Mashable's been closely covering this story — you canread everything here— but we'll give you the TL;DR version. The FCC has decided that large internet service providers (ISPs) like Xfinity, Verizon, RCN, and any other company in the game can charge customers premium rates for faster internet access. This decision was also significant in that it set ISPs significantly free from the confines of government oversight, and it is sparkingjustifiable privacy concernsas deregulation could empower ISPs to peek into our browsing behavior even more than they already do, or worse,sellthat data.
If you're one of those people who likes to stock up on canned goods before the first snowflakes even start to fall, all of this change might make you feel a little twitchy. But we're here for you: One way to get some peace of mind is by downloading a virtual private network (VPN) so that what you do online stays between you and your mouse.
A VPN will essentially allow you to access the web with protections that encrypt your data from prying ISP eyes. VPNs can help add a layer of privacy online no matter where you are, which is why they've long been used by people who travel abroad and want to protect personal info (financial or otherwise) while browsing on public Wi-Fi. Journalists working on sensitive stories find VPNs useful, too.
If you're new to the VPN game, then we have a few suggestions — most of which are even on sale.
According to PC Mag, TunnelBear is a "friendly" VPN option for first-time users due in large part to its "pleasing, approachable design." While it doesn't have P2P, BitTorrent, or any specialized servers, it's worth noting that TunnelBear works with Netflix, which isn't always the case with VPNs.
With more than 2,000 servers around the world and the ability to pay for a subscription in Bitcoin, NordVPN is a PCMag Editor's Choice product with a (rare) 5-star review. "None of the searches or streaming activities that originate within NordVPN's software are logged anywhere on any of NordVPN's servers," says PCMag. "The company maintains no logs of a user's internet path or actions."
This high-rated VPN has a bigger suite of advanced features than others, like automatic IP address cycling, and has some 750 servers across 61 countries. CNET lists IPVanish as one of the best VPN services of 2017. A con for IPVanish though is that it's expensive. Good news for you: it's currently on sale.
Though KeepSolid doesn't allow ad blocking, it's one of the most consistently affordable VPNs out there and offers many of the features you'll want: browser extensions, specialized servers, P2P networking, and more. (Read the TechRadar review here.) One of the biggest draws though is KeepSolid's flexible pricing plan, which includes an Infinity Plan for lifetime use that's currently 70% off.
PCMag gives VyprVPN 4.5 stars, due in part to its multi-platform and multi-protocol support. According to the review, VyprVPN has hundreds of servers and a great interface, though it covers fewer devices than others on the market. In case you're on the fence, VyprVPN also has the option of a three-day free trial.
This morning Bezos and team announced Amazon Key, an in-home camera and smart lock. As expected, the news was met with hugs and disgust. “Hell no. There’s no way I’m letting a stranger into my home.” – Person on the Internet.
Regardless of your position, Amazon’s chess move to get a key to your door is brilliant. This gives the “A” in FANG (Facebook, Amazon, Netflix, and Google) a gateway to in-home services, including:
Grocery delivery Dog walking House cleaning Elderly care Home repairs
Amazon’s playing a very long game. The seeds planted today will enable a new wave of exciting (and society altering) automation as robots clean your home, walk your dog, and deliver eggs.
If you’re looking for a security camera but not ready to give strangers a key to your home, check out this $19.99 smart camera. It’s #3 on Product Hunt today.
Sometimes the best thing to say about a wireless router in your house is that once it's set it, you forget it exists. As long as the devices that need the Wi-Fi connection can get on and function, that's all that matters, right?
Maybe, but we also live in the age of leaks, wiki and otherwise. If you're worried about the security of your home and by extension your personal data—especially from hackers who could casually sit in a car outside and get access to your systems—then you need to put a padlock on that wireless. You may also want to prevent others from using your network, and freeloaders alike.
So what do you do? Follow these tips and you'll be well ahead of most home Wi-Fi users. Nothing will make you 1,000 percent safe against a truly dedicated hack. Crafty social engineering schemes are tough to beat. But don't make it easy on them; protect yourself with these steps.
