Safeplug offers plug-and-play anonymous Web browsing using Tor

Safeplug is a new network device from Cloud Engines, Inc., the company behind Pogoplug.

Using Tor, Safeplug allows you to browse the Internet anonymously from any device that you own. This is possible because it is designed to be connected to your router. And once activated, all connections that originate from any device behind your router are anonymized.

I like devices like this, but not those that I know very little about. Other than the fact that it uses Tor, there is no other substantial information that the manufacturer has released about Safeplug. No hardware specification, not even on the device’s marketing page, or on an official blog post.

Not even a picture of the rear of the device has been made public. Or its dimensions. It’s like a black box, and I hate those things. For something that retails for US $49 ($58 plus S&H), I think more information needs to be made available.
Safeplug Tor anonymous web browsing

UPDATE (November 23 2013): A reply email from Safeplug says that:

Safeplug hardware specifications is similar to our Mobile device’s:

Processor: Feroceon 88FR131 rev 1 (v5l)
CPU Hardware: Feroceon-KW
BogoMIPS: 799.5
Total Memory: 128MB

What differs Safeplug from other devices, is it uses a whole different firmware.

Related Posts

Will NIEHS Ever “Get” EMFs? Most managers at the National Institute of Environmental Health Sciences (NIEHS) refuse to allow that the EMF­cancer playbook may be different from th...
Don’t like the Mozilla/Yahoo deal? Make StartPage your search engine Last week Mozilla announced that, starting from December (2014), the default search engine provider in its Firefox Web browser application will be Yah...
Bigger fines for Google, Microsoft in proposed EU data privacy laws Under EU data privacy laws under consideration, companies like Google and Microsoft will be hit with fines that could top $1 billion USD. The propo...
This is not just about your personal privacy Aside from revealing the names of specific programs that the government has been using to violate the privacy of all and sundry, to most people who ha...
Guide to writing NGINX rewrite rules Looking for a definitive guide to crafting Nginx rewrite rules? Today is your lucky day! The folks at Nginx have published just what you're loo...
With 15 days left, Kano has raised more than $1 million on Kickstarter You know your project will be a hit when you ask an investor for USD $100,000, but instead, you get a check for USD $1 million. That's what's happe...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


3 Comments

  1. DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD

    This is a Junk device, it works for my for 2 days and them stop the protection. I been sending request to support, they gave a service number and keep asking me to try multiple changes, but nothing works. they service is very very BAD. I believe this is a fraud Device, you will loose your money and all the time you put to make it work.

    DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD DON’T BUY IT, IS BAD

  2. I share your doubts about this thing – a $50 black box with “military-grade security technology” offering “complete security and anonymity”?
    Oh boy.

    They do link to the Tor FAQ and at least tell you to about cookies (in their very last FAQ entry) but that’s obviously not even close to enough to ensure “complete (sic!) anonymity”.

    I get that they’re trying to reach a non-techie audience but bold claims like “complete security” will do more harm than good, I’m afraid.

Leave a Comment

Your email address will not be published. Required fields are marked *

*