Pogoplug Safeplug: Safe, Secure, Anonymous

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire

Can a cheap, Linux-powered black box from a cloud storage specialist offer the reassurance of privacy in a post-Snowden world of paranoia?

Created by once and former private-cloud-turned-moretraditional-cloud-provider Pogoplug, the Safeplug reimagines the company’s Linux-powered and ARM-based embedded hardware platforms as access points to The Onion Router (TOR).


Pogoplug Safeplug

Originally created by the US Navy, TOR allows users to access the internet by routing their traffic across an encrypted mesh of other systems, eventually popping out of the other side on a completely different IP address. TOR is already used by a wide variety of people, but Pogoplug is hoping to extend its appeal even further by making it as simple as possible to use. Unboxing the Safeplug, it’s easy to see how Pogoplug was able to get its device to market so quickly: it’s the same hardware as the fourth-generation Pogoplug storage device, with a different logo on its face. The same ARMv5 embedded processor is present, the same 128MB of RAM, and there’s even a USB port and a SD card slot from its original incarnation as a storage gateway – neither of which, sadly, are actually usable on the Safeplug.

Getting started with the device is quick and easy: visit the Safeplug website (, click the ‘Activate my Safeplug’ button, and follow the instructions to plug the device into the power socket and network port. Wait a few seconds for a firmware update, and a new screen will appear, allowing you to configure the Safeplug’s settings.


The USB port, used to add storage devices to the Pogoplug Mobile, is not usable on the Safeplug

It’s here that installation becomes a manual process: the Safeplug doesn’t act as router, but instead sits behind your existing router and offers proxy services. Using its selfserved file, browsers – or entire systems – can be configured to route their traffic over the Safeplug and, as a result, via TOR. Individual sites can also be configured, bypassing the TOR connection and traversing the plain internet as normal. Traffic that does route via TOR is encrypted until it reaches an exit node – a portion of the network known to include devices for sniffing non-HTTPS traffic, something Pogoplug fails to warn users of in its documentation.

The Safeplug has an extra trick up its sleeve: a built-in advert blocker. Switched off by default, turning the setting on will block access to known advertising hosts, making for a leaner and cleaner browsing experience, but cutting off a vital income stream for the sites that are affected. It’s a bit of a thorny moral issue, but for those that would like to use it, the option is there.

Sadly, while the Safeplug certainly makes connecting disparate devices to TOR as simple as possible, it also loses something along the way. Using the TOR Browser Bundle attacks two areas of concern: the connection itself and the browser, which in the Bundle is a locked-down port of Firefox that comes with JavaScript disabled by default. When configuring an existing browser to use the Safeplug, however, that extra layer of security isn’t included – and if you don’t disable JavaScript, either manually or using an add-on like NoScript, you can still be easily tracked.

The box itself is also running a relatively outdated kernel based on the 2.6 branch, which could raise security questions of their own – mitigated, thankfully, by the fact the device is by default only accessible to your internal network.


A single frontfacing LED provides feedback as to the Safeplug’s internet connectivity status

For those who are only looking to evade the Great Firewall of Britain, or who would like to run their own low-power TOR relay to improve the performance of the network, the Safeplug is easier to recommend. For those who value true security, a roll-your-own solution – which would also provide the opportunity to validate the source code – based on something like a Raspberry Pi would be a better option.

The Safeplug is far from a security panacea. Users should be warned that unencrypted traffic can be captured by TOR exit nodes, and a full copy of the firmware’s source should be provided to guarantee freedom from back doors. For those just looking to bypass regional filters, however, the Safeplug is certainly easy to use.



·         An easy and low-power means to route network traffic via TOR, with the

added bonus of advert removal should you choose it


·         There are questions about the overall security of the device, and it lacks

the ability to use the on-board USB or SD card ports


Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us