Time-Tested Wi-Fi (and All Around) Security
Change Your Router Admin Username and PasswordEvery router comes with a generic username and password—if they come with a password at all. You need it the first time you access the router. After that, change them both. Immediately. The generic usernames are a matter of public record for just about every router in existence; not changing them makes it incredibly easy for someone who gets physical access to your router to mess with the settings.
If you forget the new username/password, you should probably stick to pencil and paper, but you can reset a router to its factory settings to get in with the original admin generic info.
Change the Network NameThe service set identifier (SSID) is the name that's broadcast from your Wi-Fi to the outside world so people can find the network. While you probably want to make the SSID public, using the generic network name/SSID generally gives it away. For example, routers from Linksys usually say "Linksys" in the name; some list the maker and model number ("NetgearR6700"). That makes it easier for others to ID your router type. Give your network a more personalized moniker.
It's annoying, but rotating the SSID(s) on the network means that even if someone had previous access—like a noisy neighbor—you can boot them off with regular changes. It's usually a moot point if you have encryption in place, but just because you're paranoid doesn't mean they're not out to use your bandwidth. (Just remember, if you change the SSID and don't broadcast the SSID, it's on you to remember the new name all the time and reconnect ALL your devices—computers, phones, tablets, game consoles, talking robots, cameras, smart home devices, etc.
Activate EncryptionThis is the ultimate Wi-Fi no-brainer; no router in the last 10 years has come without encryption. It's the single most important thing you must do to lock down your wireless network. Navigate to your router's settings (here's how) and look for security options. Each router brand will likely differ; if you're stumped, head to your router maker's support site.
Once there, turn on WPA2 Personal (it may show as WPA2-PSK); if that's not an option use WPA Personal (but if you can't get WPA2, be smart: go get a modern router). Set the encryption type to AES (avoid TKIP if that's an option). You'll need to enter a password, also known as a network key, for the encrypted Wi-Fi.
This is NOT the same password you used for the router—this is what you enter on every single device when you connect via Wi-Fi. So make it a long nonsense word or phrase no one can guess, yet something easy enough to type into every weird device you've got that uses wireless. Using a mix of upper- and lowercase letters, numbers, and special characters to make it truly strong, but you have to balance that with ease and memorability.
Double Up on Firewalls The router has a firewall built in that should protect your internal network against outside attacks. Activate it if it's not automatic. It might say SPI (stateful packet inspection) or NAT (network address translation), but either way, turn it on as an extra layer of protection.
For full-bore protection—like making sure your own software doesn't send stuff out over the network or Internet without your permission—install a firewall software on your PC as well. Our top choice: Check Point ZoneAlarm PRO Firewall 2017; there a free version and a $40 pro version, which has extras like phishing and antivirus protection. At the very least, turn on the firewall that comes with Windows 8 and 10.
Turn Off Guest NetworksIt's nice and convenient to provide guests with a network that doesn't have an encryption password, but what if you can't trust them? Or the neighbors? Or the people parked out front? If they're close enough to be on your Wi-Fi, they should be close enough to you that you'd give them the password. (Remember—you can always change your Wi-Fi encryption password later.)
Use a VPN
A virtual private network (VPN) connection makes a tunnel between your device and the Internet through a third-party server—it can help mask your identity or make it look like you're in another country, preventing snoops from seeing your Internet traffic. Some even block ads. A VPN is a smart bet for all Internet users, even if you're not on Wi-Fi. As some say, you need a VPN or you're screwed. Check our list of the Best VPN services.
Update Router FirmwareJust like with your operating system and browsers and other software, people find security holes in routers all the time to exploit. When the router manufacturers know about these exploits, they plug the holes by issuing new software for the router, called firmware. Go into your router settings every month or so and do a quick check to see if you need an update, then run their upgrade. New firmware may also come with new features for the router, so it's a win-win.
If you're feeling particularly techie—and have the right kind of router that supports it—you can upgrade to custom third-party firmware like Tomato, DD-WRT or OpenWrt. These programs completely erase the manufacturer's firmware on the router but can provide a slew of new features or even better speedscompared to the original firmware. Don't take this step unless you're feeling pretty secure in your networking knowledge.
Turn Off WPSWi-Fi Protected Setup, or WPS, is the function by which devices can be easily paired with the router even when encryption is turned because you push a button on the router and the device in question. Voila, they're talking. It's not that hard to crack, and means anyone with quick physical access to your router can instantly pair their equipment with it. Unless your router is locked away tight, this is a potential opening to the network you may not have considered.
