Link to home
Create AccountLog in
Cyber Security

Cyber Security

--

Questions

--

Followers

Top Experts

Avatar of john rease
john rease🇺🇸

a mobile hotspot similar to kajeet smartspot

hello:

I am trying to make my own version of the kajeet smart spot  https://www.kajeet.com/smartspots

basically, what I plan to do is get a GLINet mobile hotspot.

then I will connect it to something like twingate for remote management.

next, I plan to, of course, get it on a data plan with a USB modem.

I then plan to either spin up a VPN server on my home network and add filtering to the opnsense firewall using zenarmor, or spin something up in the cloud, and connect the hotspot to that.

it will also include YouTube restricted mode.

in that way, I can have kids on a mobile hotspot, just with web filtering enabled.

any other suggestions on how I should go about this?

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.


This question needs an answer!
Looks like this question is still being worked on. Think you can help?
Create your account and start contributing!
Create Account
Cyber Security

Cyber Security

--

Questions

--

Followers

Top Experts

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cyber security refers to the protection of personal or organizational information or information resources from unauthorized access, attacks, theft, or data damage. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.