Safeplug offers plug-and-play anonymous Web browsing using Tor

Safeplug is a new network device from Cloud Engines, Inc., the company behind Pogoplug.

Using Tor, Safeplug allows you to browse the Internet anonymously from any device that you own. This is possible because it is designed to be connected to your router. And once activated, all connections that originate from any device behind your router are anonymized.

I like devices like this, but not those that I know very little about. Other than the fact that it uses Tor, there is no other substantial information that the manufacturer has released about Safeplug. No hardware specification, not even on the device’s marketing page, or on an official blog post.

Not even a picture of the rear of the device has been made public. Or its dimensions. It’s like a black box, and I hate those things. For something that retails for US $49 ($58 plus S&H), I think more information needs to be made available.
Safeplug Tor anonymous web browsing

UPDATE (November 23 2013): A reply email from Safeplug says that:

Safeplug hardware specifications is similar to our Mobile device’s:

Processor: Feroceon 88FR131 rev 1 (v5l)
CPU Hardware: Feroceon-KW
BogoMIPS: 799.5
Total Memory: 128MB

What differs Safeplug from other devices, is it uses a whole different firmware.

Related Posts

How to create and use a Docker Swarm With the increased attention of containerization and microservices, Docker is an obvious choice for development and perhaps production. How can an...
YotaPhone. Always-on dual screen, thicker than most, but not by much The YotaPhone is a smartphone from Yota Devices Ltd., a Russian company that also manufactures a portable LTE router called Ruby. YotaPhone is an ...
Your Web Surfing History Is Accessible Without Your Permission The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advert...
Using Ansible with Docker to Deploy a WordPress Service on Rancher Ansible is a configuration management and orchestration application that was recently acquired by Red Hat. Rancher is a platform for working with Dock...
Downloads of Apache OpenOffice 3.4.0 top 5 million Apache 3.4 was released just six weeks ago. Since that time, download rate has been brisk. That is relative, of course, but for a software that is no ...
SSLMate: Buy and install DV SSL certificates from the command line Looking for a tool to facilitate buying and installing SSL certificates for your website? SSLMate to the rescue! SSLMate is the second and latest t...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


3 Comments

  1. DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD

    This is a Junk device, it works for my for 2 days and them stop the protection. I been sending request to support, they gave a service number and keep asking me to try multiple changes, but nothing works. they service is very very BAD. I believe this is a fraud Device, you will loose your money and all the time you put to make it work.

    DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD

  2. I share your doubts about this thing – a $50 black box with “military-grade security technology” offering “complete security and anonymity”?
    Oh boy.

    They do link to the Tor FAQ and at least tell you to about cookies (in their very last FAQ entry) but that’s obviously not even close to enough to ensure “complete (sic!) anonymity”.

    I get that they’re trying to reach a non-techie audience but bold claims like “complete security” will do more harm than good, I’m afraid.

Leave a Comment

Your email address will not be published. Required fields are marked *

*