'Debunked' Options
Many security recommendations floating around the Web don't pass muster with experts. That's because people with the right equipment—such wireless analyzer software like Kismet or mega-tools like the Pwnie Express Pwn Pro—aren't going to let the following tips stop them. I include them for completion's sake because, while they can be a pain in the ass to implement or follow up with, a truly paranoid person who doesn't yet think the NSA is after them may want to consider their options. So, while these are far from foolproof, they can't hurt if you're worried.
Don't Broadcast the Network Name
This makes it harder, but not impossible, for friends and family to get on the Wi-Fi; that means it makes it a lot harder for non-friends to get online. In the router settings for the SSID, check for a "visibility status" or "enable SSID broadcast" and turn it off. In the future, when someone wants to get on the Wi-Fi, you'll have to tell them the SSID to type in—so make that network name something simple enough to remember and type. (Anyone with a wireless sniffer, however, can pick the SSID out of the air in very little time. The SSID is not so much as invisible as it is camouflaged.)
Disable DHCPThe Dynamic Host Control Configuration Protocol (DHCP) server in your router is what IP addresses are assigned to each device on the network. For example, if the router has an IP of 192.168.0.1, your router may have a DCHP range of 192.168.0.100 to 192.168.0.125—that's 26 possible IP addresses it would allow on the network. You can limit the range so (in theory) the DHCP wouldn't allow more than a certain number of devices—but with everything from appliances to watches using Wi-Fi, that's hard to justify.
For security, you could also just disable DHCP entirely. That means you have to go into each device—even the appliances and watches—and assign it an IP address that fits with your router. (And all this on top of just signing into the encrypted Wi-Fi as it is.) If that sounds daunting, it can be for the layman. Again, keep in mind, anyone one with the right Wi-Fi hacking tools and a good guess on your router's IP address range can probably get on the network even if you do disable the DHCP server.
Filter on MAC Addresses Every single device that connects to a network has a media access control (MAC) address that serves as a unique ID. Some with multiple network options—say 2.4GHz Wi-Fi, and 5GHz Wi-Fi, and Ethernet—will have a MAC address for each type. You can go into your router settings and physically type in the MAC address of only the devices you want to allow on the network. You can also find the "Access Control" section of your router to see a list of devices already connected, then select only those you want to allow or block. If you see items without a name, check its listed MAC addresses against your known products—MAC addresses are typically printed right on the device. Anything that doesn't match up may be an interloper. Or it might just be something you forgot about—there is a lot of Wi-Fi out there.
Turn Down the Broadcast Power Got a fantastic Wi-Fi signal that reaches outdoors, to areas you don't even roam? That's giving the neighbors and passers-by easy access. You can, with most routers, turn down the Transmit Power Control a bit, say to 75 percent, to make it harder. Naturally, all the interlopers need is a better antenna on their side to get by this, but why make it easy on them? via pcmag
You might be able to download the latest episode of Game of Thrones in mere seconds if recent scientific research proves correct. Scientists have discovered the means to send complex data using high-frequency radiation that may lead to ultra fast Wi-Fi speeds.
Terahertz replaces traditional microwaves
The project researchers successfully sent video signals at speeds of 50 gigabytes per second using terahertz, rather than the traditional microwaves. Often wireless networks can only operate at a top speed of 500 megabytes a second. If the success of the experimentation continues, it could lead to high-speed streaming on the go.
Brown University leads international team of researchers
Daniel Mittleman, a professor in Brown University‘s School of Engineering, in Providence, US, who worked on the project explains, “We showed that we can transmit separate data streams on terahertz waves at very high speeds and with very low error rates.” He continues, “This is the first time anybody has characterized a terahertz multiplexing system using actual data, and our results show that our approach could be viable in future terahertz wireless networks.”
Demand for high-speed networks pushing research
Demand for high-speed voice and data networks are driving the research. While microwaves are doing a fine job, the increased demand is motivating researchers to look for new answers. The terahertz waves have higher frequencies which allow them to carry more data than the lower frequency microwaves. The research is, in part, funded by the U.S. Army Research Office.
