Be more anonymous with ProxyHam, the box that puts a mile between you and your IP address

proxyham puts some distance between you and the internet ipbox
Ben Caudill
Anonymity is the price we’ve paid for our ever-growing connectivity. Between the government and companies like Facebook and Google, there’s not much that we can do on-(or off) line that goes unnoticed. But this may soon change with the introduction of ProxyHam, a “hardware proxy” that can put quite a bit of distance between you and your traceable IP address, adding a considerable level of protection and privacy to the extra-careful web browser.

ProxyHam is actually two devices — one is a physical box that houses a Raspberry Pi computer equipped with a WiFi card, and a 900MHz antenna that can be plugged into some obscure location. The other device is a 900MHz antenna that receives the signal, sent from between one to 2.5 miles away. ProxyHam works by connecting the user to this now distant WiFi source by way of the low frequency radio waves. Anyone attempting to trace the source of the signal would be routed through a series of proxy connections to a final IP address that would originate from the ProxyHam Raspberry Pi computer, and not the user’s device.

The open source device was built by Ben Caudill, a researcher for the consultancy Rhino Security Labs, for a mere $200, and he plans on selling his new invention at the upcoming DefCon hacker conference in Las Vegas at cost. The device, Caudill says, is meant to operate as a last resort when it comes to security. “We consider this the last or worst case scenario, the absolute fallback plan if everything else fails,” he told Motherboard, and noted that ProxyHam is meant to work in tandem other tools like Tor.

He continued, ProxyHam serves to “expand the physical location an IP address could be associated with, so that’s good,” but noted, “It’s just that it doesn’t do anything on the user side, where identity leak would most likely happen.” Ultimately, Caudill says, “By default on its own it’s not going to be helpful.”

While ProxyHam provides equal opportunity usability for both criminals and the everyday user just looking for some added security, the same could be said for almost any service, and Caudill isn’t concerned. After all, it isn’t his responsibility to monitor what people do with his technology.


This ‘computer mouse’ sets the new size standard for portable computing

The Raspberry Pi is an amazingly capable little computer and it's small enough that it can fit just about anywhere. Even in a computer mouse — if you're willing to build a custom chassis for it.
Home Theater

What are HDMI ARC and eARC? Here’s how they can simplify your home theater

HDMI ARC is one of the coolest TV features at your disposal. But if you're like most folks, you have no idea how it works, if you even know what it is at all. Here's our primer on HDMI ARC, as well as the next generation technology, eARC.

Lost your router? Here's how to find its IP address to help track it down

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.
Home Theater

Banish the bunny ears (and monthly bills) with these excellent HD antennas

When transitioning away from cable and satellite, finding the best HDTV antenna for your area can be touch. To help, we've compiled our picks of the best indoor HDTV antennas you can buy.

An update to Microsoft To-Do will help you keep up with your resolutions

If you're looking to stay productive in 2019, you might want to check out the freshly updated Microsoft To-Do app, now with additional integration with the Windows 10 Start Menu and more.

Want to save a webpage as a PDF? Just follow these steps

Need to quickly save and share a webpage? The best way is to learn how to save a webpage as a PDF file, as they're fully featured and can handle images and text with ease. Here's how.

Could the next Microsoft HoloLens be announced at MWC 2019?

After not having a presence at Mobile World Congress for three years, Microsoft is now sending out media invites for a press conference on February 24 during the annual event in Barcelona. Could a next-generation HoloLens be on the way?

Microsoft to separate Cortana from search with the next version of Windows 10

Changes are on the way for two key features in Windows 10. A separation of Windows 10 search and Cortana will allow Microsoft to more often innovate on each of the features independently.

Delete tracking cookies from your system by following these quick steps

Cookies are useful when it comes to saving your login credentials and other data, but they can also be used by advertisers to track your browsing habits across multiple sites. Here's how to clear cookies in the major browsers.

Convert your PDFs into convenient Word documents with Adobe or a free option

PDF files are great, but few document types are as malleable as those specific to Microsoft Word. Here's how to convert a PDF file into a Word document, whether you prefer to use Adobe's software suite or a freemium alternative.

Nvidia’s next midrange card might be a GTX 1660 Ti, rumors suggest

Nvidia may be working on a non-RTX Turing graphics card called the 1660 Ti. Rumors suggest it will have around 20 percent fewer CUDA cores than the RTX 2060 and will lack ray tracing support.

From Samsung to HP, here are the best cheap Chromebook deals right now

Whether you want a compact laptop to enjoy some entertainment on the go, or you need a no-nonsense machine for school or work, we've smoked out the best cheap Chromebook deals -- from full-sized laptops to 2-in-1 convertibles -- with most…

Chromebook 13 vs. Google Pixelbook: Acer model takes on the king

Acer's Chromebook 13 is throwing tons of speed at the Chrome OS market, to go with a midrange build and traditional clamshell design. Is that enough to challenge the Google Pixelbook?

Data breach compromises 773 million records, 21 million passwords

A security researcher was alerted to a collection of breached data that included more than 773 million compromised records. After digging deeper, the breach was revealed to contain more than 21 million passwords.