Daily Deal: VoCore2 Mini Linux Computer And Ultimate Dock

from the good-deals-on-cool-stuff dept

A whole lot of computing power is packed into VoCore2 Mini Linux Computer, an open source Linux computer and fully functional wireless router that is smaller than a coin. The applications of this tiny computer are virtually endless; use it as a VPN gateway to secure your network, an AirPlay music streaming station, and much more. You can write code for the VoCore 2 in C, Java, Python, Ruby, JavaScript, and more to enhance its functions. Plug in a microSD card to the included Ultimate Dock and create a personal cloud server. The VoCore2 + Ultimate Dock are on sale now for just $43.


Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.

Filed Under: daily deal


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    DannyB (profile), 24 Oct 2016 @ 11:19am

    Mini Linux boxes need to have two ethernet jacks

    A mini Linux computer should have TWO ethernet jacks. Some project ideas are harder to implement without two ethernet jacks.

    Software could bridge the two ethernet jacks so that all packets flow transparently between them as if it were an ordinary cable. Thus, it can be placed inline between the wall jack and an unsuspecting office PC. Call it a "hard drive optimizer" or something like that. The user is supposed to install it.

    The device can look for interesting traffic passing through, and log it.

    Later, at convenient times, the device can phone home with data. The phone home part can be made to look pretty innocent. It could use the MAC address and IP address of the PC that it already knows it's attached to. Be sure not to stomp on ports or connections that might be ongoing from the PC. It would also make sure response packetes to it's own connections do not make it back to the PC it sits in front of. Make simple, innocent HTTPS connections to the mother ship and ex filtrate the data collected.

    MITM attacks may also be possible. Especially if you can persuade the user to insert a USB stick that installs a new trusted root CA cert.

    The device can try to launch phishing or other attacks against the PC, but without introducing any of that traffic onto the rest of the office's network.

    This project could be enhanced by having a transparent network proxy so that all HTTP requests for images return Lol Cat images of the same dimensions.

    Youngsters can have all sorts of fun with an inexpensive toy like this. Not to mention the education potential.

    I like it.

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Close

Add A Reply

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: Copying Is Not Theft
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.