The successful test saw two real-time high-definition television broadcasts encoded onto terahertz waves of two different frequencies then beamed together. The resulting transmission moved the data at 70 gigabits per second, an outstanding speed compared to most accessible Wi-Fi speeds. The transmission was completed with no errors or breakages. In the next test, transmission speed was increased to 50 gigabits per second. There were some reported errors, but non that stood out amongst expected and accepted errors in regular data transfer. The process of sending multiple signals through one channel is called multiplexing. It’s the same basic idea that allows many users to access open Wi-Fi network.
Outdoor testing approved for terahertz frequencies.
An international team worked on the project, guided by Daniel Mittleman. His team have been working on this technology for some time. In 2015 the lab produced a paper that described the waveguide concept. The research described the potential uses of terahertz. In the latest research Mittleman says the research has taken the critical step ‘testing the device with real data.’
In the next steps for the team which includes, researchers from the Institut d’Electronique de Microélectronique et de Nanotechnologie, in Lille, France, will test terahertz function in different types of environments. The Mittleman lab was recently awarded a license from the Federal Communications Committee (FCC) to perform outdoor tests at terahertz frequencies.
While the research could lead to ultra fast Wi-Fi in the future there are many hurdles to overcome before we can see consumer access to these speeds.
You would be forgiven for thinking that wireless mesh networking is just another marketing bullet point for new Wi-Fi routers, a phrase coined to drive up prices without delivering benefits. But we can avoid being cynical for once: mesh technologydoes deliver a significant benefit over the regular old Wi-Fi routers we’ve bought in years past and that remain on the market.
Mesh networks are resilient, self-configuring, and efficient. You don’t need to mess with them after often minimal work required to set them up, and they provide arguably the best and highest throughput you can achieve in your home. These advantages have led to several startups and existing companies introducing mesh systems contending for the home and small business Wi-Fi networking dollar.
Mesh networks solve a particular problem: covering a relatively large area, more than about 1,000 square feet on a single floor, or a multi-floor dwelling or office, especially where there’s no ethernet already present to allow easier wired connections of non-mesh Wi-Fi routers and wireless access points. All the current mesh ecosystems also offer simplicity. You might pull out great tufts of hair working with the web-based administration control panels on even the most popular conventional Wi-Fi routers.
Luma Home, Inc.
A conventional wireless router delivers limited coverage if you can't hardwire additional Wi-Fi access points to it.
The concept of mesh networks first appeared in the 1980s in military experiments, and it became commercially available in the 1990s. But hardware, radio, and spectrum requirements; cost; and availability made it truly practical for consumer-scale gear only in the last couple of years. That’s why we’re seeing so many systems hit the market all at once.
Mesh networking treats each base station as a node that exchanges information continuously about network conditions with all adjacent nodes across the entire set. This allows nodes that aren’t sending and receiving data to each other to still know all about each other. This knowledge might reside in a cloud-based backend or in firmware on each router.
Mesh networks don’t retransmit all the data passing through among a set of base stations. The systems on the market dynamically adjust radio attributes and channels to create the least possible interference and the greatest possible coverage area, which results in a high level of throughput—far higher than anything that’s possible with WDS (Wireless Distribution System) and similar broadcast-style systems.
Luma Home, Inc.
Mesh network routers, such as Luma, connect multiple wireless nodes to blanket your home with Wi-Fi.
The principle behind all wireless networking is “how do I transmit this number of bits in the smallest number of microseconds and get off and let someone else use it?” explains Matthew Gast, former chair of the IEEE 802.11 committee that sets specs used by Wi-Fi. Mesh networks manage this better than WDS.
In some cases, Gast notes, a mesh node might send a packet of data to just one other node; in others, a weak signal and other factors might route the packet through other nodes to reach the destination base station to which the destination wireless device is connected.
Some mesh routers have single-band-at-a-time radios, and are meant more as smart extensions. But it’s more common that the nodes have radios for two or even three frequency bands, like the latest Eero. This lets mesh dedicate bands to intra-node data, switching channels to reduce congestion, or mixing client data and “backhaul” data on the same channel.
Netgear
High-end conventional routers offer high-performance features not currently found in mesh Wi-Fi systems. The Netgear Nighthawk X10, for instance, has a 10Gbps ethernet port for network storage.
