Here’s a secret that a lot of people don’t want you to know.
Every computer is a computer.
Sounds dumb, right? Let’s break it down.
OK. What that means is: every computer is Turing-complete.
A Turing-complete computer (named for this guy) is a computer that can do any computing work you throw at it.
Every single computer in the world is Turing complete. Your phone, the microchip that controls fuel consumption in your car, your digital watch, anything with a microchip. Any computer, given enough time, can do all the same calculations as any other computer.
Lots of folks don’t want you to know that because it suits them that you believe that different ‘devices’ have different purposes.
- They have different peripherals.
- In the middle is a Turing-complete computer.
- Which is great. It lets you build a laptop out of an old mobile phone, or a… well, a bunch of stuff in fact.
- Lets you read this.
- Lets people run code on anything with a microchip.
- Like your router.
Typically we think of a router as just a junction box that lets you plug your computer into the wall and thus into the great big Internet beyond.
But your router is a full, Turing complete computer. It has an operating system. You can log into it. And if you have some relatively basic skills – as in, I can’t do it, but for people with skills in those areas, it’s absolutely trivial – you can make it run any code you want.
You could plug a TV and a joystick into your router and play Space Invaders on it if you really wanted to.
All that computing power, just sitting there doing nothing but connecting you to series 7 of Weeds (I’m catching up).
It isn’t going to be doing nothing for long.
Routers have been hacked since the dawn of routers. You can hack next door’s if you like – the chances are they haven’t changed their password either. (Don’t do it – or if you do, don’t say I said to.)
But we’re finding out now that they have been used in their capacity as computers to run spyware that watched us as we worked, rested and played.
Criminals use readymade tools like RouterSploit to get inside routers. Once there, they can inject malware into the browser, spy on you, gather data for sophisticated spear phishing attacks and route the illegal traffic of their criminal activity through your router.
If only the government could do something…
The CIA used routers throughout America to spy on Americans’ behavior online.
‘There’s no sign to tell you whether your router is hacked or not—you’re just on the internet as normal,’ according to Matthew Hickey, who’s a security researcher and the founder of Hacker House. ‘The only thing is that everything you’re doing on the internet is going through the CIA.’
And if that’s not spooky enough – it was illegal when they did it, but never fear, the Patriot Act is here to keep them us safe now – the Russians are in on the act.
Following the brave orders of the Commander-in-Chief of the United States Air Force to the Royal Air Force to bomb some Syrian rubble into rubble, President-for-life Putin has started gearing up for a cyberwar which will involve borrowing all that juicy Turing-completeness and using it to attack infrastructure targets, initially in the UK.
“This is yet another example of Russia’s disregard for international norms and global order – this time through a campaign of cyber espionage and aggression, which attempts to disrupt governments and de-stabilize business”
According to a spokesperson from the British government.
The truth is we don’t really know what Russia plans to do with all those hacked routers, which apparently run into the millions.
What we do know is that a router-level VPN keeps your router safe. Meaning only you get to play Space Invaders on it.
Check out our list of the best ones on offer.
"A speedy VPN that's very easy to use and covers basic privacy needs well enough"
- Excellent available variety of servers
- Servers are fast and secure
- Offers six connections
- Safe Wi-Fi Protection
- Loads Websites 3 To 5 Times Faster
- No Logging