an added layer of protection, you may install the included holographic seals over the joints where the caps screw onto the vault body. These seals are very difficult to remove without leaving a trace and serve as evidence of tampering with your vault.
In the event that your drive is lost or stolen, the encrypted storage system will not allow your data to be accessed, even if the chips are removed from the USB drive. If you need to quickly erases the drive because you have forgotten the security code, or you are under duress and want to make sure that your data is secure, a quick process will erase the decryption key and provide a wipe of the drive indices. Your data is now inaccessible (even with the security key). The drive may be reused by repeating the setup routine and selecting a new security code.
An important bit of information that was given to me during my technical support call is that if the unit has been left sitting without being plugged in for long periods of time (say “cold” storage), the unlocking functions and decryption systems may not work until the drive has been plugged in and the on-board power system has been allowed to recharge.
What I like
- Rugged vault–strong, good seals, keeps water and dirt out
- USB drive is physically strong and seems resistant to accidental damage
- Drive is relatively speedy and performs at least as well as my other encrypted USB drives
What needs to be improved
- Quick-start instructions (improved version now available on website)
- Decryption key entry sequence timing needs to allow for shorter times between key presses
- Add a USB-C connector version or add a UBC-A (female) to USB-C (male) adapter cable.
- Since the product literature talks about securing the vault into your bag with a carabiner or similar method, the clip that is included in the package should actually be able to clip onto the hard point on the vault.
Final thoughts
The Arcanus 55 Private Wealth Vault system is more than adequate for my needs when it comes to protecting my personal information. We have stored copies of our important household and personal papers on the drive and we carry this when we travel in case of an emergency. We have left a copy of the security code with our lawyer (who also has copies of the documents as well).
Price: $92.76
Where to buy: Arcanus 55, Inc.
Source: The sample of this product was provided by Arcanus 55, Inc.
Filed in categories: Reviews
Tagged: Security
Arcanus 55 Private Wealth Safe review originally appeared on The Gadgeteer on April 15, 2019 at 9:42 am.
Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.
Armadillo USB Firewall review
REVIEW – I can remember when floppy drives were the craze and then CDs and DVDs all with increasing capacities and abilities. In recent times, our demand for storage capacity and portability has resulted in USB flash drives and portable hard drives becoming the common use norm for storing and sharing files. I have come across a few people who were in a desperate position because they used someone else’s USB drive and accessed a file that was infected with a virus. In other cases, they managed to transfer an infected file from a computer to their USB drive. The result was anywhere from a small and relatively easy to rectify difficulty all the way to having to format their drive and reload their OS. In many cases, they would lose files that they failed to back up. The Armadillo USB Firewall offers protection against this type of disaster and more.
What is it?
The Armadillo USB Firewall is a high-speed USB firewall that connects between any computer and your USB device, isolating malicious firmware and keeping your computer safe. It can be used for flash drives and portable hard drives where its high-speed USB 2.0 hardware enables quick file transfers.
What’s in the box
1 x Armadillo USB Firewall
1 x User Manual
1 x Micro USB
Design and features
On one side there is a “Read Only’ mode switch that allows or restricts the data passage between two-way and one-way writeability and the micro USB jack that allows you to connect to your computer.
Shown below is the opposite side of the Firewall that has the standard USB port to plug in the portable USB drive.
Performance
The Armadillo USB Firewall is pretty much plug-and-play, and its use is quite simple. Place it in between your USB portable drive and your computer and it will protect your computer and your USB drive from malicious software that can harm your computer files. The “read only” switch allows you to prevent any malicious files from being written to your storage device. Engaging or disengaging this switch requires you to unplug the firewall from your computer and then switch the mode and reconnect. It is also important to note that the firewall only supports drives up to 2TB in capacity.
The picture below shows the firewall connected between my 2TB encrypted drive and my laptop.
What I like
- Build quality
- Portability
What can be improved
- The quality of the “read-only” switch. It feels a bit cheesy.
- The firewall should have the ability to switch modes without unplugging and reconnecting each time
- The limitation of up to 2TB drives since larger drives are now readily available and commonly used
Final thoughts
If you use USB drives on your computer from various known or unknown sources, this is a useful device to ensure that your computer and your drive are protected from malicious files/software. This is not a device for anyone who uses their own files and never shares drives, but for many of us who do, it is helpful. It is somewhat expensive and could be more efficient. The decision to purchase this firewall device is a personal choice and in my opinion, should be based on how exposed your computer and USB drives are.
Price: $249 NZD = $171.06 US
Where to buy: Globotron website
Sample: The sample for this review was provided by Globotron
Filed in categories: Reviews
Armadillo USB Firewall review originally appeared on The Gadgeteer on March 27, 2019 at 9:00 am.
Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.