The ultimate goal is to make sure as much throughput remains reserved for actual productive traffic, such as streaming 4K video from one end of a house to the other or making fast connections to internet multiplayer games, relative to that consumed by moving data around the network.
If a node is powered down or crashes—your cat gets a little too interested and knocks one off a shelf—the network doesn’t go down, too. As long as every node can continue to communicate with at least one other node, you still have a fully functioning network.
You typically rely on a smartphone to help set up the first node and network parameters and add additional nodes to an existing network. Because you don’t have to plan where mesh nodes go, mesh systems automatically reconfigure as you add nodes. Most of the systems available offer help in figuring out where to locate units, some of them using indicators on the nodes themselves while others require smartphone software. “There is an immense amount of engineering effort to make something very simple,” says Gast.
Is it smart to invest in mesh?
The price you pay for this better efficiency? Proprietary protocols. While Wi-Fi remains standardized, and extremely and reliably compatible among equipment from different makers, no two mesh systems on the market work with each other. An early mesh protocol, 802.11h, wound up being not just insufficient to the task, but entirely ignored by companies as they pursued better results and competitive advantages. It’s also unlikely that any time in the next few years a compatible industry standard would arise and get uptake, given no such standard is currently working its way through the pipeline.
Michael Brown
Every major router manufacturer, and a number of startups, have jumped on the mesh network bandwagon.
You have three reasons to want compatibility: a way to acquire cheaper equipment if one manufacturer charges more than you want to pay for additional nodes; as an escape route if a company or product line goes under; or as a way to upgrade a network gradually to incorporate new standards. That’s not possible with mesh.
Being locked in to one manufacturer increases risk, because several companies making mesh gear—Eero, Luma, and Securifi—are startups, and not all startups succeed. More established firms, such as D-Link, Linksys, Netgear, and TP-Link, make mesh networking hardware, but if those product lines don’t produce profit, they won’t continue to make units forever.
All of this could affect you in six ways:
Inability to get technical support when something goes wrong.
Lack of warranty coverage for failed hardware. (Companies in bankruptcy, however, might be required to fund some amount of repair and replacement.)
No way to purchase new units to expand your network.
Smartphone apps, which some systems rely upon exclusively, stop receiving updates and stop working.
Cloud-based elements for configuration and management get turned off, rendering the nodes inoperable or locked into the last configuration. A Wi-Fi camera memory card maker at one point intended to disable configuration updates to its cloud-linked product. This can be an issue even with active products: Google accidentally reset its non-mesh OnHub and mesh Google Wifi routers in February because of a cloud-based account login issue.
Critical security flaws are discovered, but can’t be updated. While it seems unlikely that a mesh device that didn’t sell enough to be a success would be exploited, most standalone hardware of any kind—from DVRs to internet-connected cameras—use a variation of Linux and one of a handful of widely used chipsets.
Balanced against this is the lifecycle of Wi-Fi routers. In my nearly 20 years of buying and testing wireless networking hardware, I’ve found that it either fails in three to five years or needs an upgrade in that time to take advantage of newer networking features. Consider the price tag on a mesh system your rental price across that period, and think about whether the value of $70 to $150 a year, depending on the system and number of nodes, delivers enough utility. If you’re lucky, it will last much longer.
Michael Brown
The Netgear Orbi RBK50 is our current top pick in Wi-Fi routers (even if it isn't a true mesh router).
Weaving a finer mesh
The future of mesh isn’t more and more and more nodes. Rather, it’s nodes that have more and different kinds of radios and other features built in. Already, some mesh nodes have Bluetooth for configuration and personal area networking control and up to three Wi-Fi radios supporting the full 802.11a/b/g/n/ac range.
Future nodes could add more radios or slice-and-dice an 802.11ac Wave 2 feature that allows beamforming and device targeting to further separate intra-node traffic from device-to-device traffic. And they could throw in 802.11ad/Wi-Gig for superfast ultra-high-definition streaming or ZigBee and other smart-home standards.
But the baseline set already today is for fast, efficient, and simple. Newer nodes can put more icing on the cake.
To comment on this article and other TechHive content, visit our Facebookpage or our Twitter feed.